- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
07-12-2022 09:00 AM
Can someone give me some advice please. In the attached diagram is a scenario I have where I need to get traffic logs from Virtual Firewall B across to Virtual Firewall A an up to the SIEM at the x.x.x.x address. I have made the virtual systems visible to each and added a route to x.x.x.x on virtual router B to go via virtual router A to get to x.x.x.x.
After adding a log forwarding action on the rules to send syslogs to x.x.x.x I'm seeing no traffic on either firewall destined for x.x.x.x. When using the route test command on the CLI to check the route all thats coming back is that it will use the default route to the internet rather than the route I configured. Can someone point out where I'm going wrong and/or how I would check for traffic to x.x.x.x please.
07-14-2022 05:02 AM
you also need to create "external" type zones on each of the vsys and create security rules that allow packets to flow to and from the external zones
have you looked into service routes as that may be a lot easier
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!