We have a fortigate firewall where we have done one to one nat of local IP with public IP. We have a requirement of pinging a virtual IP (public IP) from the internal network. After configuring one policy it worked fine.
Later we have configured an access list to allow only one network to ping this VLAN and applied the acl on inbound direction of vlan. It worked fine but public IP (virtual IP of fortigate) stopped pinging.
My requirement is to ping both virtual IP and private IP from 10.10.200.0 network. If i remove the access list, virtual IP is pinging fine.
Below is my access list,
ip access-list extended DMZ
10 permit ip 10.10.200.0 0.0.0.255 any
20 permit ip 10.10.0.0 0.0.255.255 10.10.200.0 0.0.0.255
30 deny ip 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255
Cisco Champion Radio · S7|E30 Taming Your AI/ ML Workloads with Kubeflow
As organizations increasingly introduce machine learning (ML) capabilities to their existing products, their artificial intelligence (AI) projects and operations complexity g...
Cisco IOS-XE 17.3.1 – Catalyst Switching Updates
Table of Contents
Hardware Additions since IOS-XE 17.2.1
Key Summary Features
Platform and Infra Features
High Availability Features
Routing / MPLS / VPN Features
Hi Everyone,I have 2 queries1. After we configure the IPSec VPN in a Cisco Router, how do we identify and check that the traffic is flowing through the tunnel? Are there any commands and ways to find it out?2. What are some of t...
Cisco Champion Radio · S7|E29 Increase Visibility and Enhance Security with Cisco AI Endpoint Analytics
Cisco is on a journey to making networking smarter with artificial intelligence and machine learning. The latest stop in this journey, Cisco AI...