FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Jorge_Ayala_FTNT
Article Id 190257

Description

 

This article describes how to perform a wireshark capture to successfully diagnose a traffic problem

 

Scope

 

FortiGate.

 

Solution


Install the latest version of Wireshark.

 

Example: In this example, a packet capture from a connection to an SMTP server is observed.

 

 

  1. Select the correct network interface.

Launch Wireshark (run as administrator/root for full access).

 

  • In the main window, there is a list of available interfaces (e.g., Ethernet, Wi-Fi, Loopback).
    Choose the one where packets enter/exit your machine (often the active one with a graph indicating activity).
    Double-click it or select it and proceed to options.
    Tip: If unsure, start a quick capture on each to see where the test traffic appears.

 

  1. Apply a capture filter to narrow down traffic.

 

  • This prevents overwhelming captures on busy networks. If not possible, skip this and use display filters later. See Wireshark Capture filters.

 

  1. Start the capture and reproduce the failing connection.
  • Select the blue shark icon
    Let it run for 30–60 seconds or until the failure occurs, then stop with the red square button.
    Tip: Minimize other network activity (close browsers, pause downloads) to reduce noise.

 

 

  1. Stop the capture and analyze.

 

 

2025-12-30 16_52_17-The Wireshark Network Analyzer.png

 

  1. Filter for the SMTP server and port: Use display filter: ip.addr == x.x.x.x && tcp.port == 25 (Replace x.x.x.x with your actual server IP.)
  2. Check Source and Destination IPs: In the packet list, look at the Source and Destination columns:
    • Client -> Server: Outgoing commands (e.g., EHLO, MAIL FROM).
    • Server -> Client: Responses (e.g., 250 OK).
  3. Identify negotiated protocols.
    • Starts with TCP 3-way handshake (SYN, SYN-ACK, ACK).
    • Then SMTP commands (HELO/EHLO, responses with extensions like AUTH or PIPELINING)
  4. View exchanged values.
    • Select a packet: the Packet Details pane will show commands/responses.
    • Recommended step: Right-click an SMTP packet -> Follow -> TCP Stream. This will show full plain-text conversation (commands, email headers, body, and server replies).

 

2025-12-31 15_03_00-Settings.png