diag sniffer packet dmz ' not dst net 192.168.100'With the ' net' keyword, cut off the host part - it doesn' t have a netmask to do it itself.
FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C
PCNSE
NSE
StrongSwan
if you know exactly what host src & dst and even the port or protocol, I would make my pcap filter expression as tight as possible
e.g
src host 1.1.1.1
vrs
src host 1.1.1.1 and dst host 2.2.2.2
vrs
src host 1.1.1.1 and dst host 2.2.2.2 and port 80
or even
src host 1.1.1.1 and dst host 2.2.2.2 and dst port 80
hope that helps
PCNSE
NSE
StrongSwan
This is very very strange. Any more points that I should worry about?
Thanks!
Matt
[edit]
fortigate~ (root) # diag sniffer packet any ' host 192.168.100.10'
interfaces=[any]
filters=[host 192.168.100.10]
... nothing
tcpdump -i eth0 ' host 192.168.100.10'
... all the packets!
| User | Count |
|---|---|
| 2677 | |
| 1412 | |
| 810 | |
| 703 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.