Created on
10-12-2021
09:11 AM
Edited on
01-31-2024
05:12 AM
By
Jean-Philippe_P
Description
This article describes how to run a packet capture or sniffer on a PPPoE interface.
# config system interfaceedit "dynamic"set vdom "root"set mode pppoeset distance 10set allowaccess pingset role wanset snmp-index 26set username "fortinet"set password ENCset dns-server-override disableset interface "wan1"set vlanid 178nextend
Solution
Once PPPoE is established a dynamic interface is created 'ppp' (ppp0, ppp1, ppp2 etc.) which is only visible from CLI.The parent interface 'dynamic' (in this example) can be used in firewall policies, firewall addresses, VIP, policy route etc.The parent interface 'dynamic' has no IP assigned.In the GUI no packets will be counted on parent interface 'dynamic'.The only way to capture packets for PPPoE connection is via CLI with built-in sniffer:
FortiGate-201E # get ro info routing-table databaseCodes: K - kernel, C - connected, S - static, R - RIP, B - BGPO - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area> - selected route, * - FIB route, p - stale infoRouting table for VRF=0S *> 0.0.0.0/0 [10/0] via 10.109.31.254, wan1*> [10/0] via 10.109.253.254, ppp1FortiGate-201E # diag sniffer packet ppp1 "icmp" 4 0 ainterfaces=[ppp1]filters=[icmp]2021-10-04 15:36:32.921214 ppp1 in 172.26.61.30 -> 10.109.253.37: icmp: echo request2021-10-04 15:36:32.921243 ppp1 out 10.109.253.37 -> 172.26.61.30: icmp: echo reply2021-10-04 15:36:33.932057 ppp1 in 172.26.61.30 -> 10.109.253.37: icmp: echo request2021-10-04 15:36:33.932071 ppp1 out 10.109.253.37 -> 172.26.61.30: icmp: echo reply
To view the packets in Wireshark, it is necessary to run the sniffer with verbose 6 and use tools to convert to pcap file.
FortiGate-201E # diag sniffer packet ppp1 "icmp" 6 0 ainterfaces=[ppp1]filters=[icmp]2021-10-04 15:37:46.141505 ppp1 in 172.26.61.30 -> 10.109.253.37: icmp: echo request0x0000 0000 0000 0001 0000 0000 0000 0800 4500 ..............E.0x0010 003c c3d4 0000 7c01 8a21 ac1a 3d1e 0a6d .<....|..!..=..m0x0020 fd25 0800 4d1b 0001 0040 6162 6364 6566 .%..M....@abcdef0x0030 6768 696a 6b6c 6d6e 6f70 7172 7374 7576 ghijklmnopqrstuv0x0040 7761 6263 6465 6667 6869 wabcdefghi2021-10-04 15:37:46.141530 ppp1 out 10.109.253.37 -> 172.26.61.30: icmp: echo reply0x0000 0000 0000 0000 0000 0000 0000 0800 4500 ..............E.0x0010 003c 625b 0000 ff01 689a 0a6d fd25 ac1a .<b[....h..m.%..0x0020 3d1e 0000 551b 0001 0040 6162 6364 6566 =...U....@abcdef0x0030 6768 696a 6b6c 6d6e 6f70 7172 7374 7576 ghijklmnopqrstuv0x0040 7761 6263 6465 6667 6869 wabcdefghi
Consult related articles on how to convert packets from sniffer to pcap file, visible in Wireshark.
Related Articles
Technical Tip: Troubleshooting IPsec VPN tunnel errors with large size packets
Technical Tip: How to import 'diagnose sniffer packet' data to WireShark
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.