This article describes how to collect WAD debug logs on a FortiGate-7000 (or 6000) series chassis.
In a FortiGate-7000 (or 6000) series unit, the FIM (or MBD) is the slot responsible for load-balancing the data plane traffic and forwarding it to a specific FPM (or FPC), which will process it.
A single connection from an end user can be sent to any FPM (or FPC), and it may become difficult to properly capture all the WAD debug output for a specific source IP.
FortiGate-7000 or 6000 series.
In this troubleshooting scenario, a client with ip 10.10.10.10 is using an explicit proxy configured with IP 172.16.16.16 on the FortiGate and listening on TCP port 8080. The client is trying to visit the address www.example.com, which resolves to IP 2.21.72.72.
Create a clone of the explicit proxy policy which is handling the specific source IP traffic and place it above the existing policy ID. As the source IP, select the test client IP and enable the new policy. Note its policy ID, which will be used in the WAD debug later.
To better troubleshoot and capture WAD debug output for all connections from a specific source IP, a flow rule can be created so all TCP traffic from a specific user can be sent to a specific FPC. A flow-rule for each traffic direction must be created and enabled.
The procedure is as follows:
config load-balance flow-rule
edit 0
set status enable
set ether-type ipv4
set src-addr-ipv4 10.10.10.10/32
set protocol tcp
set action forward
set forward-slot FPM4
set comment "Test: proxy traffic from client to server"
next
edit 0
set status enable
set ether-type ipv4
set dst-addr-ipv4 10.10.10.10/32
set protocol tcp
set action forward
set forward-slot FPM4
set comment "Test: proxy traffic response from server to client"
next
end
show load-balance flow-rule
execute load-balance slot manage <slot-number>
conf vdom
edit <VDOM-name>
diagnose sniffer packet any "host 10.10.10.10 and host 2.21.72.72 and proto 6" 4 30 l <----- This will capture 30 TCP packets between client 10.10.10.10 and server 2.21.72.72, they should go through slot 4.
diagnose debug enable
diagnose debug disable
diagnose wad debug clear
In addition, it is useful to run a debug flo,w especially in case there is suspicion of packets being dropped:
conf vdom
edit <VDOM-NAME>
diagnose debug flow filter addr y.y.y.y <---- -IP y.y.y.y is the IP address if the destination server.
diagnose debug flow show function-name enable
diagnose debug flow show iprope enable
diagnose debug console timestamp enable
diagnose debug enable
diagnose debug flow trace start 99999 <----- It captures the first 99999 packets, then it stops.
Related documents:
7000E Special management port numbers
7000E HA mode special management port numbers
6000F Special management port numbers
6000F HA mode special management port numbers
Troubleshooting Tip: WAD troubleshooting commands
Technical Tip: Gathering WAD debugs using the 'diagnose test application' debug command
Troubleshooting Tip: Troubleshoot the explicit proxy in FortiGate
Troubleshooting Tips: How to identify the policy ID number when using Explicit Proxy Policy
Troubleshooting Tip: Example of wad debugging for Explicit Proxy
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.