

To get this working, you have to transform the output of diag sniffer packet to match the hexdump format. But it is much simpler to analyse the the output with Wireshark. You got all the information in hexadecimal.

If you want to analyse the content of the packets, it becomes quite difficult. You can see the incoming and the outgoing interface of the packets and the direction. If you just want to verify, if a packet passes the FortiGate, then simply use this command: diag sniffer packet any '' 4 On FortiGate firewalls you got the command: diag sniffer packet ''
