tencent cloud

Virtual Private Cloud

Release Notes and Announcements
Release Notes
Announcements
Tencent Cloud Network Overview
Product Introduction
Overview
Strengths
Use Cases
Concepts
Quota Limit
Service Regions and Service Providers
Purchase Guide
Billing Overview
Payment Overdue
Quick Start
Network Planning
VPC Connections
Building Up an IPv4 VPC
Operation Guide
Network Topology
Network performance dashboard
Virtual Private Cloud (VPC)
Subnets
Route Tables
Elastic IP
HAVIPs
Elastic Network Interface
Bandwidth Package
Network Connection
Security Management
Diagnostic Tools
Alarming and Monitoring
Practical Tutorial
View the Total Bandwidth for Single-Region Traffic-Based Billing
Migrating from the Classic Network to VPC
Best Practices of Security Group Change
Configuring CVM Instance as Public Gateway
Building HA Primary/Secondary Cluster with HAVIP + Keepalived
Hybrid Cloud Primary/Secondary Communication (DC and VPN)
Hybrid Cloud Primary/Secondary Communication (CCN and VPN)
CVM Access to Internet Through EIP
Troubleshooting
VPCs or Subnets Cannot Be Deleted
Network Disconnection After Connecting Two VPCs over CCN
Failed to Ping CVMs in the Same VPC
API Documentation
History
Introduction
API Category
Making API Requests
VPC APIs
Route Table APIs
Elastic Public IP APIs
Elastic IPv6 APIs
Highly Available Virtual IP APIs
ENI APIs
Bandwidth Package APIs
NAT Gateway APIs
Direct Connect Gateway APIs
Cloud Connect Network APIs
Network ACL APIs
Network Parameter Template APIs
Network Detection-Related APIs
Flow Log APIs
Gateway Traffic Monitor APIs
Private Link APIs
Traffic Mirroring APIs
Other APIs
Subnet APIs
VPN Gateway APIs
Security Group APIs
Snapshot Policy APIs
Error Codes
Data Types
FAQs
General
Connection
Security
Contact Us
Glossary
ドキュメントVirtual Private CloudTroubleshootingNetwork Disconnection After Connecting Two VPCs over CCN

Network Disconnection After Connecting Two VPCs over CCN

PDF
フォーカスモード
フォントサイズ
最終更新日: 2024-10-22 16:53:43

Issue Description

Two VPCs are connected over CCN, but a ping failure occurs.
Note:
You can test network connectivity in one of the following methods:
ping command: Run the "ping peer IP" command to test whether the source server and the target server are connected.
telnet command: Run the "telnet peer IPpeer port number" command to test whether the port of the specified target server is reachable.
As ping is forbidden for TencentDB and CFS/ES clusters by default, we recommend you use telnet to test the connectivity.
As the virtual IP (VIP) of a private network CLB instance can be pinged only from a client in the same VPC, you cannot ping the peer VIP to test the connectivity of the network connected over CCN; instead, you can ping the peer CVM or telnet the CLB service port.

Possible Causes

A Docker container is installed in the CVM instance, and there is a container route.
Subnet IP ranges conflict, causing the route to fail.
The security group rule does not allow access.
The subnet ACL rule does not allow access.
The firewall is enabled in the CVM instance.

Troubleshooting

Step 1. Check for any Docker route in the CVM instances at both sides of the communication

1. Go to the CVM console, click Login on the right of a CVM instance, enter the password or key as prompted to log in to the instance in the standard method, and run route to view the internal route table of the system.
2. Check whether there is a Docker container route in the system with the same IP range as the subnet of the peer CVM instance.
If so, the container route will conflict with the VPC route. In this case, the system will select the container route preferably, leading to inaccessibility to the peer. You need to use a subnet with another IP range or modify the container IP range, and then ping again to test whether the problem is solved. If not, go to step 2.
If there is no container route, go to step 2.


Step 2. Determine whether the route failed due to the conflict between two VPC subnet IP ranges

1. Log in to the VPC console and click CCN to enter the CCN console.
2. Click a CCN instance ID to enter the details page.
3. Click the Route Table tab to check the route status.
If there is an Invalid route; that is, if there are two routes to the same destination as shown below, thereby causing the route conflict, delete or disable the route with the conflicting IP range according to the actual situation, enable the route that you need for communication, and then ping again to test whether the problem is solved. If not, go to step 3.
If there is no invalid route, go to step 3.

Step 3. Check whether the security group rules of the CVM instances at both sides of the communication allow access

1. Log in to the CVM console.
2. Click the CVM instance ID to enter the details page.
3. Click the Security Group tab to check whether the ICMP protocol and the inbound and outbound security group rules for the source/destination IPs are allowed.
If there is no protocol rule, or the rule is Rejected, click Edit to modify the security group rule for the protocol, and then ping again to see whether the problem is solved. If not, go to step 4.
If the inbound and outbound rules of the security group are correct, go to step 4.

Step 4. Check whether the ACL rules associated with the subnets at both sides of the communication allow access

1. On the CVM instance details page, click the subnet ID of the CVM instance to enter the subnet details page.
2. Click the ACL Rule tab to check whether the subnet is bound to a network ACL, whether there are rules that reject the ICMP protocol, and whether the source/destination IPs are allowed in the inbound and outbound ACL rules.
If no ACL is bound, go to step 5.
If an ACL is bound, and the ACL rule already allows the protocol and IPs, go to step 5.
If an ACL is bound and ICMP is Rejected in the ACL, or there is no ICMP rule in the ACL, then click the ACL ID to enter the ACL page, allow the protocol and source/destination IPs, and then ping again to test whether the problem is solved. If not, go to step 5.
Note:
You can also disassociate ACL rules if you do not need them to control subnet traffic. Evaluate the impact before you disassociate them.

Step 5. Check whether the firewall is enabled in the CVM instances at both sides of the communication

Confirm whether the firewall is enabled in the CVM instance and make sure that it will not block the communication traffic; otherwise, remove the firewall.
Note:
For more information on how to remove a firewall, see Firewall.
If the problem persists, record it and submit a ticket for assistance.

ヘルプとサポート

この記事はお役に立ちましたか?

フィードバック