FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
fwilliams
Staff
Staff
Article Id 247224
Description

This article describes how to capture packets on a virtual wire pair interface for troubleshooting.

Scope FortiGate v6.4, v7.0 and v7.2.
Solution

To capture packets on a virtual wire pair interface, particularly for troubleshooting purposes, use the sniffer command:

 

diagnose sniffer packet port1 " " 6 0 <- Port1 is a virtual wire pair member.

 

It is possible to filter or amend the sniffer.

 

If the traffic expected through the VWP port combination is multicast traffic (as demonstrated in this article), ensure to add appropriate a multicast firewall policy or policies to the FortiGate.

 

Note that it will not be possible to capture packets going through VWP ports on GUI, the interface will become unavailable for selection in the GUI packet capture utility once it became a VWP member.

If the packet capture is of verbosity 6 for example, it is possible to convert it to a PCAP file for analysis in Wireshark.

 

Verbosity 1 and 4 will NOT include data, but the rest will.

 

Verbosity:

  1. Print the header of packets.
  2. Print the header and data from the IP of packets.
  3. Print the header and data from the Ethernet of packets (if available).
  4. Print the header of packets with the interface name.
  5. Print the header and data from the IP of packets with the interface name.
  6. Print the header and data from the Ethernet of packets (if available) with intf name.

 

fwilliams_0-1677438631041.png

 

fwilliams_1-1677438642909.png

 

fwilliams_1-1677438642909.png

 

fwilliams_2-1677438655851.png