81 Troubleshooting FortiGate
81 Troubleshooting FortiGate
81 Troubleshooting FortiGate
o Troubleshooting is being able to analyze the problem, determine the cause of the error.
o Troubleshooting is basically implementing a plan of action and resolve the network issue.
o Troubleshooting is combined measures & processes used to diagnose & solve problems.
o Troubleshooting is logical process that network engineers use to resolve network problems.
o Troubleshooting is logical process that network engineers use improve network operations.
o Troubleshooting is basically iterative process, the more data you collect, gather and analyze.
o More data collect and analyze the higher the likelihood of developing a correct hypothesis.
o It is systematic process aims to resolve problems and restore normal network operations.
o The Process of detection, minimization and resolving the faults that arise in the network.
Problem Isolation:
Determining at what layer of the OSI model & on what devices and links the problem may exist.
Documentation:
It is critical to document the processes you use and the information you find; it can not only
help you in the current process but can become critical for those that troubleshoot after you.
Resolve:
Find the root cause of the problem after your problem isolation process, you document what
has happened, and then you fix the root cause of the problem; fixing the problem is what is
meant by resolving the problem.
Escalate:
Should you not be able to fix the issue, there should be a written escalation process in your
organization; this might involve even communicating to a third party that your company
partners to fix the issue.
Bottom-Up Approach.
o Start at the bottom of the OSI model (Physical Layer) and we will work our way up.
o Start with physical layer; check the cables and connectors, move up to data link layer.
o Check Ethernet is working, Spanning-tree is working ok, port security is not causing issue.
o Check VLANs are configured properly and then move onto the network layer of OSI Model.
o At Network Layer (Layer 3) check IP addresses, access-lists, routing protocols and so on.
o This Bottom-Up Approach method is very thoroughgoing but also time-consuming.
o This Bottom-Up Approach method is very good for new troubleshooter Engineer.
o Because in this approach you will eliminate all the possible causes for problems.
<interface_name> The name of the interface to sniff, such as port1 or internal. This can also
be any to sniff all interfaces.
<‘filter’> What to look for in the information the sniffer reads. none indicates no
filtering, and all packets are displayed as the other arguments indicate.
The filter must be inside single quotes (‘).
<verbose> The level of verbosity as one of:
1 - print header of packets
2 - print header and data from IP of packets
3 - print header and data from Ethernet of packets
4 - print header of packets with interface name
<count> The number of packets the sniffer reads before stopping. If you don't put
a number here, the sniffer will run until you stop it with <CTRL+C>.
<tsformat> The timestamp formats.
a: absolute UTC time, yyyy-mm-dd hh:mm:ss.ms
l: absolute LOCAL time, yyyy-mm-dd hh:mm:ss.ms
otherwise: relative to the start of sniffing, ss.ms
Commands Description
get sys status Check the system status
get system performance status Check the hardware performance
get system performance top Check the hardware performance
get hardware memory Displays information about memory
diag sys session full-stat Check the session table of the firewall
diag sys session list Check the session table of the firewall
get system session status Displays total number of sessions
get system interface physical Check the interface settings
diagnose hardware deviceinfo nic internal Check the interface settings
get system arp Check the ARP Table
execute clear system arp table Clear ARP Table Entries
get router info routing-table all Check the Routing Table
get router info routing-table details Check the matching route
192.168.2.0
diag vpn tunnel up phase2-name phase1- Change the tunnel state
name
diag vpn tunnel down phase2-name phase1-
name
diagnose vpn tunnel list name myphase1 Check the tunnel state
diag vpn tunnel dumpsa
diagnose vpn tunnel stat
diagnose vpn ipsec status Check packet counters for the tunnel
diag vpn tunnel list
diagnose sniffer packet Tshoot Diagnose Commands
diagnose sniffer packet any
diagnose sniffer packet any none
show full-configuration Check Full Commands List
execute reboot Reboot Forigate Firewall
get router info routing-table all Display Routing Table details
diagnose firewall proute list
execute ping Send Ping packets
show system dns Displays configured DNS servers
Configure Hostname
config system global
set hostname FG-FW
end
Configure Interface
config system interface
edit port2
set allowaccess ping
set ip 192.168.1.100/24
set alias LAN
Configure DNS
config system dns
set primary 8.8.8.8
set secondary 1.1.1.1
end
Configure Route
config router static
edit 1
set dst 0.0.0.0/0
set gateway 192.168.114.2
set distance 10
set device port1
end
Configure Packet Capture
config firewall policy
edit 1
set capture-packet enable
end