If you are doing a quick search for traffic flow into the firewall, run this command in CLI
tcpdump filter "host x.x.x.x and port 443"
you can use either the word host or src and get the same result. To view the output of the capture in CLI, type
view-pcap mgmt-pcap mgmt.pcap
then press the tab key for auto fill. The final command may look more like
view-pcap mgmt-pcap mgmt.pcap mgmt.pcap
It will print the output of the capture in the CLI window.
If doing a troubleshooting session and need a more in-depth capture. Read this how-to Getting Started: Packet Capture blog and follow the instructions. After successfully capturing the pcap files, you can view them in CLI by using this command
view-pcap filter-pcap <name of the filtered pcap>
For example: if your pcap capture file name was test. The command should read
view-pcap filter-pcap test
Hope you found this helpful