Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
wansushi
Explorer

Cant ping with Source Internal

 

im trying to ping outside with internal interface:   ping -I 192.168.32.1 8.8.4.4

why nat is not issued here?

fw monitor -e 'accept host(192.168.32.1);' 
fw: getting filter (from command line)
fw: compiling
monitorfilter:
Compiled OK.
fw: loading
fw: monitoring (control-C to stop)
[vs_0][fw_0] ppp0:o[84]: 192.168.32.1 -> 8.8.4.4 (ICMP) len=84 id=53536
ICMP: type=8 code=0 echo request id=60949 seq=0
[vs_0][fw_0] ppp0:O[84]: 192.168.32.1 -> 8.8.4.4 (ICMP) len=84 id=53536
ICMP: type=8 code=0 echo request id=60949 seq=0
[vs_0][fw_0] ppp0:o[84]: 192.168.32.1 -> 8.8.4.4 (ICMP) len=84 id=53537
ICMP: type=8 code=0 echo request id=60949 seq=1
[vs_0][fw_0] ppp0:O[84]: 192.168.32.1 -> 8.8.4.4 (ICMP) len=84 id=53537
ICMP: type=8 code=0 echo request id=60949 seq=1
[vs_0][fw_0] ppp0:o[84]: 192.168.32.1 -> 8.8.4.4 (ICMP) len=84 id=53538
ICMP: type=8 code=0 echo request id=60949 seq=2
[vs_0][fw_0] ppp0:O[84]: 192.168.32.1 -> 8.8.4.4 (ICMP) len=84 id=53538
ICMP: type=8 code=0 echo request id=60949 seq=2
[vs_0][fw_0] ppp0:o[84]: 192.168.32.1 -> 8.8.4.4 (ICMP) len=84 id=53539
ICMP: type=8 code=0 echo request id=60949 seq=3
[vs_0][fw_0] ppp0:O[84]: 192.168.32.1 -> 8.8.4.4 (ICMP) len=84 id=53539
ICMP: type=8 code=0 echo request id=60949 seq=3

0 Kudos
2 Replies
PhoneBoy
Admin
Admin

In general, NAT happens on the ingress before packets are routed.
For traffic originating from the gateway, this doesn’t generally apply.
What is the precise use case for performing a ping in this manner?

0 Kudos
wansushi
Explorer

its for debugging purpose , no personal on lan right now and i want to simulate traffic from the internal network

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events