?
Solved

network not pingable form outside

Posted on 2014-12-03
5
Medium Priority
?
115 Views
Last Modified: 2015-01-11
I have weird network issues, I am able to ping everything from the inside at the location but not when I am outside od the location.

Secondary site. There is a L2L tunnel to primary site. I can't pint anything from the primary site to secondary, while the network is fully functional at the secondary site. This happened out of nowhere. What could be the issue? This worked a day ago. thanks
0
Comment
Question by:Shark Attack
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
5 Comments
 
LVL 11

Expert Comment

by:Miftaul
ID: 40478615
Which firewall are you using. Can you check the acl in primary site please. They should match the secondary site subnet.
0
 
LVL 3

Author Comment

by:Shark Attack
ID: 40478677
Im using 5520's on both ends. Access lists mach exactly on both ends.
0
 
LVL 3

Author Comment

by:Shark Attack
ID: 40478688
let me clarify also, when im at the secondary location i can ping everything in there (all subnets) but i can't ping form the secondary to primary site and vise versa.
0
 
LVL 3

Accepted Solution

by:
Shark Attack earned 0 total points
ID: 40533782
one of the interfaces was using a duplicate IP which was interfering in a way. After dropping the tunnel I was all up and running
0
 
LVL 3

Author Closing Comment

by:Shark Attack
ID: 40542934
one of the interfaces was using a duplicate IP which was interfering in a way. After dropping the tunnel I was all up and running
0

Featured Post

Want to be a Web Developer? Get Certified Today!

Enroll in the Certified Web Development Professional course package to learn HTML, Javascript, and PHP. Build a solid foundation to work toward your dream job!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question