Created on 10-07-2010 04:06 PM
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
PCNSE
NSE
StrongSwan
diag sniffer packet internal ' sip and host x.y.z.t' 4in one session and
diag sniffer packet wan1 ' sip and host x.y.z.t' 4in the other. Then make a call. Compare and post here the (same) packet on internal and wan1 interface.
ORIGINAL: ede_pfau Maybe I' m misunderstanding this, but for sniffing you don' t have to be on site. Open 2 ssh sessions to the external interface (enable ssh access for this on wan1). If possible let the ssh client copy the output to a file. EnterMaybe should be ' WAN1' ?diag sniffer packet internal ' sip and host x.y.z.t' 4in one session anddiag sniffer packet internal ' sip and host x.y.z.t' 4in the other. Then make a call. Compare and post here the (same) packet on internal and wan1 interface.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
diag sniffer packet wan1 ' sip and host x.y.z.t' 4Thanks a ton!! I did not know about that. Just one correction the command should be... diag sniffer packet internal ' sip and host x.y.z.t' 5 if you want to see the actual packet data. The good news is that the packets are being received by the fortigate with the data missing so it seems like something on my providers end. Either way thanks a bunch for helping me out.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1688 | |
1087 | |
752 | |
446 | |
228 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.