Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam NSE7_NST-7.2 Topic 1 Question 1 Discussion

Actual exam question for Fortinet's NSE7_NST-7.2 exam
Question #: 1
Topic #: 1
[All NSE7_NST-7.2 Questions]

Refer to the exhibit. which contains the output of diagnose vpn tunnel list.

Which command will capture ESP traffic for the VPN named DialUp_0?

Show Suggested Answer Hide Answer
Suggested Answer: C

Capturing ESP Traffic:

ESP (Encapsulating Security Payload) traffic is associated with IPsec and is identified by the protocol number 50. To capture ESP traffic, you need to filter packets based on this protocol.

In this specific case, you also need to filter for the host associated with the VPN tunnel, which is 10.200.3.2 as indicated in the exhibit.

Sniffer Command:

The correct command to capture ESP traffic for the VPN named DialUp_0 is:

diagnose sniffer packet any 'esp and host 10.200.3.2'

This command ensures that only ESP packets to and from the specified host are captured, providing a focused and relevant data set for troubleshooting.


Fortinet Documentation: Verifying IPsec VPN Tunnels (Fortinet Docs) (Welcome to the Fortinet Community!).

Fortinet Community: Troubleshooting IPsec VPN Tunnels (Welcome to the Fortinet Community!) (Fortinet Docs).

Contribute your Thoughts:

Reita
2 months ago
Option B, for sure. It's the simple and straightforward way to capture the ESP traffic.
upvoted 0 times
Gracia
2 months ago
User 3: I'll go with option B as well. It seems like the right command to capture ESP traffic.
upvoted 0 times
...
Pearly
2 months ago
User 2: Yeah, I agree. It's the most straightforward option.
upvoted 0 times
...
Leonor
2 months ago
User 1: I think option B is the best choice.
upvoted 0 times
...
...
Sueann
3 months ago
Hold up, is that a typo in option C? 10*200.3.2? Looks like someone's been playing around with their calculator!
upvoted 0 times
Lawrence
1 months ago
User 3: Definitely a typo, they probably meant to put a period instead of an asterisk.
upvoted 0 times
...
Fidelia
1 months ago
User 2: I think so too, it should be '10.200.3.2' instead of '10*200.3.2'.
upvoted 0 times
...
Stephaine
2 months ago
User 1: Yeah, that does look like a typo in option C.
upvoted 0 times
...
...
Verdell
3 months ago
Hmm, this is tricky. I'll have to go with D. Capturing traffic on port 4500 should do the trick.
upvoted 0 times
...
Galen
3 months ago
I'm going with C. The command 'esp and host 10*200.3.2' seems to target the specific VPN tunnel.
upvoted 0 times
...
Devora
3 months ago
Option B looks good. 'ip proto 50' should capture the ESP traffic for the VPN.
upvoted 0 times
Melina
2 months ago
User 2: Yeah, 'ip proto 50' should capture the ESP traffic for the VPN.
upvoted 0 times
...
Derick
2 months ago
User 1: I think option B is the correct one.
upvoted 0 times
...
Rozella
2 months ago
User 2: Yeah, 'ip proto 50' should capture the ESP traffic for the VPN.
upvoted 0 times
...
Amber
2 months ago
C) diagnose sniffer packet any 'esp and host 10*200.3.2'
upvoted 0 times
...
Tambra
2 months ago
B) diagnose sniffer packet any 'ip proto 50'
upvoted 0 times
...
Vonda
2 months ago
User 1: I think option B is the correct one.
upvoted 0 times
...
Marlon
3 months ago
A) diagnose sniffer packet any 'host 10.0.10.10'
upvoted 0 times
...
...
Dorothy
3 months ago
I disagree, I believe the correct answer is C) diagnose sniffer packet any 'esp and host 10*200.3.2'.
upvoted 0 times
...
Hyman
3 months ago
I think the answer is A) diagnose sniffer packet any 'host 10.0.10.10'.
upvoted 0 times
...

Save Cancel