Troubleshooting Tip - Using The FortiGate Sniffer On VLAN Interfaces
Troubleshooting Tip - Using The FortiGate Sniffer On VLAN Interfaces
externalId=FD31323&sliceId=1
Products
Description
This article describes how to use the FortiGate sniffer on VLAN interfaces.
The following example is based on a FortiGate with 2 VLANs attached to the interface wan1, as well as an IP address on the
physical interface itself.
Solution
In order to see the tagging information in the sniffer trace, there must be no packet filter in the sniffer command.
1.1 Capturing all tagged and non-tagged packets on wan1, low verbosity
1 of 2 8/20/2018, 9:30 AM
http://kb.fortinet.com/kb/viewContent.do?externalId=FD31323&sliceId=1
The arp packets are sent on the physical interface level on the configured subnet (10.140.0.x), and untagged (no 802.1Q
mentioned).
Some tagged frames are received or sent on the VLAN interfaces VLAN18 and VLAN224, these are the lines with the
802.1Q information.
1.2 Capturing all tagged and non-tagged packets on wan1 , high verbosity (full packet content)
In order to see the full content of all packets on wan1 (tagged and non-tagged), the following command can be used :
The arp packets are still sent on the physical interface level on the configured subnet (10.140.0.x), and untagged (no
802.1Q mentioned). Ethertype is 0x0806.
The tagged frames are now showing the 802.1Q field : 8100 0012 or 8100 00e0, where 0012 and 00e0 are the VLAN
numbers in HEX (18 and 224).
To capture the traffic on a specific VLAN interface, use the same sniffer command as for physical interfaces, knowing that the
VLAN tag information is not displayed whether or not using a packet filter.
Related Articles
2 of 2 8/20/2018, 9:30 AM