Hi, i'm using this command
diag sniffer packet any "host x.x.x.x" 6 0 a
to capture some traffic, then convert the text file using the tool fgt2eth.exe to convert it to pcap.
https://kb.fortinet.com/kb/documentLink.do?externalID=FD30877
Then... when I'm going to view it in wireshark, it shows TCP-out-of-order in all the capture.
I try a lot of captures with different destination and in different firewalls (models 100d, 300d, 500d) same result. A lot of TCP Out-of-Order
I'm doing something wrong? is not possible that in all my tests was errors in comunication.
Same result in all my captures from CLI.
Solved! Go to Solution.
If you use "any" for interface, the same packet likely show up multiple times in the log like at the ingress interface and the egress interface, which Wireshark would see as duplicates or retransmission. If you wan to see the output in Wireshark, specify one interface.
What are you trying to capture mail http https traffic? I would filter in one the specific traffic and then use the convert tool. If you have FGT model with a disk you can skip all of this and and run the webGUI
https://<x.x.x address of fgt>/ng/page/p/firewall/sniffer/
I would thought a 500D would support this and maybe a 300D
Ken Felix
PCNSE
NSE
StrongSwan
If you use "any" for interface, the same packet likely show up multiple times in the log like at the ingress interface and the egress interface, which Wireshark would see as duplicates or retransmission. If you wan to see the output in Wireshark, specify one interface.
yeah and I notice all of these where fin and syn, I would not be too much worry about the start and closing
Filter in on the port and service
diag sniffer packet port1 "host x.x.x.x and port 24" is much better than "diag sniffer packet any"
Ken Felix
PCNSE
NSE
StrongSwan
toshiesumi wrote:If you use "any" for interface, the same packet likely show up multiple times in the log like at the ingress interface and the egress interface, which Wireshark would see as duplicates or retransmission. If you wan to see the output in Wireshark, specify one interface.
Yeah, this is my mistake. Thanks a lot. I need to filter more my capture.
Regards.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1741 | |
1109 | |
755 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.