| Description | This article describes how to use sniffer to confirm the upstream device sending the traffic to the wrong MAC address. |
| Scope |
Network Setup: Workstation -> Layer3 switch -> FortiGate -> Internet.
With the sniffer Verbose level 6, the result shows print header and data from ethernet of packets with interface name from CLI. Alternatively, it is possible to verify the behavior through GUI with help of packet capture by using below: Network -> Packet Capture. |
| Solution |
To perform a sniffer trace in the CLI, run the following command:
diagnose sniffer packet interface "host x.x.x.x " 6 0 l <----- x.x.x.x is the destination IP address.
For example, the command can be executed as follows:
diagnose sniffer packet wan1 "host 202.165.107.49" 6 0 l 2022-05-21 17:29:41.881685 wan1 -- 116.87.142.237 -> 202.165.107.49: icmp: echo request
As shown in the output above, '10f3 1126 c734' in the sniffer is the destination MAC address and '04d5 904a 1388' is the source MAC address.
The MAC address for the interface can be verified with the following command:
FGT # diagnose hardware device info nic wan1 Description :FortiASIC NP6XLITE Adapter
The MAC address '10f3 1126 c734' belongs to the wan2 interface and can be verified as follows:
Description :FortiASIC NP6XLITE Adapter
From the outputs above, it is possible to confirm that the switch is holding the wrong MAC address entry and traffic is being received on the wrong interface. To rectify the issue, further troubleshooting needs to be performed on the switch side. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.