FortiProxy
FortiProxy provides enterprise-class protection against internet-borne threats and Advanced Web Content Caching
abalachandran
Article Id 361216
Description This article describes how to apply the filter on FortiProxy or FortiGate to perform wad debug on a range of source or/and destination IP addresses.
Scope FortiProxy, FortiGate.
Solution

It is possible to perform wad debug for IP ranges by defining 2 IP addresses (starting from the lowest IP in the range and ending with the highest IP on the range to debug).

 

Example:
To debug for src addresses within 10.1.0.1 - 10.1.0.30.

 

CLI:

 

lab # diagnose wad filter src 10.1.0.1 10.1.0.30

lab # diagnose wad filter list
drop unknown sessions: disabled
source ip: 10.1.0.1-10.1.0.30


The same syntax applies for filtering a range of destination addresses to be debugged as well.

 

CLI:

 

lab # diagnose wad filter dst 192.1.1.1 192.1.1.5

lab # diagnose wad filter list
drop unknown sessions: disabled
dest ip: 192.1.1.1-192.1.1.5


Using the method above, it is also possible to filter for a range of source and destination addresses as well.

 

Example:
To perform wad debug for:

Source address range: 10.1.0.1 - 10.1.0.30.
Destination address range: 192.1.1.1 192.1.1.5.

 

CLI:

 

lab # diagnose wad filter src 10.1.0.1 10.1.0.30
lab # diagnose wad filter dst 192.1.1.1 192.1.1.5
lab # diagnose wad filter list
drop unknown sessions: disabled
source ip: 10.1.0.1-10.1.0.30
dest ip: 192.1.1.1-192.1.1.5

 

To clear all WAD filters:


CLI:

 

lab # diagnose wad filter clear
lab # diagnose wad filter list
drop unknown sessions: disabled