ADFG16 # get router info routing-table connected
 C       10.1.1.0/24 is directly connected, VisitorWIFI
 C       10.1.10.0/24 is directly connected, port6
 C       10.10.1.0/24 is directly connected, port5
 C       10.20.30.0/24 is directly connected, EmployeeDevices
 C       XXX.XXX.XXX.32/27 is directly connected, port3
 C       172.16.0.0/24 is directly connected, Aethernet
 C       172.16.10.0/24 is directly connected, AppleTV
 C       192.168.0.0/22 is directly connected, LAN_Aggr
                        is directly connected, LAN_Aggr
 C       192.168.89.0/24 is directly connected, port9
 C       192.168.100.0/24 is directly connected, port2
 C       XXX.XXX.XXX.96/28 is directly connected, port1
 
 
 ADFG16 #
 ADFG16 # get router info routing-table all
 Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
        O - OSPF, IA - OSPF inter area
        N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
        E1 - OSPF external type 1, E2 - OSPF external type 2
        i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
        * - candidate default
 
 S*      0.0.0.0/0 [10/0] via XXX.XXX.XXX.97, port1
                   [10/0] via XXX.XXX.XXX.33, port3, [30/0]
 C       10.1.1.0/24 is directly connected, VisitorWIFI
 C       10.1.10.0/24 is directly connected, port6
 C       10.10.1.0/24 is directly connected, port5
 C       10.20.30.0/24 is directly connected, EmployeeDevices
 C       XXX.XXX.XXX.32/27 is directly connected, port3
 C       172.16.0.0/24 is directly connected, Aethernet
 C       172.16.10.0/24 is directly connected, AppleTV
 C       192.168.0.0/22 is directly connected, LAN_Aggr
                        is directly connected, LAN_Aggr
 C       192.168.89.0/24 is directly connected, port9
 C       192.168.100.0/24 is directly connected, port2
 S       192.168.120.0/24 [10/0] via 192.168.0.20, LAN_Aggr
 S       192.168.130.0/24 [10/0] via 192.168.0.20, LAN_Aggr
 S       192.168.200.0/24 [10/0] via 192.168.3.1, LAN_Aggr
 C       XXX.XXX.XXX.96/28 is directly connected, port1
 
 ADFG16 #
 ADFG16 # get router info policy
 
 command parse error before ' policy' 
 Command fail. Return code -61
 
 I removed the PBR and tried to access one of the servers via RDP:
 
 ADFG16 #
 ADFG16 # diag debug enable
 
 ADFG16 # diag debug flow show console enable
 show trace messages on console
 
 ADFG16 # diag debug flow filter add 10.1.10.106
 
 ADFG16 # diag debug flow start 100
 
 ADFG16 # diag debug flow trace start 100
 
 ADFG16 # id=13 trace_id=668 msg=" vd-root received a packet(proto=6, 192.168.0.241:54556->10.1.10.106:3389) from LAN_Aggr." 
 id=13 trace_id=668 msg=" allocate a new session-017a5d5d" 
 id=13 trace_id=668 msg=" Match policy routing: to XXX.XXX.XXX.97via ifindex-10" 
 id=13 trace_id=668 msg=" find a route: gw-XXX.XXX.XXX.97via port1" 
 id=13 trace_id=668 msg=" use addr/intf hash, len=9" 
 id=13 trace_id=668 msg=" find SNAT: IP-XXX.XXX.XXX.105, port-54556" 
 id=13 trace_id=668 msg=" Allowed by Policy-9: SNAT" 
 id=13 trace_id=668 msg=" SNAT 192.168.0.241->XXX.XXX.XXX.105:54556" 
 id=13 trace_id=669 msg=" vd-root received a packet(proto=6, 192.168.0.241:54556->10.1.10.106:3389) from LAN_Aggr." 
 id=13 trace_id=669 msg=" Find an existing session, id-017a5d5d, original direction" 
 id=13 trace_id=669 msg=" SNAT 192.168.0.241->XXX.XXX.XXX.105:54556" 
 id=13 trace_id=670 msg=" vd-root received a packet(proto=6, 192.168.0.241:54556->10.1.10.106:3389) from LAN_Aggr." 
 id=13 trace_id=670 msg=" Find an existing session, id-017a5d5d, original direction" 
 id=13 trace_id=670 msg=" SNAT 192.168.0.241->XXX.XXX.XXX.105:54556" 
 
 I just noticed the traffic to XXX.XXX.XXX.105.  That would be the IP of Port 1 and the upstream router is .97
					
				
			
			
				
	----------------(--
 Jeff