I agree.  I typically ssh in as root and tcpdump to get a more interactive view 
of the network, but packet capture should give you the same data.  You should 
be seeing traffic even if it is rejected or dropped by your firewall rules.  If 
you’re not seeing ping, it’s not showing up at your interface.  

        ED.

> On 2016, May 26, at 8:44 AM, Vick Khera <[email protected]> wrote:
> 
> On Wed, May 25, 2016 at 8:54 PM, Lyle <[email protected]> wrote:
> 
>> The other end has a conflict with our LAN addressing(192.168.1.0/24).  So
>> in phase 2, we setup a Tunnel IPv4 using 193.168.1.0/24
>> 
>> for the local Network.  NAT/BINAT network of 192.168.85.0/24.  Their
>> remote network is 192.168.75.0/24.
>> 
> 
> So if they have a conflicting 192.168.1.0/24 network on their end already,
> how the heck do they expect traffic to *your* version of that network to
> get routed to you? That is, if they type "ping 192.168.1.42" which network
> is it supposed to go to? I don't see how some Sonicwall magic could make
> that happen either.
> _______________________________________________
> pfSense mailing list
> https://lists.pfsense.org/mailman/listinfo/list
> Support the project with Gold! https://pfsense.org/gold

_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold

Reply via email to