Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
MDIT
New Contributor II

Packet Sniffing Within VPN Tunnel

Is it possible to packet sniff within an SSL VPN tunnel?

 

We have creatred an SSL VPN for staff to connect back into the estate, which works fine, but some rules are not working as expected and some traffic is being blocked.  

 

With non-VPN traffic, I can use the packet sniffer to look at source/destination on an interface and it will helpo me identify the issue, but I'm not sure if I can do this within a tunnel, and if so how I do that.

 

Thank you

1 REPLY 1
Toshi_Esumi
Esteemed Contributor III

I just tried to sniff my ping while connected to it over the SSL VPN. Still seems to work.

fg50e-xxx (root) # diag sniffer packet ssl.root interfaces=[ssl.root] filters=[none] pcap_lookupnet: ssl.root: no IPv4 address assigned 0.782774 172.31.254.252.59660 -> 192.168.199.254.22: ack 2261686999 1.002423 172.31.254.252 -> 172.16.2.12: icmp: echo request 1.003343 172.16.2.12 -> 172.31.254.252: icmp: echo reply 1.593928 192.168.199.254.22 -> 172.31.254.252.59660: psh 2261686999 ack 3078983690 1.593985 192.168.199.254.22 -> 172.31.254.252.59660: psh 2261687127 ack 3078983690 1.606404 172.31.254.252.59660 -> 192.168.199.254.22: ack 2261687303 2.008738 172.31.254.252 -> 172.16.2.12: icmp: echo request 2.009654 172.16.2.12 -> 172.31.254.252: icmp: echo reply 2.613847 192.168.199.254.22 -> 172.31.254.252.59660: psh 2261687303 ack 3078983690 2.613902 192.168.199.254.22 -> 172.31.254.252.59660: psh 2261687527 ack 3078983690 2.626926 172.31.254.252.59660 -> 192.168.199.254.22: ack 2261687767 3.004352 172.31.254.252 -> 172.16.2.12: icmp: echo request 3.005236 172.16.2.12 -> 172.31.254.252: icmp: echo reply

Labels
Top Kudoed Authors