Created on
04-24-2023
05:45 AM
Edited on
11-13-2025
09:51 PM
By
Jean-Philippe_P
| Description |
This article demonstrates how to perform packet captures directly on FortiExtender using the tcpdump Linux utility. |
| Scope | FortiExtender. |
| Solution |
The tcpdump utility can be used to perform packet-captures on a FortiExtender unit, which can be useful for troubleshooting packet flow to/through the FortiExtender and its various interfaces (including the cellular modem). Use the following steps to perform a tcpdump capture:
# Perform tcpdump on the lte1 interface: execute tcpdump -i lte1
# Perform tcpdump on the lte1 interface with more verbose output: execute tcpdump -n -i lte1 -vv
# Perform tcpdump on port4, filtering for packets including a specific host address: execute tcpdump -nn -i port4 'host X.X.X.X'
# Perform tcpdump on all interfaces, capturing for ICMP protocol traffic: execute tcpdump -n icmp
Available tcpdump flags:
FortiExtender # execute tcpdump -h tcpdump: enabling -nn option
Example tcpdump output (two separate instances capturing the lte1 interface and the LAN switch interface):
FortiExtender # execute tcpdump -n -i lte1 -vv tcpdump: enabling -nn option
FortiExtender # execute tcpdump -vv -i lan -nn host 8.8.8.8 and icmp
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.