Since its ping implementation is different (afair no payload, different timing, …), some firewall systems might drop the packets or the responses. Perhaps you can find something in the firewall logs or via tcpdump.
You can also just revert to normal ping instead of smart ping as host check command (not sure about the exact ruleset location in cmk 2.0), if this helps, but you will lose the performance benefits of smart ping.
Hi Martin, thank you for your answer but I found the problem, the host are growth a lot in the last fews weeks and now a lot of packet are filtered by our Firewall because it recognize them as ddos attack.
Now I create an exception and all is working well.
This topic was automatically closed 365 days after the last reply. New replies are no longer allowed. Contact an admin if you think this should be re-opened.