| Description | This article explains why it shows duplicate traffic from diagnose sniffer packet any. |
| Scope | FortiOS. |
| Solution |
# diagnose sniffer packet any "<paramater>" 4 is one of the most useful tools used by TAC for troubleshooting purposes. This is very important to supply TAC with this information, especially for case that has anything to do with routing and firewall policy.
Here, it will explain how to avoid misunderstanding while reading the result of this command. The traffic is simply just ICMP from 192.168.30.2 to 192.168.1.3.
FGT1 # diagnose sniffer packet any "host 192.168.1.3 and icmp" 4 It is shown that 'out' direction ICMP takes place 3 times consecutively as if the traffic is duplicated, actually it is not. FortiGate presents the complete figure of the interface, starting from the most specific one (VLAN_116), then Aggregate Interface (Agg_Intf), and lastly physical port (port4).
VLAN_116 interface is a subinterface of Agg_Intf (aggregate interface).
FGT1 # show system interface VLAN_116
Agg_Intf is the aggregate interface type with port4 as its physical member:
FGT1 # show system interface Agg_Intf
FGT1 # show system interface port4
Conclusion: The figure is not duplicate traffic.
Related Documentation: Troubleshooting Tip: Using the FortiOS built-in pa... - Fortinet Community Performing a sniffer trace (CLI and packet capture) | FortiGate / FortiOS 6.2.10 (fortinet.com) Technical Tip: Packet capture (sniffer) - Fortinet Community |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.