| Description | This article provides some useful filters that can be used in the sniffer packet. |
| Scope | FortiGate. |
| Solution |
The purpose of the built-in FortiOS packet sniffer is to capture network packets as they are entering (ingressing) and leaving (egressing) FortiGate:
Packet captures on FortiOS can be obtained in multiple ways, each with its advantages and limitations:
The following command is used to trace the packet via CLI:
diagnose sniffer packet <interface> <'filter'> <verbose> <count> <time>
<interface> <----- This interface can be set to any or any specific port. <'filter'> <----- What to look for in the information the sniffer reads e.g 'host 8.8.8.8'. <verbose> <----- Level can be from 1 - 6. <count> <----- The total packets the sniffer captures before halting. <time> <----- Timestamps: (a) absolute UTC time, (l) local time of the FortiGate.
For example:
diagnose sniffer packet any 'host 8.8.8.8' 4
Below are two filters that are useful while sniffing packets:
1. not (!) <----- To exempt any protocol. 2. net <----- To collect with the whole subnet.
To exempt any of the specific protocols, it is possible to use the not(!) command for the same.
Here is an example:
diagnose sniffer packet any 'host 8.8.8.8 and !icmp' 4 <----- This will omit all the ICMP traffic. diagnose sniffer packet any 'host 8.8.8.8 and !tcp' 4 <----- This will omit all the TCP traffic. diagnose sniffer packet any 'host 8.8.8.8 and !udp' 4 <----- This will omit all the UDP traffic.
Secondly, it is possible to collect the sniffer packet capture for the whole subnet.
Here is the command:
diagnose sniffer packet any 'net 172.31.133.0/24' 4
To stop the sniffer, press Ctrl+C; otherwise, the sniffer will continue running indefinitely.
Note: Temporarily disable the offloading in the Firewall policy level (and/or in IPSec Phase 1 level) that allows the traffic, so all data will be completely captured by the packet sniffer command. Reference link to disable offloading:
This is an important instruction because the offloaded traffic cannot be picked up by the packet sniffer command, so offloading needs to be temporarily disabled while doing troubleshooting or while using the packet sniffer commands: Checking that traffic is offloaded by NP processors
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.