Description |
This article describes how to use the TAC debug script to collect debug from FortiGate in case it has a high CPU, high memory, packet drop, or misbehaving. |
Scope |
FortiGate. |
Solution |
The following script is crafted to collect required debug commands depending on what issue is troubleshooting and is useful to collect that information beforehand before raising a ticket with TAC.
Below is the current supported list of debug which will update from time to time:
Make the following changes to the script according to the environment and it will prompt the password when begin running the script for debug collection.
username = 'admin' <----- Username used to login into FortiGate (super_admin) profile is required. hostname = 'xx.xx.xx.xx' <----- IP address of the device. sshport = '22' <----- Change if using a custom SSH port. dpath = 'C:\Debug' <----- Log file store location. vdom = 'root' <----- Specify VDOM that needs a debug command to run. waittime = '300' <----- Pause duration before the next execution of the command in seconds. lsize = '10M' <----- Log rotate file size (M = megabyte). NP = '2' <----- Number of NP processors, use 'diag npu npX port-list' to check. Leave it default if the device does not have NP. wadworker = '2' <----- Number of WAD worker, check using the 'diag test application wad 1000' command. Leave it default if not debugging on WAD. option = '3,0' <----- 1-WAD, 2-IPSE, 3-SYSCPU, 4-SYSMEM, 5-VPN, 6-NP6, 7-NP7, 8-NPx (SoC4), 9-SNIFF, 10-NP6lite (SoC3) In version 1.4 script, it supports collecting 2 different debugs in a single Teraterm macro. The option is separated by ',' and the second digit shall remain ZERO if does not need to collect additional debug. Refer to the below article to run the script and to download the TeraTerm installer:
Note: This script is not compatible with TeraTerm 5.x. It is recommended version 4.108: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.