FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Article Id 189549



This article describes that the execute TAC report command can be used to collect diagnostic information about a FortiGate issue.
The FortiOS integrates a script that executes a series of diagnostic commands that take a snapshot of the current state of the device. 
The output can be saved to a log file and reviewed when troubleshooting.

It is important to run this command when the issue is present.
The TAC report will collect useful information such as:
  • Serial number.
  • Firmware version.
  • FortiGuard updates state.
  • Memory and CPU usage.
  • Global Configuration.
  • Hardware features.
  • Interface errors.
  • Traffic statistics.
  • HA diagnostics.
  • Process crash log.







There are two steps to obtaining the debug logs and TAC report.


  1. From the GUI interface: Go to System -> Advanced  -> Debug  Logs, select 'Download Debug Logs' and save the file.
  2. From the CLI management interface via SSH or console connection: Connect to the  FortiGate  (see related article).

On the command line run the following command and let the script to run until complete.  This will take a few seconds.
execute tac report

Close the SSH session.
For FortiOS v6.2.3, v6.4, v7.0 and v7.2 branch:
Go to System -> Settings -> Debug Logs and select the 'Download' button.



For FortiOS 7.4.x:


Go to System -> Settings -> FortiCare Debug Report and then select the 'Download' option. It is also possible to download it by clicking on the question mark on the top right and selecting FortiCare Debug Report.

debug log.PNG



Related article:

Technical Note: How to create a log file of a session using PuTTY


Related video: