Description | This article describes how to apply the filter on FortiProxy or FortiGate to perform wad debug on a range of source or/and destination IP addresses. |
Scope | FortiProxy, FortiGate. |
Solution |
It is possible to perform wad debug for IP ranges by defining 2 IP addresses (starting from the lowest IP in the range and ending with the highest IP on the range to debug).
Example:
CLI:
lab # diagnose wad filter src 10.1.0.1 10.1.0.30 lab # diagnose wad filter list
CLI:
lab # diagnose wad filter dst 192.1.1.1 192.1.1.5 lab # diagnose wad filter list
Example: Source address range: 10.1.0.1 - 10.1.0.30.
CLI:
lab # diagnose wad filter src 10.1.0.1 10.1.0.30
To clear all WAD filters:
lab # diagnose wad filter clear |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.