FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
acvaldez
Staff
Staff
Article Id 191727

Description


This article describes how the output of the 'diagnose sniff packet' command can be imported into Wireshark.

 

Scope

 

FortiGate.

Solution


In this example, the test unit is continuously pinging 8.8.8.8.

To check what is happening on the packet using Wireshark, follow these steps (Windows):

 

  1. Install Wireshark. This is required even if the device performing the conversion will not be used to review the result. The version of fgt2eth.exe attached checks for text2pcap using the path 'C:\Program Files\Wireshark\text2pcap.exe'.
  2. Download fgt2eth.exe.12.2014.zip attached.
  3. Unzip and save fgt2eth.exe in a specific folder.
  4. Access the unit using Putty or any other SSH application.
  5. Ensure Putty is set to log all printable output to a file. Save the session where fgteth.exe is saved.
  6. Run the following command (make sure to use the value 6 0 on the sniff):

    diag sniff packet any ‘host 8.8.8.8 and icmp’ 6 0

    kb_17175_1.png
  7. The test unit starts pinging 8.8.8.8.

    kb_17175_2.png
  8. The FortiGate CLI packet sniffer started populating captures.

    kb_17175_3.png
    When finished, use Ctrl-C to stop the sniffer.

  9. Open the command prompt on the Windows machine and navigate to the directory where fgt2eth.exe and ssh log are saved.

    To move between folders, use 'cd'.

  10. Run the tool in the command prompt.

    fgt2eth.exe -in <ssh_log_name.txt> -out <pcap_name.pcap>

    kb_17175_4.png
  11. Go to the folder and open the PCAP using Wireshark.

    kb_17175_5.png
    Stephen_G_0-1715707877239.png

 

Related articles:

 

Third Party Links: