Fortinet has a good packet capture, like most firewalls do, in CLI that is easy to read. If you do the following command, you can get a good read on what you are looking for:
diagnose sniffer packet any 'host 192.168.20.22' 4 0 a
2018-11-28 06:22:21.015672 VLAN70 in 10.20.3.7 -> 192.168.20.22: icmp: echo reply
2018-11-28 06:22:21.015675 Test VPN out 10.20.3.7 -> 192.168.20.22: icmp: echo reply
No comments:
Post a Comment
Your comment will be reviewed for approval. Thank you for submitting your comments.