# diagnose sniffer packet any ' host 145.238.203.14' 4 0.634692 port1 out A.B.C.D.123 -> 145.238.203.14.123: udp 48 0.646904 port1 in 145.238.203.14.123 -> A.B.C.D.123: udp 48UPDATE Exemple (don' t work)
#diagnose sniffer packet any ' host 208.91.112.68' 4 8.432481 port1 out 10.63.32.14.7033 -> 208.91.112.68.443: syn 4151528419 11.431059 port1 out 10.63.32.14.7033 -> 208.91.112.68.443: syn 4151528419 17.431062 port1 out 10.63.32.14.7033 -> 208.91.112.68.443: syn 4151528419I can resolve but not go out:
firewall-a # execute traceroute update.fortiguard.net traceroute to update.fortiguard.net (96.45.33.88), 32 hops max, 72 byte packets 1 10.63.32.13 1.740 ms 1.705 ms 1.600 ms 2 *Normal; 10.63.32.0 is not routed over internet. Is there a mistake in my config? What can I do for this? Using a radius proxy server: To forward requests from my 310B directly on update.fortiguard.net:443 via DMZ interface (which is routed on internet, of course). I was not able to configure it over Apache2, I have no answers from the update.fortiguard.net server. My fault? Using VDom Maybe is this the only way to solve my problem? I have no Fortigate v5 for tests but if it' s the only one solution, via internal FGT routing, I will try. Let me know if it' s the solution for me. Using Local-in policy I Think this is not the solution, i have just read the docs and I think that it can' t resolve this kind of problems. Thanks for your suggestions; Sorry for my poor English. Regards, Adrien
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1105 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.