We have a fortigate firewall where we have done one to one nat of local IP with public IP. We have a requirement of pinging a virtual IP (public IP) from the internal network. After configuring one policy it worked fine.
Later we have configured an access list to allow only one network to ping this VLAN and applied the acl on inbound direction of vlan. It worked fine but public IP (virtual IP of fortigate) stopped pinging.
My requirement is to ping both virtual IP and private IP from 10.10.200.0 network. If i remove the access list, virtual IP is pinging fine.
Below is my access list,
ip access-list extended DMZ
10 permit ip 10.10.200.0 0.0.0.255 any
20 permit ip 10.10.0.0 0.0.255.255 10.10.200.0 0.0.0.255
30 deny ip 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255
. My work contains abbundance of networking gear.i have 3945 routers with attatched nme,3850 switches 48 gig port with 4 tengig port,3850 switch with 16 fiber ports, fortigate 600d along with servers with 8tbs of free space.if you have any labs for me id ...
Hello I have a network in prodcution like it mensionned in this picture. The customer wants to renovate the current infrastructure by changing all the hardware. For this reason we had think about deploying DNA Center and make automat...
I want to show how to quickly and reliably troubleshoot a network using notepad++.If you are not using Cisco GENIE and your network is not very big and you have several routers/switches only.For illustration, I created a simple topology.First, the loopbac...