200E cluster with a DISABLED/DOWN MGMT interface, configured with an internal private IP
trace from remote location, through VPN
Tracing route to 10.122.1.254 over a maximum of 30 hops
1 * * * Request timed out. 2 3 ms 3 ms 1 ms 192.168.200.1 3 1 ms 1 ms 1 ms 10.24.0.1 4 19 ms 18 ms 18 ms 10.122.2.50 --> IP of the remote mgmt interface (DISABLED/DOWN) 5 * * * Request timed out. 6 * * ^C
We´re not unsing the mgmt interface, so i decided to put 0.0.0.0/0 ip in it and KEEP IT DISABLED
The tarce now shows my external public IPv4 ISP IP
Tracing route to 10.122.1.254 over a maximum of 30 hops 1 * * * Request timed out. 2 1 ms 1 ms 1 ms 192.168.200.1 3 1 ms <1 ms <1 ms 10.24.0.1 4 19 ms 19 ms 18 ms 201.202.203.204 --> MY ISP!!!!! WEIRD!!!!!!!!!!! 5 * * * Request timed out. 6 * * * Request timed out. 7 * * * Request timed out. 8 * * * Request timed out. 9 * *
AND besided that, all My VPNs are still UP, but no traffic...
5.276723 10.122.11.144 -> 10.27.0.14: icmp: echo request 5.276729 177.154.24.78 -> 10.27.0.14: icmp: echo request 10.276458 10.122.11.144 -> 10.27.0.14: icmp: echo request 10.276462 177.154.24.78 -> 10.27.0.14: icmp: echo request
After i changed back the MGMG IP from 0.0.0.0/0 to the old address AND KEEPING IT DISABLED AS BEFORE
My VPns acces is UP again!
84.079841 10.122.11.144 -> 10.27.0.14: icmp: echo request 84.079857 10.122.2.50 -> 10.27.0.14: icmp: echo request 84.220031 10.27.0.14 -> 10.122.2.50: icmp: echo reply 84.220039 10.27.0.14 -> 10.122.11.144: icmp: echo reply 85.092258 10.122.11.144 -> 10.27.0.14: icmp: echo request 85.092261 10.122.2.50 -> 10.27.0.14: icmp: echo request 85.232404 10.27.0.14 -> 10.122.2.50: icmp: echo reply 85.232409 10.27.0.14 -> 10.122.11.144: icmp: echo reply 86.109854 10.122.11.144 -> 10.27.0.14: icmp: echo request 86.109857 10.122.2.50 -> 10.27.0.14: icmp: echo request 86.249280 10.27.0.14 -> 10.122.2.50: icmp: echo reply 86.249284 10.27.0.14 -> 10.122.11.144: icmp: echo reply ^C
Weird, don´t you think?
---
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.