| Description | This article describes techniques used to troubleshoot network issues when there is a FortiGate hosted on a KVM hypervisor and there may be an issue with said hypervisor. |
| Scope | FortiGate VM, hosted on KVM |
| Solution |
When troubleshooting network issues with a FortiGate on a hypervisor, it is useful to know how to trace traffic after it leaves the FortiGate. This may give a better indication as to where the issue lies. For example, if the HA cluster is intermittently losing heartbeats between the units it would be helpful to know if there are packets whom are leaving the FortiGate and are not seen entering the hypervisor, or if packets are entering the hypervisor but not being forwarded to the FortiGate.
Generally as long as it is possible to see the packets enter the virtual switch (and they have the correct destination MAC address), the FortiGate had done it's job. It is up to the hypervisor to forward packets where they need to go once it reaches this stage.
To list the interfaces assigned to a VM, run 'virsh domiflist <VM Name>':
To sniff packets in Linux, the command is 'tcpdump'. This command is very very similar to the 'di sni pack' command built into FortiOS, the filter syntax is the same. This is the following command used in the screenshot:
tcpdump -nn -i virbr0 host 1.1.1.1 '-nn' makes the output cleaner. '-i' specifies the interface to listen on.
Setting the interface to 'any' will show the packet exit the physical port:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.