Description
snmpwalk -v1 -c <communitystring> <ip_address> system
snmpwalk -v2c -c <communitystring> <ip_address> system
snmpwalk -v3 -u <username> -l <AuthPriv or authNoPriv> -a <MD5 or SHA> -A <password> -x <DES or AES> -X <password> <ip_address> system
diagnose network snmp walk
Usage: diagnose network snmp walk <ip> <oid> [--bulk] [--debug] [--c <context>]
Provides SNMP Walk data for an OID of a given IP
<ip> IP Address of the device
<oid> OID value to manipulate data through snmp4j commands
--c, --context <context> The context value
--debug Turns on detailed debug
--bulk Does a bulk get instead of a getNext
logs
tcpdump -i any host <IP_Address> and port 161 or port162 -w Trapfile.pcap
Generate the trap by connecting a host or bouncing the switch port. When finished stop the capture by pressing ctrl+c. The 'Trapfile.pcap' will be located in /bsc/logs.
Use WinSCP or SCP protocol to collect the file.
execute tcpdump -i any host <IP_Address> and port 161 or port162 -w Trapfile.pcap
Generate the trap by connecting a host or bouncing the switch port. When finished stop the capture by pressing ctrl+c. The 'Trapfile.pcap' will be located /home/admin.
To collect the file install a TFTP or SSH server in your local machine and transfer the file:
Technical Tip: Run tcpdump in FortiNAC-F and save capture as a file
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.