Hi,
I can't get a reverse rule to trigger for VLAN communication. VLAN 30 is able to ping VLAN 100, but 100 can't ping 30.
Here are screen shots from the Firewall:
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
I feel like an idiot...I just figured it out...the Laptop was connected to an Open WiFi. Disabled WiFi and pings started working over the USB NIC.
Hello @Shane-NP ,
Could you please provide the output of the below command to suggest your next steps:
diag sniffer packet any "host 10.0.100.200 and 10.0.30.2 and icmp" 4 0 a
Also, replace it with a working IP and get the output of the above command to understand the working flow.
Here was the output...I had to remove the second host to get anything:
Firewall-201F # diag sniffer packet any "host 10.0.100.200 and 10.0.30.2 and icmp" 4 0 a
interfaces=[any]
filters=[host 10.0.100.200 and 10.0.30.2 and icmp]
^C
0 packets received by filter
0 packets dropped by kernel
Firewall-201F # diag sniffer packet any "host 10.0.30.2 and 10.0.100.200 and icmp" 4 0 a
interfaces=[any]
filters=[host 10.0.30.2 and 10.0.100.200 and icmp]
^C
0 packets received by filter
0 packets dropped by kernel
Firewall-201F # diag sniffer packet any "host 10.0.30.2 and icmp" 4 0 a
interfaces=[any]
filters=[host 10.0.30.2 and icmp]
2024-08-28 15:47:45.028090 Staff[30] in 10.0.30.2 -> 10.0.100.200: icmp: echo request
2024-08-28 15:47:45.028116 Cameras[100] out 10.0.30.2 -> 10.0.100.200: icmp: echo request
2024-08-28 15:47:45.028117 lan out 10.0.30.2 -> 10.0.100.200: icmp: echo request
2024-08-28 15:47:45.028472 Cameras[100] in 10.0.100.200 -> 10.0.30.2: icmp: echo reply
2024-08-28 15:47:45.028478 Staff[30] out 10.0.100.200 -> 10.0.30.2: icmp: echo reply
2024-08-28 15:47:45.028479 lan out 10.0.100.200 -> 10.0.30.2: icmp: echo reply
2024-08-28 15:47:46.033527 Staff[30] in 10.0.30.2 -> 10.0.100.200: icmp: echo request
2024-08-28 15:47:46.033539 Cameras[100] out 10.0.30.2 -> 10.0.100.200: icmp: echo request
2024-08-28 15:47:46.033540 lan out 10.0.30.2 -> 10.0.100.200: icmp: echo request
2024-08-28 15:47:46.033876 Cameras[100] in 10.0.100.200 -> 10.0.30.2: icmp: echo reply
2024-08-28 15:47:46.033880 Staff[30] out 10.0.100.200 -> 10.0.30.2: icmp: echo reply
2024-08-28 15:47:46.033881 lan out 10.0.100.200 -> 10.0.30.2: icmp: echo reply
^C
12 packets received by filter
0 packets dropped by kernel
Firewall-201F # diag sniffer packet any "host 10.0.100.200 and icmp" 4 0 a
interfaces=[any]
filters=[host 10.0.100.200 and icmp]
2024-08-28 15:48:28.834792 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:28.834803 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:28.834805 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:29.839872 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:29.839884 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:29.839886 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:30.844665 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:30.844678 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:30.844680 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:31.849746 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:31.849756 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:31.849758 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:32.853009 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:32.853021 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:32.853022 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:33.858078 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:33.858090 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:33.858091 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:34.863178 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:34.863189 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:34.863190 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:35.868252 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:35.868266 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:35.868268 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:36.872110 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:36.872121 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:36.872123 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:37.877272 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:37.877283 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:37.877285 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:38.882468 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 15:48:38.882479 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 15:48:38.882480 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
^C
33 packets received by filter
0 packets dropped by kernel
Firewall-201F #
Just an FYI on the laptop 10.0.100.200, I had 3 Terminal Tabs, each running persistent PINGs, first to 10.0.100.1, second 10.0.30.2, third 10.0.30.1. Tabs 1 & 3 ping fine, but nothing shows up when doing the sniffer with just host 10.0.100.200 and using 10.0.30.1 or 30.2. 100.1 shows in the sniffer.
Firewall-201F # diag sniffer packet any "host 10.0.100.200 and 10.0.100.1 and icmp" 4 0 a
interfaces=[any]
filters=[host 10.0.100.200 and 10.0.100.1 and icmp]
2024-08-28 16:18:36.129665 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 16:18:36.129866 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 16:18:36.129867 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 16:18:37.134814 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 16:18:37.134830 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 16:18:37.134832 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 16:18:38.139942 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 16:18:38.139953 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 16:18:38.139954 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 16:18:39.142142 Cameras[100] in 10.0.100.200 -> 10.0.100.1: icmp: echo request
2024-08-28 16:18:39.142154 Cameras[100] out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
2024-08-28 16:18:39.142155 lan out 10.0.100.1 -> 10.0.100.200: icmp: echo reply
^C
15 packets received by filter
0 packets dropped by kernel
Firewall-201F #
I feel like an idiot...I just figured it out...the Laptop was connected to an Open WiFi. Disabled WiFi and pings started working over the USB NIC.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.