Created on
11-29-2024
12:32 AM
Edited on
09-12-2025
04:18 AM
By
Stephen_G
Description | This article describes how to apply the filter on FortiProxy or FortiGate to perform wad debug on a range of source or/and destination IP addresses. |
Scope | FortiProxy, FortiGate. |
Solution |
It is possible to perform wad debug for IP ranges by defining 2 IP addresses (starting from the lowest IP in the range and ending with the highest IP on the range to debug).
Example:
CLI:
lab # diagnose wad filter src 10.1.0.1 10.1.0.30 lab # diagnose wad filter list
CLI:
lab # diagnose wad filter dst 192.1.1.1 192.1.1.5 lab # diagnose wad filter list
Example: Source address range: 10.1.0.1 - 10.1.0.30.
CLI:
lab # diagnose wad filter src 10.1.0.1 10.1.0.30
After setting the necessary filters, enable WAD debugging as shown below:
lab # diagnose wad debug enable category all lab # diagnose wad debug enable level verbose lab # diagnose wad debug show <----- After this command, verify that all the WAD filters, along with IP range are set correctly. lab # diagnose debug enable
To stop debugging, execute the commands below:
lab # diagnose deb disable lab # diagnose deb reset
To clear all WAD filters, run the following commands:
lab # diagnose wad filter clear |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.