Testing the installation
Troubleshooting tools
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
Revision 2
167
•
5
When you have captured all packets that you want to analyze, press Ctrl + C to stop
the capture.
6
Go to
Transfer > Capture Text > Stop
to stop and save the file.
7
Convert this plain text file to a format recognizable by your network protocol analyzer
application.
You can convert the plain text file to a format (.pcap) recognizable by Wireshark
(formerly called Ethereal) using the fgt2eth.pl Perl script. To download fgt2eth.pl, see
the Fortinet Knowledge Center article
Using the FortiOS built-in packet sniffer
To use fgt2eth.pl on Windows XP, go to
Start > Run
and enter
cmd
to open a DOS
prompt, then enter a command such as the following:
fgt2eth.pl -in fortimail_sniff.txt -out fortimail_sniff.pcap
where:
•
fgt2eth.pl
is the name of the conversion script; include the path relative to the
current directory, which is indicated by the command prompt
•
FortiMail_sniff.txt
is the name of the packet capture’s output file; include the
directory path relative to your current directory
•
FortiMail_sniff.pcap
is the name of the conversion script’s output file; include
the directory path relative to your current directory where you want the converted
output to be saved
Figure 57: Converting sniffer output to .pcap format
8
Open the converted file in your network protocol analyzer application. For further
instructions, see the documentation for that application.
Note:
The fgt2eth.pl script is provided as-is, without any implied warranty or technical
support, and requires that you first install a Perl module compatible with your operating
system, such as ActivePerl (
Summary of Contents for FortiMail-100
Page 1: ...FortiMail Secure Messaging Platform Version 4 0 Patch 1 Install Guide...
Page 173: ...www fortinet com...
Page 174: ...www fortinet com...