Fortinet black logo

CLI Reference

config firewall on-demand-sniffer

config firewall on-demand-sniffer

Configure on-demand packet sniffer.

config firewall on-demand-sniffer
    Description: Configure on-demand packet sniffer.
    edit <name>
        set advanced-filter {var-string}
        set hosts <host1>, <host2>, ...
        set interface {string}
        set max-packet-count {integer}
        set non-ip-packet [enable|disable]
        set ports <port1>, <port2>, ...
        set protocols <protocol1>, <protocol2>, ...
    next
end

config firewall on-demand-sniffer

Parameter

Description

Type

Size

Default

advanced-filter

Advanced freeform filter that will be used over existing filter settings if set. Can only be used by super admin.

var-string

Maximum length: 255

hosts <host>

IPv4 or IPv6 hosts to filter in this traffic sniffer.

IPv4 or IPv6 host.

string

Maximum length: 255

interface

Interface name that on-demand packet sniffer will take place.

string

Maximum length: 35

max-packet-count

Maximum number of packets to capture per on-demand packet sniffer.

integer

Minimum value: 1 Maximum value: 20000 **

0

name

On-demand packet sniffer name.

string

Maximum length: 35

non-ip-packet

Include non-IP packets.

option

-

disable

Option

Description

enable

Enable non-IP packets to be included capture.

disable

Disable non-IP packets to be included in capture.

ports <port>

Ports to filter for in this traffic sniffer.

Port to filter in this traffic sniffer.

integer

Minimum value: 1 Maximum value: 65536

protocols <protocol>

Protocols to filter in this traffic sniffer.

Integer value for the protocol type as defined by IANA (0 - 255).

integer

Minimum value: 0 Maximum value: 255

** Values may differ between models.

config firewall on-demand-sniffer

config firewall on-demand-sniffer

Configure on-demand packet sniffer.

config firewall on-demand-sniffer
    Description: Configure on-demand packet sniffer.
    edit <name>
        set advanced-filter {var-string}
        set hosts <host1>, <host2>, ...
        set interface {string}
        set max-packet-count {integer}
        set non-ip-packet [enable|disable]
        set ports <port1>, <port2>, ...
        set protocols <protocol1>, <protocol2>, ...
    next
end

config firewall on-demand-sniffer

Parameter

Description

Type

Size

Default

advanced-filter

Advanced freeform filter that will be used over existing filter settings if set. Can only be used by super admin.

var-string

Maximum length: 255

hosts <host>

IPv4 or IPv6 hosts to filter in this traffic sniffer.

IPv4 or IPv6 host.

string

Maximum length: 255

interface

Interface name that on-demand packet sniffer will take place.

string

Maximum length: 35

max-packet-count

Maximum number of packets to capture per on-demand packet sniffer.

integer

Minimum value: 1 Maximum value: 20000 **

0

name

On-demand packet sniffer name.

string

Maximum length: 35

non-ip-packet

Include non-IP packets.

option

-

disable

Option

Description

enable

Enable non-IP packets to be included capture.

disable

Disable non-IP packets to be included in capture.

ports <port>

Ports to filter for in this traffic sniffer.

Port to filter in this traffic sniffer.

integer

Minimum value: 1 Maximum value: 65536

protocols <protocol>

Protocols to filter in this traffic sniffer.

Integer value for the protocol type as defined by IANA (0 - 255).

integer

Minimum value: 0 Maximum value: 255

** Values may differ between models.