Fortigate VIP 试验 (2)_职场 

VIP

 

Fortigate VIP 试验 (2)_职场_02 

 

Pool1

 

Fortigate VIP 试验 (2)_fortigate_03 

 

policy 1

 

Fortigate VIP 试验 (2)_职场_04 

 

测试

UP # diag sniffer packet any "icmp" 4
interfaces=[any]
filters=[icmp]
0.160253 internal in 192.168.1.168 -> 192.168.1.10: icmp: echo request
0.160348 wan1 out 10.10.10.168 -> 10.10.10.10: icmp: echo request
0.167602 wan1 in 10.10.10.10 -> 10.10.10.168: icmp: echo reply
0.167650 internal out 192.168.1.10 -> 192.168.1.168: icmp: echo reply
0.167668 eth0 out 192.168.1.10 -> 192.168.1.168: icmp: echo reply
1.161147 internal in 192.168.1.168 -> 192.168.1.10: icmp: echo request
1.161222 wan1 out 10.10.10.168 -> 10.10.10.10: icmp: echo request
1.161930 wan1 in 10.10.10.10 -> 10.10.10.168: icmp: echo reply
1.161959 internal out 192.168.1.10 -> 192.168.1.168: icmp: echo reply
1.161971 eth0 out 192.168.1.10 -> 192.168.1.168: icmp: echo reply

 

 

另一个方向的开通

 

 

Fortigate VIP 试验 (2)_fortigate_05 

 

VIP

 

Fortigate VIP 试验 (2)_职场_06 

 

Pool2

 

Fortigate VIP 试验 (2)_VIP_07 

policy2

 

Fortigate VIP 试验 (2)_VIP_08 

 

测试2

 

UP # diag sniffer packet any "icmp" 4
interfaces=[any]
filters=[icmp]
0.806771 wan1 in 10.10.10.10 -> 10.10.10.168: icmp: echo request
0.806856 internal out 192.168.1.10 -> 192.168.1.168: icmp: echo request
0.806878 eth0 out 192.168.1.10 -> 192.168.1.168: icmp: echo request
0.807321 internal in 192.168.1.168 -> 192.168.1.10: icmp: echo reply
0.807363 wan1 out 10.10.10.168 -> 10.10.10.10: icmp: echo reply
1.806830 wan1 in 10.10.10.10 -> 10.10.10.168: icmp: echo request
1.806888 internal out 192.168.1.10 -> 192.168.1.168: icmp: echo request
1.806905 eth0 out 192.168.1.10 -> 192.168.1.168: icmp: echo request
1.807114 internal in 192.168.1.168 -> 192.168.1.10: icmp: echo reply
1.807147 wan1 out 10.10.10.168 -> 10.10.10.10: icmp: echo reply