![]() ![]() Start the debug trace for IPv6 traffic, with optional number to limit number of packets traced. Show function names responsible for each step in processing.Īctually start the debug with optional number to limit number of packets traced.ĭiagnose debug flow trace start6 ![]() The rest of matching and conditions remain of the same syntax.ĭiagnose debug flow show function-name enable Same as diagnose debug filter but for IPv6 packets. Port - Source or/and destination port in the packet(s).ĭport - Destination port of the packet(s). Saddr - IP source address of the packet(s).ĭaddr - IP destination address of the packet(s). Fortigate translates the name to VDOM ID ( vd).Īddr - IP address of the packet(s), be it a destination or/and a source. Vd-name - limit debug to specific VDOM by its name. When entering the vdom with edit vdom, this number is shown first. You can set multiple filters - act as AND, by issuing this command multiple times. Set filter for security rulebase processing packets output. Remove any filtering of the debug output setĭiagnose debug flow filter / dia debug flow filter6 Show the active filter for the flow debug Policy lookup for any combination of IPs and ports - use to see what policy (ifĪny) matches traffic between specific IP addresses and ports. Security rulebase diagnostics with diagnose debug flow Command
0 Comments
Leave a Reply. |