One thing you can do is run a packet capture on your firewall( fw--> dst and reverse). If you are using PIX Ver 5.xx or 6.xx you can run the following command
capture -acl specify source traffic to destination including -interface to which the traffic is flowing.
Ex First create a test ACL to see if the ports are open or blocked from the firewall to dest
ACcess List 102 permit x.x.x.x where x.x.x.x = src to y.y.y.y where y.y.y.y is the destination and test all ports by using acl for each port to test
Then run capture -name, and run traffic to see results.
after you run traffic through
go back and type capture _name, this will give you the output, check to see if there are any resets denoted by -R in the trace, and if there are thats your problem. This means that the packets are being reste to src due to blobked port primarily on the FW. HTH
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...