Fortinet black logo

CLI Reference

execute packet-capture-file

execute packet-capture-file

You use this command to manage tcpdump files.

Syntax

execute packet-capture-file {cat <filename>|delete <filename>|list|upload tftp <filename> <ip>}

cat <filename>

Display file contents to the screen.

delete <filename>

Delete the specified file.

list

List all packet capture files.

upload tftp <filename> <ip>

Upload the specified file to the specfied TFTP server.

Example

FortiADC-VM # execute packet-capture-file ?

cat show one file

delete delete one file

list list all files

upload upload

FortiADC-VM # execute packet-capture-file list

-rw-r--r-- 1 0 0 802 Mar 10 14:17 test1.txt

FortiADC-VM # execute packet-capture-file cat test1.txt

14:16:58.073847 IP 1.1.1.2.80 > 172.30.144.100.27361: Flags [R.], seq 3807765751, ack 1748607346, win 2896, options [nop,nop,TS val 836272587 ecr 1224723070], length 0

14:16:58.599663 IP 172.30.144.100.27363 > 1.1.1.2.80: Flags [R.], seq 504059189, ack 4210316583, win 2920, options [nop,nop,TS val 1224738073 ecr 836272140], length 0

14:16:58.599684 IP 172.30.144.100.32792 > 1.1.1.1.80: Flags [R.], seq 802377254, ack 4202724881, win 2920, options [nop,nop,TS val 1224738073 ecr 836272140], length 0

14:17:01.723398 IP 1.1.1.1.80 > 172.30.144.100.32792: Flags [R.], seq 1, ack 0, win 2896, options [nop,nop,TS val 836272952 ecr 1224733072], length 0

14:17:01.723872 IP 1.1.1.2.80 > 172.30.144.100.27363: Flags [R.], seq 1, ack 0, win 2896, options [nop,nop,TS val 836272952 ecr 1224733072], length 0

FortiADC-VM # execute packet-capture-file upload tftp test1.txt 192.168.1.23

execute packet-capture-file

You use this command to manage tcpdump files.

Syntax

execute packet-capture-file {cat <filename>|delete <filename>|list|upload tftp <filename> <ip>}

cat <filename>

Display file contents to the screen.

delete <filename>

Delete the specified file.

list

List all packet capture files.

upload tftp <filename> <ip>

Upload the specified file to the specfied TFTP server.

Example

FortiADC-VM # execute packet-capture-file ?

cat show one file

delete delete one file

list list all files

upload upload

FortiADC-VM # execute packet-capture-file list

-rw-r--r-- 1 0 0 802 Mar 10 14:17 test1.txt

FortiADC-VM # execute packet-capture-file cat test1.txt

14:16:58.073847 IP 1.1.1.2.80 > 172.30.144.100.27361: Flags [R.], seq 3807765751, ack 1748607346, win 2896, options [nop,nop,TS val 836272587 ecr 1224723070], length 0

14:16:58.599663 IP 172.30.144.100.27363 > 1.1.1.2.80: Flags [R.], seq 504059189, ack 4210316583, win 2920, options [nop,nop,TS val 1224738073 ecr 836272140], length 0

14:16:58.599684 IP 172.30.144.100.32792 > 1.1.1.1.80: Flags [R.], seq 802377254, ack 4202724881, win 2920, options [nop,nop,TS val 1224738073 ecr 836272140], length 0

14:17:01.723398 IP 1.1.1.1.80 > 172.30.144.100.32792: Flags [R.], seq 1, ack 0, win 2896, options [nop,nop,TS val 836272952 ecr 1224733072], length 0

14:17:01.723872 IP 1.1.1.2.80 > 172.30.144.100.27363: Flags [R.], seq 1, ack 0, win 2896, options [nop,nop,TS val 836272952 ecr 1224733072], length 0

FortiADC-VM # execute packet-capture-file upload tftp test1.txt 192.168.1.23