FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
simonz_FTNT
Staff
Staff
Article Id 287059
Description

This article describes how to use the TAC debug script to collect debug from FortiGate in case it has a high CPU, high memory, packet drop, or misbehaving.

Scope

FortiGate.

Solution

The following script is crafted to collect required debug commands depending on what issue is troubleshooting and is useful to collect that information beforehand before raising a ticket with TAC.

 

Below is the current supported list of debug which will update from time to time:

  • WAD.
  • IPS Engine.
  • VPN.
  • NP6/NP7/NPxlite.
  • CPU related.
  • Memory related.
  • Packet sniffer.

 

Make the following changes to the script according to the environment and it will prompt the password when begin running the script for debug collection.

 

username = 'admin'     Username used to login into FortiGate (super_admin) profile is required.
hostname = 'xx.xx.xx.xx' IP address of the device
sshport = '22' Change if using a custom SSH port.
dpath = 'C:\Debug'  Log file store location.
vdom = 'root'  Specify VDOM that needs a debug command to run.
waittime = '300' Pause duration before the next execution of the command in seconds.
lsize = '10M' Log rotate file size (M = megabyte)
NP = '2'  Number of NP processors, use 'diag npu npX port-list' to check. Leave it default if the device does not have NP.
wadworker = '2'    Number of WAD workers, check using the 'diag test application wad 1000command. Leave it default if not debugging on WAD.
verb = '6' sniffer verbose level
sniint = 'any' specify the interface for a packet sniffer
sniwait = '5' sniffer wait for timer
secure = 0  1-Teraterm console will run in the background, 0-Show on desktop (default)
option = '3,0' 1-WAD, 2-IPSE, 3-SYSCPU, 4-SYSMEM, 5-VPN, 6-NP6, 7-NP7, 8-NPx (SoC 3 & 4), 9-SNIFF, 10-NP7lite



Version 1.4 script, supports collecting 2 different sets of debugs in a single Teraterm macro. The option is separated by ',' and the second digit shall remain ZERO if does not need to collect additional debug.

Refer to the below article to run the script and to download the TeraTerm installer:
Technical Tip: FortiGate monitoring script


If the secure option is set to '1', when closing the TeraTerm macro script the console will remain open in the background as it was not properly shut down. It can be close to the task manager or use the cleanup.ps1 (Powershell script in cleanup.zip) to close Teraterm.

Note:

This script is now compatible with TeraTerm version 5.3 onward or version 4.108:Tera Term 4.108