
Troubleshooting
Page 137
FortiRecorder 2.4.2 Administration Guide
Packet capture
Packet capture, also known as sniffing, packet trace, or packet analysis, records some or all of
the packets seen by a network interface (that is, the network interface is used in promiscuous
mode). By recording packets, you can trace TCP connection states and HTTP request
transactions to the exact point at which they fail, which may help you to diagnose some types of
problems that are otherwise difficult to detect, such as malformed packets, differentiated
services misconfiguration, or non-RFC protocol incompatibilities.
FortiRecorder appliances have a built-in sniffer. Packet capture on FortiRecorder appliances is
similar to that of FortiGate appliances. To use the built-in sniffer, connect to the CLI and enter
the following command:
diagnose sniffer packet [{any | <interface_name>}
[{none | '<filter_str>'} [{1 | 2 | 3 | 4 | 5 | 6} [<packets_int>
[{a | <any_str>}]]]]]
where:
•
<interface_name>
is either the name of a network interface, such as
port1
, or enter
any
for all interfaces. If you omit this and the following parameters for the command, the
command captures all packets on all network interfaces.
•
'<filter_str>'
is the sniffer filter that specifies which protocols and port numbers that
you do or do not want to capture, such as
'tcp port 80'
, or enter
none
for no filters.
•
<packets_int>
is the number of packets the sniffer reads before stopping. Packet
capture output is printed to your CLI display until you stop it by pressing Ctrl+C, or until it
reaches the number of packets that you have specified to capture.
•
{a | <any_str>}
is either
a
(to include an absolute, full UTC timestamp in the format
yyyy-mm-dd hh:mm:ss.ms), or any other text (to include a timestamp that is the amount of
time since he start of the packet capture, in the format ss.ms)
•
{1 | 2 | 3 | 4 | 5 | 6}
is an integer indicating whether to display the network
interface names, packet headers, and/or payloads for each packet that the network interface
sends, receives, or sees:
•
1
— Display the packet capture timestamp, plus basic fields of the IP header: the source
IP address, the destination IP address, protocol name, and destination port number.
Does
not
display all fields of the IP header; it omits:
• IP version number bits
• Internet header length (
ihl
)
• type of service/differentiated services code point (
tos
)
• explicit congestion notification
• total packet or fragment length
• packet ID
• IP header checksum
• time to live (
TTL
)
• IP flag
Packet capture can be very resource intensive. To minimize the performance impact on your
FortiRecorder appliance, use packet capture only during periods of minimal traffic, with a local
console CLI connection rather than a Telnet or SSH CLI connection, and be sure to stop the
command when you are finished.
Содержание FortiRecorder 400D
Страница 1: ...FortiRecorder 2 4 2 Administration Guide...
Страница 35: ...NVR configuration Page 35 FortiRecorder 2 4 2 Administration Guide...
Страница 168: ...Index Page 168 FortiRecorder 2 4 2 Administration Guide X X 509 100 105...
Страница 169: ......