Fortinet black logo

CLI Reference

debug trace tcpdump

debug trace tcpdump

Use this demand to trace packets with tcpdump.

Syntax

diagnose trace tcpdump "<filter_str>" {any | "<interface_str>"} "<max-packet-count_int>" {reset}

Variable Description Default

"<filter_str>"

Specify which protocols and port numbers that you do or do not want to capture, such as 'tcp and port 80 and host IP1 and ( IP2 or IP3 )', or leave this field blank for no filters.
Note that please use the same filter expression as tcpdump for this filter, you can refer to the Linux main page of TCPDUMP (HTTP://www.tcpdump.org/manpages/tcpdump.1.html).

No default

{any | "<interface_str>"}

Select the network interface on which you want to capture packets, such as port1, or any for all interfaces.

any

"<max-packet-count_int>"

Specify the maximum packets you want to capture for the policy. Capture will stop automatically if the total captured packets hit the count.

4000

{reset}

Reset all the settings to default.

No default

Related topics

debug trace tcpdump

Use this demand to trace packets with tcpdump.

Syntax

diagnose trace tcpdump "<filter_str>" {any | "<interface_str>"} "<max-packet-count_int>" {reset}

Variable Description Default

"<filter_str>"

Specify which protocols and port numbers that you do or do not want to capture, such as 'tcp and port 80 and host IP1 and ( IP2 or IP3 )', or leave this field blank for no filters.
Note that please use the same filter expression as tcpdump for this filter, you can refer to the Linux main page of TCPDUMP (HTTP://www.tcpdump.org/manpages/tcpdump.1.html).

No default

{any | "<interface_str>"}

Select the network interface on which you want to capture packets, such as port1, or any for all interfaces.

any

"<max-packet-count_int>"

Specify the maximum packets you want to capture for the policy. Capture will stop automatically if the total captured packets hit the count.

4000

{reset}

Reset all the settings to default.

No default

Related topics