| Description | This articles discusses about sniffer capture of network range and boolean expressions and, or, not. |
| Scope | FortiGate troubleshooting basic sniffer. |
| Solution |
It is sometimes necessary to sniffer traffic of entire network range on FortiGate.
Note. It is catching hosts of the whole network range 10.56.240.0/22 and icmp or port 80 or 443 for the network range.
Fortigate # diagnose sniffer packet any 'net 10.56.240.0/22 and (icmp or port (80 or 443))' 4 20
Note. In below example, it is catching hosts of the whole network range 10.56.240.0/22 and denying a specific host.
Fortigate# diagnose sniffer packet any 'net 10.56.240.0/22 and not host 192.168.91.15 and (icmp or port (80 or 443))' 4 20 29.548648 port1 in 10.56.240.113 -> 10.56.241.63: icmp: echo request |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.