2) Create the IPV4 policy and bind the Dynamic IP pool3) To check the traffic flow, enable the below commands:# dia sniffer packet any "host 8.8.8.8" 4
interfaces=[any]
filters=[host 8.8.8.8]
44.109959 port3 in 172.31.135.74 -> 8.8.8.8: icmp: echo request
44.110608 port1 out 10.5.21.101 -> 8.8.8.8: icmp: echo request
45.121066 port1 in 8.8.8.8 -> 10.5.21.101: icmp: echo reply
45.121141 port3 out 8.8.8.8 -> 172.31.135.74: icmp: echo reply
#dia sys session filter clear
#dia deb flow filter daddr 8.8.8.8
#dia deb flow trace start 100
#dia deb en
id=20085 trace_id=11232 func=fw_forward_handler line=751 msg="Allowed by Policy-1: SNAT"
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.