I've got a VPN L2L tunnel between my offsite and my central office. Everything seems to work most of the time, but every now and then i loose connectivity to random devices.
for example, right now I cannot ping the interface on the 3560-EMI, however i can ping the PC on the other end of it. A few minutes from now, the 3560 will be pingable and i will probably notice another device that is no longer accessible.
It almost seems as if the ARP table is corrupt or inconsistant. Another example would be 2 separate PCs on the Offsite side, I can ping one but not the other. If i telnet into the 3560 i can ping both PCs without issue, but once i get to the other side of the ASA5520 I no longer can see both devices...A few minutes later the second PC will be visible again from the Central Office.
I'm at a loss, i will gladly provide configs and more examples, but I don't even understand how to approach looking deeper into this.
Sorry, my bad, it's an ASA5005. As far as i can tell the licensing says unlimited, so i don't think it's that. But it does sound similar since we have about 10 devices over there.
It gets more interesting, right now i have a video camera that i'm still recieving video from, but i cannot ping it. If I reset my connection i lose the video feed. In an hour or so I'll probably be able to ping it again and get video.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...