I have a SG300-10 in layer 3 mode attached to a Fortinet firewall (FG). The Fortinet syslog is reporting repeated traffic violations with the following info:
src: << IP of the interface that the SG is attached to >>
dst: << IP of system connected to another interface within the same VLAN on the FG >>
src port: 0
dst port: 1281
The traffic is dropped as it is not authorized traffic but I'm wondering what this is....Googling the dst port came up with "healthd" but not sure how that plays into this connection - does the SG use healthd? I have not found any system behind the SG that can be pinned as the source and the ACL/ACEs on the SG are very strict (only allows tcp port 443 from systems behind the SG) so any help here would be appreciated....it's really loading up my syslog.
Thanks but figured it out with a little more research - turns out it was the FG trying to tell the other system (not the SG) that there was a "faster" route to a resource behind the SG. Since the traffic was blocked by access rules on the other system it never got the message. Wouldn't have mattered anyway as everything is static routes.
The icmp #5 was the clue - ICMP redirect notification.Believe it or not, found the answer on a 5 year old MSOFT KB Article: http://support.microsoft.com/kb/195686. Once I added a static route to the other system, telling to send the traffic in question directly to the SG, the messages went away.
Sx550X, Sx350X, Sx250: PSE will Supply Power to Catalyst PSE Ports
May 31, 2016
June 5, 2017
Configure Remote Network Monitoring (RMON) Events Control Settings on a Switch through the Command Line Interface (CLI)
Remote Network Monitoring (RMON) was developed by the Internet Engineering Task Force (IETF) to support...