# diagnose wad debug ?By default, the '# diagnose wad debug' command troubleshooting options are set to the following values:
enable <----- Enable debug setting.
disable <----- Disable debug setting.
show <----- Show debug setting.
clear <----- Clear debug setting.
display <----- Display setting.
save-http-req-crash <----- Save HTTP request when WAD worker crashes.
# diagnose wad debug showNote: In order to start capturing WAD related data, the category option must be set to something other than 'not set'.
Category: not set <----- there is no category set.
Level: info <----- debugging level is set to informational.
Display: pid disabled <----- pid display option is disabled.
# diagnose wad debug showTo change the debug information level, use '# diag wad debug enable level ?'.
session <----- session.
packet <----- packet.
dispatcher <----- dispatcher.
http <----- http.
cifs <----- cifs.
mapi <----- mapi.
socks <----- socks.
ftp <----- ftp.
icap <----- icap.
ssl <----- ssl.
webcache <----- webcache.
bytecache <----- byte cache
policy <----- policy matching.
auth <----- authentication.
scan <----- UTM scan.
tunnel <----- wanopt tunnel.
sys <----- sys.
video <----- cache video.
waf <----- waf.
memblk <----- memory block.
all <----- all category.
# diagnose wad debug enable level ?To display WAD Process ID information, use the '# diag wad debug display pid ?'.
error <----- error.
warn <----- warning.
info <----- information.
verbose <----- verbose.
# diagnose wad debug display pid ?To start capturing data, select a category (e.g. http) then enable debugging using '# diagnose debug enable'.
enable/disable <----- Enable/disable pid display.
# diagnose wad debug enable category httpThe console output will look like the following.
# diagnose debug enable
# wad_http_session_make(30455): make ok session=0x2a9a19d848 server=(nil) detect 10
wad_http_stream_get_line(976): http stream no line br_len = 225 i = 38 state 7
wad_http_request_reader_run(100): http reader 0x7fbffffab0 begin state=2
wad_http_request_reader_run(305): HTTP request method=4/7 version=3/8/0 uri=19/0
bypass req(0x2a9a1ab508) caller(wad_http_init_req_status)@7908
wad_http_stream_get_line(976): http stream no line br_len = 187 i = 27 state 7
wad_http_stream_get_line(976): http stream no line br_len = 160 i = 30 state 7
wad_http_stream_get_line(976): http stream no line br_len = 130 i = 130 state 9
[0x2a9a1ab508] Received request from client: 10.218.5.195:49582etc...
# diagnose wad debug display pid enableTo start capturing data, enable debugging using '# diagnose debug enable'.
# 913-wad_http_session_make(30455): make ok session=0x2a9a19d848 server=(nil) detect 10In the data capture above, it can be seen that the WAD PID (here 913) is now displayed in front of each method call.
913-wad_http_stream_get_line(976): http stream no line br_len = 225 i = 38 state 7
913-wad_http_request_reader_run(100): http reader 0x7fbffffab0 begin state=2
913-wad_http_request_reader_run(305): HTTP request method=4/7 version=3/8/0 uri=19/0
913-bypass req(0x2a9a1ab508) caller(wad_http_init_req_status)@7908
913-wad_http_stream_get_line(976): http stream no line br_len = 187 i = 27 state 7
913-wad_http_stream_get_line(976): http stream no line br_len = 160 i = 30 state 7
913-wad_http_stream_get_line(976): http stream no line br_len = 130 i = 130 state 9
[0x2a9a1ab508] Received request from client: 10.218.5.195:49582etc...
# diagnose wad filter ?Filtering for a source IP, for example, would limit debug output to traffic/authentication etc to/from that IP.
list <----- Display current filter.
clear <----- Erase current filter settings.
src <----- Source address range to filter by.
dst <----- Destination address range to filter by.
sport <----- Source port range to filter by.
dport <----- Destination port range to filter by.
vd <----- Virtual Domain Name.
explicit-policy <----- Index of explicit-policy. -1 matches all.
firewall-policy <----- Index of firewall-policy. -1 matches all.
drop-unknown-session <----- Enable drop message unknown sessions.
negate <----- Negate the specified filter parameter.
protocol <----- Select protocols to filter by.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.