We have a point to point tunnel. This was working fine until today afternoon and since then it stopped working I cannot figure out what happened. I can ping the LAN side of other side just fine when I am pinging from within router after telnet to it but I cannot ping it from our LAN of after attaching single computer to FastEthernet0.
After attaching the computer towards FastEthernet0 I can ping the interface FastEthernet0 and I can also ping the interface Serial0?s IP but I cannot ping it to the other side?s interface Serial0.
After I telnet to my router I can ping my side of LAN their side of router and their side of LAN. Any help will greatly be appreciated.
try pinging the other side LAN or serial of the other side router with the source ip of the LAN interface of your router my guess it will not succeed. are you using IPsec/GRE tunneling if so then you might have a problem with the access lists configured on either router. if you could post the configurations of the tunnels on both routers it might help.
Do one thing more, try to telnet the other end router, and ping your LAN (using the extended ping). if it success that mean you have to review the configuration in your side router and check the access list.
if it fail, i think the problem is on the tunnel. cisco router crached tunnel down. so rebuild your tunnel again.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...