Improve company productivity with a Business Account.Sign Up

x
?
Solved

Fotigate 100D stops the traffic in a certain time

Posted on 2013-01-22
3
Medium Priority
?
426 Views
Last Modified: 2013-01-27
Dear experts:

we have new fortigate 100D  and it was working before well but now the fortigate started to stop the traffic for 3-10 minute then resumes again.

We have disabled UTM profiles to see any improvement but nothing has yet improved, the fortigate LAN ip address is able to reached by LAN computers but the external gateway is stopping in a certain time to be reached.

during the stopping period, if connect my laptop directly to the ISP network it's working perfectelly  which means my the problem is my fortigate
0
Comment
Question by:fahad44
3 Comments
 
LVL 1

Assisted Solution

by:IntMediaNet
IntMediaNet earned 500 total points
ID: 38809289
I've seen this on the 60 models as well - darn thing just stops routing
Is the unit going into "protection mode" - or are you seeing "reached system connection limit" in the logs ? What does the traffic monitor look like when it is happening?
0
 
LVL 8

Accepted Solution

by:
myramu earned 500 total points
ID: 38824474
Could you try by changing interface speed and MTU?
Also check for conserve mode. What you will do for recovering?

Good Luck!
0
 
LVL 1

Author Comment

by:fahad44
ID: 38824505
Thanks guys for the support, my problem was; the ipaddress that I assigned to the interface was conflicting another machine that has same address and I changed the ip address to another address.

Regards,
Fahad
0

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

584 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question