Packet sniffing integrated switch fabric (ISF) interfaces
From the management board CLI after editing any VDOM, you can use the following command to sniff traffic on FortiGate 6000F ISF interfaces:
diagnose span-sniffer packet <interface> <filter> <verbose> <count> <timestamp> <frame-size>
Where:
<interface>
the name of one ISF interface on which to sniff for packets. The interface can be dp
for the ISF interface connected to the DP processor or sw:port1
, sw:port2
, sw:port3
, ..., sw:port28
for the ISF interfaces connected to traffic interfaces. You must specify an interface name. any
does not work.
<filter>
a filter to select the types of packets for which to view traffic. This can be simple, such as entering udp
to view UDP traffic or complex to specify a protocol, port, and source and destination interface and so on.
<verbose>
the amount of detail in the output, and can be:
- display packet headers only.
- display packet headers and IP data.
- display packet headers and Ethernet data (if available).
- display packet headers and interface names.
- display packet headers, IP data, and interface names.
- display packet headers, Ethernet data (if available), and interface names.
<count>
the number of packets to view. You can enter Ctrl-C to stop the sniffer before the count is reached. If you don't include a count packets are displayed continuously until you press Ctrl-C.
<timestamp>
the timestamp format, a
for UTC time, l
for local time, and otherwise to display the time relative to entering the command in the format ss.ms.
<frame-size>
the frame size that is printed before truncation. Defaults to the interface MTU.