(R3) # get router info multicast pim sparse-mode table 239.1.1.1
IP Multicast Routing Table
(*,*,RP) Entries: 0
(*,G) Entries: 2
(S,G) Entries: 5
(S,G,rpt) Entries: 9
FCR Entries: 0
(R3) # diag sniffer packet r3_r4_0 'proto 103' 4 0 l
interfaces=[r3_r4_0]
filters=[proto 103]
2016-07-06 06:17:07.644360 r3_r4_0 in 10.4.0.4 -> 3.3.3.3: ip-proto-103 68
2016-07-06 06:17:08.639835 r3_r4_0 in 10.4.0.4 -> 3.3.3.3: ip-proto-103 68
2016-07-06 06:17:09.639791 r3_r4_0 in 10.4.0.4 -> 3.3.3.3: ip-proto-103 68
2016-07-06 06:17:10.642411 r3_r4_0 in 10.4.0.4 -> 3.3.3.3: ip-proto-103 68
2016-07-06 06:17:11.639761 r3_r4_0 in 10.4.0.4 -> 3.3.3.3: ip-proto-103 68
diagnose debug enable
diagnose debug flow show console enable
diagnose debug flow show function-name enable
diagnose debug console timestamp enable
diagnose debug flow filter daddr 3.3.3.3
diagnose debug flow trace start 100
2016-07-06 06:34:22 id=20085 trace_id=102 func=print_pkt_detail line=4478 msg="vd-R3 received a packet(proto=103, 10.4.0.4:0->3.3.3.3:0) from r3_r4_0. "
2016-07-06 06:34:22 id=20085 trace_id=102 func=init_ip_session_common line=4629 msg="allocate a new session-000056af"
2016-07-06 06:34:22 id=20085 trace_id=102 func=fw_local_in_handler line=385 msg="iprope_in_check() check failed on policy 0, drop"
(R3) # show firewall policy
config firewall policy
edit 1
set uuid 4ab60d1a-435c-51e6-76b7-39c0c045e9e6
set srcintf "r3_r4_0" "r1_r3_1"
set dstintf "lo3"
set srcaddr "R4_Loopback"
set dstaddr "R3_Loopback"
set action accept
set schedule "always"
set service "PIM"
next
end
(R3) # show firewall address R4_Loopback
config firewall address
edit "R4_Loopback"
set uuid 57546916-2bfd-51e6-c15c-a8f5ff213544
set subnet 4.4.4.4 255.255.255.255
next
end
config router multicast
set multicast-routing enable
config pim-sm-global
set register-source ip-address
set register-source-ip 4.4.4.4
end
end
(R3) # diag sniffer packet r3_r4_0 'proto 103' 4 0 l
interfaces=[r3_r4_0]
filters=[proto 103]
2016-07-06 06:22:58.167509 r3_r4_0 in 4.4.4.4 -> 3.3.3.3: ip-proto-103 68
2016-07-06 06:22:58.167649 r3_r4_0 out 3.3.3.3 -> 4.4.4.4: ip-proto-103 18
2 packets received by filter
0 packets dropped by kernel
FGT_1 (R3) # get router info multicast pim sparse-mode table 239.1.1.1
IP Multicast Routing Table
(*,*,RP) Entries: 0
(*,G) Entries: 2
(S,G) Entries: 6
(S,G,rpt) Entries: 10
FCR Entries: 0
(10.4.0.10, 239.1.1.1)
RPF nbr: 0.0.0.0
RPF idx: None
SPT bit: 0
Upstream State: NOT JOINED
Local:
Joined:
Asserted:
Outgoing:
(10.4.0.10, 239.1.1.1, rpt)
RP: 0.0.0.0
RPF nbr: 0.0.0.0
RPF idx: None
Upstream State: RPT NOT JOINED
Local:
Pruned:
Outgoing:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.