Fortinet:是否有任何等效的ASA的数据包跟踪命令?

我想知道是否没有Fortigates相当于我们可以在ASA上find的packet-tracer命令。

这是一个不知道它的人的执行的例子:

NAT和通行证:

lev5505# packet-tracer input inside tcp 192.168.3.20 9876 8.8.8.8 80 Phase: 1 Type: ACCESS-LIST Subtype: Result: ALLOW Config: Implicit Rule Additional Information: MAC Access list Phase: 2 Type: ROUTE-LOOKUP Subtype: input Result: ALLOW Config: Additional Information: in 0.0.0.0 0.0.0.0 outside Phase: 3 Type: ACCESS-LIST Subtype: log Result: ALLOW Config: access-group inside-in in interface inside access-list inside-in extended permit tcp any any eq www access-list inside-in remark Allows DNS Additional Information: Phase: 4 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 5 Type: VPN Subtype: ipsec-tunnel-flow Result: ALLOW Config: Additional Information: Phase: 6 Type: NAT Subtype: Result: ALLOW Config: object network inside-network nat (inside,outside) dynamic interface Additional Information: Dynamic translate 192.168.3.20/9876 to 81.56.15.183/9876 Phase: 7 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 8 Type: FLOW-CREATION Subtype: Result: ALLOW Config: Additional Information: New flow created with id 94755, packet dispatched to next module Result: input-interface: inside input-status: up input-line-status: up output-interface: outside output-status: up output-line-status: up Action: allow 

被ACL阻止:

 lev5505# packet-tracer input inside tcp 192.168.3.20 9876 8.8.8.8 81 Phase: 1 Type: ROUTE-LOOKUP Subtype: input Result: ALLOW Config: Additional Information: in 0.0.0.0 0.0.0.0 outside Phase: 2 Type: ACCESS-LIST Subtype: Result: DROP Config: Implicit Rule Additional Information: Result: input-interface: inside input-status: up input-line-status: up output-interface: outside output-status: up output-line-status: up Action: drop Drop-reason: (acl-drop) Flow is denied by configured rule 

Fortigates上有没有相同的东西?

在Fortigate上,你实际上没有能力生成虚拟包,就像在你的思科ASA上一样。 但最接近的实用程序将是“诊断debuggingstream程”命令。 不同的是,fortigate需要真正的stream量穿越防火墙。

以下是您需要执行的完整命令:

 diagnose debug reset diagnose debug flow filter addr <source OR destination IP address> diagnose debug flow show console enable diagnose debug flow show function enable diagnose debug flow trace start <number of entries you want to view. eg 100> diagnose debug enable 

我相信在Fortinet设备上最接近的东西就是嗅探器工具(可以通过诊断嗅探器进行访问?)我忘记了这一点之后的确切选项,但它应该是你正在寻找的东西。