Created on 04-25-2023 01:20 AM Edited on 04-25-2023 01:21 AM By Jean-Philippe_P
Description | This article discusses the possible scenarios where the user is able to see specific packets under the 'diagnose sniffer' output, but it is not possible to see the packet leaving the firewall and no outputs in the 'debug flow trace'. |
Scope | FortiOS. |
Solution |
Scenario 1:
The destination MAC address on the packet is not matching with FortiGate interface MAC as below. The packet is reaching port2 with destination MAC 0000 0000 0001 instead of the Fortigate MAC 02:09:63:23:02:01.
FortiGate will drop the packet at the physical network interface level and will not be forwarded to the CPU for processing, hence it is not possible to see it under debug flow traces.
FortiGate-LAB # diagnose sniffer packet port2 "host 6.6.6.6" 6
Devices in HA uses virtual MAC address and it is common to see this issue in such environments when the end users try to send packets using physical mac instead of the virtual mac.
Scenario 2:
Access Control Lists (ACLs) applied to the specific interface can block traffic at the physical network interface before the packets are analyzed by the CPU. This feature is available on FortiGates with NP6 processors. It is possible to use 'diagnose firewall acl counter' to check if the packets are getting dropped by ACLs.
FortiGate-LAB # diagnose firewall acl counter |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.