Solved

Fotigate 100D stops the traffic in a certain time

Posted on 2013-01-22
3
406 Views
Last Modified: 2013-01-27
Dear experts:

we have new fortigate 100D  and it was working before well but now the fortigate started to stop the traffic for 3-10 minute then resumes again.

We have disabled UTM profiles to see any improvement but nothing has yet improved, the fortigate LAN ip address is able to reached by LAN computers but the external gateway is stopping in a certain time to be reached.

during the stopping period, if connect my laptop directly to the ISP network it's working perfectelly  which means my the problem is my fortigate
0
Comment
Question by:fahad44
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Assisted Solution

by:IntMediaNet
IntMediaNet earned 250 total points
ID: 38809289
I've seen this on the 60 models as well - darn thing just stops routing
Is the unit going into "protection mode" - or are you seeing "reached system connection limit" in the logs ? What does the traffic monitor look like when it is happening?
0
 
LVL 8

Accepted Solution

by:
myramu earned 250 total points
ID: 38824474
Could you try by changing interface speed and MTU?
Also check for conserve mode. What you will do for recovering?

Good Luck!
0
 
LVL 1

Author Comment

by:fahad44
ID: 38824505
Thanks guys for the support, my problem was; the ipaddress that I assigned to the interface was conflicting another machine that has same address and I changed the ip address to another address.

Regards,
Fahad
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question