您的位置:首页 > 职场人生

Fortigate VIP 试验 (2)

2012-03-17 17:04 113 查看




VIP





Pool1





policy 1





测试

UP # diag sniffer packet any "icmp" 4

interfaces=[any]

filters=[icmp]

0.160253 internal in 192.168.1.168 -> 192.168.1.10: icmp: echo request

0.160348 wan1 out 10.10.10.168 -> 10.10.10.10: icmp: echo request

0.167602 wan1 in 10.10.10.10 -> 10.10.10.168: icmp: echo reply

0.167650 internal out 192.168.1.10 -> 192.168.1.168: icmp: echo reply

0.167668 eth0 out 192.168.1.10 -> 192.168.1.168: icmp: echo reply

1.161147 internal in 192.168.1.168 -> 192.168.1.10: icmp: echo request

1.161222 wan1 out 10.10.10.168 -> 10.10.10.10: icmp: echo request

1.161930 wan1 in 10.10.10.10 -> 10.10.10.168: icmp: echo reply

1.161959 internal out 192.168.1.10 -> 192.168.1.168: icmp: echo reply

1.161971 eth0 out 192.168.1.10 -> 192.168.1.168: icmp: echo reply

另一个方向的开通





VIP





Pool2





policy2





测试2

UP # diag sniffer packet any "icmp" 4

interfaces=[any]

filters=[icmp]

0.806771 wan1 in 10.10.10.10 -> 10.10.10.168: icmp: echo request

0.806856 internal out 192.168.1.10 -> 192.168.1.168: icmp: echo request

0.806878 eth0 out 192.168.1.10 -> 192.168.1.168: icmp: echo request

0.807321 internal in 192.168.1.168 -> 192.168.1.10: icmp: echo reply

0.807363 wan1 out 10.10.10.168 -> 10.10.10.10: icmp: echo reply

1.806830 wan1 in 10.10.10.10 -> 10.10.10.168: icmp: echo request

1.806888 internal out 192.168.1.10 -> 192.168.1.168: icmp: echo request

1.806905 eth0 out 192.168.1.10 -> 192.168.1.168: icmp: echo request

1.807114 internal in 192.168.1.168 -> 192.168.1.10: icmp: echo reply

1.807147 wan1 out 10.10.10.168 -> 10.10.10.10: icmp: echo reply
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签:  职场 fortigate 休闲 VIP