Fortinet black logo

Cookbook

Results

Copy Link
Copy Doc ID a4a06ec3-12a7-11e9-b86b-00505692583a:792899
Download PDF

Results

Open a browser using a computer on the internal network and navigate to dailymotion.co.uk. The page will be blocked.

Enter the following CLI command to sniff packets with a destination URL that does not belong to the bandwidth consuming category:

diagnose sniffer packet any 'port 53 and host 194.153.110.160' 4

The resulting output should indicate that the IP (in this example, paris.fr) was allowed by FortiGuard:

interfaces=[any]

filters=[port 53]

2.851628 172.20.121.56.59046 -> 208.91.112.52.53: udp 43

2.916281 208.91.112.52.53 -> 172.20.121.56.59046: udp 436

3.336945 10.1.2.102.51755 -> 208.91.112.53.53: udp 37

3.338611 208.91.112.53.53 -> 10.1.2.102.51755: udp 37

Results

Open a browser using a computer on the internal network and navigate to dailymotion.co.uk. The page will be blocked.

Enter the following CLI command to sniff packets with a destination URL that does not belong to the bandwidth consuming category:

diagnose sniffer packet any 'port 53 and host 194.153.110.160' 4

The resulting output should indicate that the IP (in this example, paris.fr) was allowed by FortiGuard:

interfaces=[any]

filters=[port 53]

2.851628 172.20.121.56.59046 -> 208.91.112.52.53: udp 43

2.916281 208.91.112.52.53 -> 172.20.121.56.59046: udp 436

3.336945 10.1.2.102.51755 -> 208.91.112.53.53: udp 37

3.338611 208.91.112.53.53 -> 10.1.2.102.51755: udp 37