Hi @Shay_Levin,
I have tried GLB with CG , Seems solution is not working in Azure platform .
I can inbound traffic reaching till firewall but there us no response from firewall .
tcpdump is able to capture the inbound packets but same is not getting captured with fw monitor.
fw ctl zdebug + drop doen't show any drops and for same traffic logs are also not reflecting on smart console.
Interface config :
[Expert@cicppocgw0:0]# tcpdump -nni vxlan801
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vxlan801, link-type EN10MB (Ethernet), capture size 262144 bytes
09:29:43.831533 IP 165.225.124.115.49471 > 20.235.104.161.443: Flags [S], seq 3719711221, win 65535, options [mss 1460,sackOK,eol], length 0
09:29:43.832747 IP 165.225.124.115.49470 > 20.235.104.161.443: Flags [S], seq 3413802471, win 65535, options [mss 1460,sackOK,eol], length 0
09:29:44.494574 IP 123.129.217.197.6028 > 20.235.104.161.23: Flags [S], seq 350972065, win 24524, length 0
09:29:46.244334 IP 193.57.40.49.49030 > 20.235.104.161.13899: Flags [S], seq 519229892, win 1024, length 0
^C
4 packets captured
4 packets received by filter
0 packets dropped by kernel
[Expert@cicppocgw0:0]# ^C
[Expert@cicppocgw0:0]# tcpdump -nni vxlan801
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vxlan801, link-type EN10MB (Ethernet), capture size 262144 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
Tcpdump ;
=======
[Expert@cicppocgw0:0]# tcpdump -nni vxlan801
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vxlan801, link-type EN10MB (Ethernet), capture size 262144 bytes
09:29:43.831533 IP 165.225.124.115.49471 > 20.235.104.161.443: Flags [S], seq 3719711221, win 65535, options [mss 1460,sackOK,eol], length 0
09:29:43.832747 IP 165.225.124.115.49470 > 20.235.104.161.443: Flags [S], seq 3413802471, win 65535, options [mss 1460,sackOK,eol], length 0
09:29:44.494574 IP 123.129.217.197.6028 > 20.235.104.161.23: Flags [S], seq 350972065, win 24524, length 0
09:29:46.244334 IP 193.57.40.49.49030 > 20.235.104.161.13899: Flags [S], seq 519229892, win 1024, length 0
==============
fw monitor
=====
[Expert@cicppocgw0:0]# fw monitor -e "host(20.235.104.161),accept;"
PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable
PPAK 0: Get before set operation succeeded of simple_debug_filter_off
PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable
PPAK 0: Get before set operation succeeded of fwmonitorfreebufs
************************************************************** NOTE **************************************************************
*** Using "-e" filter will not monitor accelerated traffic. To monitor and filter accelerated traffic please use the "-F" filter ***
************************************************************************************************************************************
FW monitor will record only ip & transport layers in a packet
For capturing the whole packet please do -w
PPAK 0: Get before set operation succeeded of fwmonitor_ppak_all_position
monitor: getting filter (from command line)
monitor: compiling
monitorfilter:
Compiled OK.
monitor: loading
monitor: monitoring (control-C to stop)
PPAK 0: Get before set operation succeeded of fwmonitormaxpacket
PPAK 0: Get before set operation succeeded of fwmonitormask
PPAK 0: Get before set operation succeeded of fwmonitorallocbufs
PPAK 0: Get before set operation succeeded of printuuid
================
[Expert@cicppocgw0:0]# fw ctl zdebug drop | grep 20.235.104.161