82-Packet Sniffing
82-Packet Sniffing
When you troubleshoot networks and routing in particular, it helps to look inside the
headers of packets to determine if they are traveling the route that you expect them to
take. Packet sniffing is also known as network tap, packet capture, or logic analyzing. Packet
sniffing can tell if the traffic is reaching its destination, what port of entry is on the FortiGate
unit, if ARP resolution is correct & if traffic is being sent back to source as expected. Packet
sniffing can also tell you if the FortiGate unit is silently dropping packets.
diagnose sniffer packet <interface_name> <‘filter’> <verbose> <count> <tsformat>
To stop the sniffer, type CTRL+C.
<interface_name> The name of the interface to sniff, such as port1 or internal. This can
also be any to sniff all interfaces.
<‘filter’> What to look for in the information the sniffer reads. none indicates
no filtering, and all packets are displayed as the other arguments
indicate.
The filter must be inside single quotes (‘).
<verbose> The level of verbosity as one of:
1 - print header of packets
2 - print header and data from IP of packets
3 - print header and data from Ethernet of packets
4 - print header of packets with interface name
<count> Number of packets the sniffer reads before stopping. If you don't put
a number here, the sniffer will run until you stop it with <CTRL+C>.
<tsformat> The timestamp formats.
a: absolute UTC time, yyyy-mm-dd hh:mm:ss.ms
l: absolute LOCAL time, yyyy-mm-dd hh:mm:ss.ms
otherwise: relative to the start of sniffing, ss.ms
Page | 1 Created by Ahmad Ali E-Mail: [email protected] , Mobile: 056 430 3717