Created on 02-15-2006 12:00 AM Edited on 01-31-2024 05:15 AM By Jean-Philippe_P
Description | This article describes some packet capture (sniffer) tips. |
Scope |
All FortiGate, FortiManager, FortiAnalyzer, FortiLog, FortiMail models. |
Solution |
Fortinet units include a built-in sniffer to use for debugging purposes. Details on its usage are explained in the Fortinet Knowledge Base article 'Using the FortiOS built-in packet sniffer'.
The following are suggestions to improve the usability of this tool.
For example, instead of: diag sniff packet interface wan1 'tcp port 3389' 3 -> that will show no output. Use: diag sniff packet interface wan1 'tcp port 3389 or icmp' 3 -> that may show ICMP error: Destination host unreachable.
This will essentially enable the sniffer for all interfaces. For example, diag sniff packet interface any 'tcp port 3389' 6.
12151 packets received by filter. 3264 packets dropped by kernel.
When this occurs, it is possible that what was attempting to capture was not actually captured. In order to avoid this, try to tighten the display filters, reduce the verbose level, or perform the trace during a lower traffic period.
Related Articles: Troubleshooting Tool: Using the FortiOS built-in packet sniffer Technical Tip: Verifying and troubleshooting FortiGuard updates status and versions |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.