Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

From the fortinet page

Also attached is the fgt2eth.pl script that will convert a verbose level 3 or 6 sniffer output, into a file readable and decodable by Ethereal/Wireshark.

Also:

Verbose levels in detail: 1: print header of packets 2: print header and data from IP of packets 3: print header and data from Ethernet of packets 4: print header of packets with interface name 5: print header and data from IP of packets with interface name 6: print header and data from Ethernet of packets with interface name

And looking at the text dump, I only see the data from the IP layer up and no interface names, so I suspect 'level 2' was used dunring capturing. If you change your capture level, you will be able to convert the traces with fgt2eth.pl

From the fortinet page

Also attached is the fgt2eth.pl script that will convert a verbose level 3 or 6 sniffer output, into a file readable and decodable by Ethereal/Wireshark.

Also:

Verbose levels in detail:
 1: print header of packets
 2: print header and data from IP of packets
 3: print header and data from Ethernet of packets
 4: print header of packets with interface name
 5: print header and data from IP of packets with interface name
 6: print header and data from Ethernet of packets with interface name

name

And looking at the text dump, I only see the data from the IP layer up and no interface names, so I suspect 'level 2' was used dunring capturing. If you change your capture level, you will be able to convert the traces with fgt2eth.pl