'업무이야기 > Security' 카테고리의 다른 글
Juniper SRX(방화벽) 패스워드 초기화 (5) | 2024.10.24 |
---|---|
DeepFinder (웹방화벽) (6) | 2024.10.23 |
SRX IPSec Tunnel Sample (0) | 2023.05.02 |
AhnLab Network Solutions (0) | 2022.11.21 |
FortiGate FSSO 설정 (0) | 2022.08.10 |
Juniper SRX(방화벽) 패스워드 초기화 (5) | 2024.10.24 |
---|---|
DeepFinder (웹방화벽) (6) | 2024.10.23 |
SRX IPSec Tunnel Sample (0) | 2023.05.02 |
AhnLab Network Solutions (0) | 2022.11.21 |
FortiGate FSSO 설정 (0) | 2022.08.10 |
Scheduled Daily Reboot of FortiGate (0) | 2018.05.08 |
---|---|
FortiGate DNS Translation (0) | 2018.05.08 |
Fortigate IPv6 over IPv4 VPN Tunnel (0) | 2018.05.08 |
FortiGate Service Objects Category별 우선 순위 (0) | 2018.05.08 |
FortiSandbox Cluster (0) | 2018.05.08 |
diagnose debug enable
diagnose debug flow show console enable
diagnose debug flow filter add 10.10.20.30
diagnose debug flow trace start 100
fg60cxadsl # diagnose sys session filter src 192.168.1.110
fg60cxadsl # diagnose sys session filter dport 80
Next it's time to clear the session by issuing thesession clear command as follows:
fg60cxadsl # diagnose sys session clear
Step 3: Sniffer trace
Take a sniffer trace as per the following examples when running a constant ping (or TCP connection) from PC1 to PC2.
This will answer the following questions:
- Is traffic arriving to the FortiGate and does it arrive on the expected port?- Is the ARP resolution correct for the targeted next-hop?- Is the traffic exiting the FortiGate to the destination?- Is the traffic sent back to the source?
FGT# diagnose sniffer packet any "host <PC1> or host <PC2>" 4
or
FGT# diagnose sniffer packet any "(host <PC1> or host <PC2>) and icmp" 4
Including the ARP protocol in the filter may be useful to troubleshoot a failure in the ARP resolution (for instance PC2 may be down and not responding to the FortiGate ARP requests)
FGT# diagnose sniffer packet any "host <PC1> or host <PC2> or arp" 4
To stop the sniffer, type CTRL+C.
Step 4: Debug flow
Traffic should come in and leave the FortiGate. If not, proceed with a debug flow as follows:
diag debug enable
diag debug flow filter add <PC1> or diag debug flow filter add <PC2>
diag debug flow show console enable
diag debug flow trace start 100 <== this will display 100 packets for this flow
diag debug enable
To stop all other debug, type "diag debug flow trace stop".
Step 5: Session list
diag sys session filter src PC1
diag sys session list
or
diag sys session filter dst PC1
diag sys session list
To clear all sessions corresponding to a filter:
diag sys session filter dst PC1
diag sys session clear
Fortigate SIP ALG / Fortinet SIP ALG (0) | 2015.12.28 |
---|---|
FortiAP Configuration (0) | 2015.12.28 |
FortiGate FGSP (0) | 2015.12.28 |
FortiAnalyzer 점검 CLI (0) | 2015.12.28 |
fortigate File reached uncompressed size limit (0) | 2015.12.28 |