Network Management
This chapter includes configuration procedures and examples for network management. 
Network Interfaces
Gaia supports these network interface types: 
- Ethernet physical interfaces. 
 - Alias (Secondary IP addresses for different interface types).
 - VLAN
 - Bond
 - Bridge
 - Loopback 
 - 6in4 tunnel
 - PPPoE
 
 
  
 | 
Note - When you add, delete or make changes to interface IP addresses, it is possible that when you use the  option in SmartDashboard, the incorrect topology is shown. If this occurs, run cpstop and then  cpstart in expert mode. 
 | 
 
 
Interface Link Status
You can see the status of physical and logical interfaces by using the WebUI or the CLI. 
To see interface status using the WebUI: 
- In the navigation tree, select  > .
  
 - Double-click an interface to see its parameters.
  
Link Status 
 | 
Description 
 | 
 
Grey (Down) 
  
 | 
The physical interface is disabled (Down). 
 | 
 
Red (no Link) 
  
 | 
The physical interface is enabled (up), but Gaia cannot find a network connection. 
 | 
 
Green (Up) 
  
 | 
The physical interface is enabled (up) and connected to the network. 
 | 
 
 
To see interface status using the CLI, run show interfaces all 
Physical Interfaces
This section has configuration procedures and examples for defining different types of interfaces on a Gaia platform.  
Gaia automatically identifies physical interfaces (NICs) installed on the computer. You cannot add or delete a physical interface using the WebUI or the CLI. You cannot add, change or remove physical interface cards while the Gaia computer is running.  
To add or remove an interface card: 
- Turn off the computer.
 - Add, remove or replace the interface cards.
 - Start the computer. 
 
 Gaia automatically identifies the new or changed physical interfaces and assigns an interface name. The physical interfaces show in the list in the WebUI. 
Configuring Physical Interfaces - WebUI
This section includes procedures for changing physical interface parameters using the WebUI. 
To configure a physical interface: 
- In the navigation tree, select  > .
 - Select an interface from the list and click .
 - Select the option to set the interface status to UP.
 - On the tab:
- Select  to get the IP address from the DHCP server.
Or 
 - Enter the IP address and subnet mask in the applicable fields. 
 
  - On the tab:
- Select  to get the IP address from the DHCP server.
Or 
 - Enter the IP address and mask length in the applicable fields. 
 
  - On the tab configure the link speed and duplex setting:
- Select  to automatically configure the link speed and duplex setting.
Or 
 - Select a link speed and duplex setting from the list.
 
  - Enter the hardware MAC address (if not automatically received from the NIC).
Caution: Do not manually change the MAC address unless you are sure that it is incorrect or has changed. An incorrect MAC address can lead to a communication failure. 
 - Enter a different Maximum Transmission Unit (MTU) value (minimum value=68 - default=1500).
  
Configuring Physical Interfaces - CLI (interface)
 | 
 | 
 | 
 | 
 
Description 
 | 
Configure physical interfaces 
 | 
 
Syntax 
 | 
set interface <IF>  
   ipv4-address <IP>        mask-length <Mask> 
       subnet-mask <Mask> 
   ipv6-address <IP> mask-length <Mask> 
   ipv6-autoconfig <on | off> 
   comments <Text> 
   mac-addr <MAC> 
   mtu <MTU setting> 
   state <on | off> 
   link-speed <Speed_Duplex> 
   auto-negotiation <on | off> 
  
show interfaces all 
 | 
 
Parameters 
 | 
interface 
 | 
Configures a physical or virtual interface 
 | 
 
ipv4-address
 ipv6-address 
 | 
Assigns the IPv4 or IPv6 address 
 | 
 
ipv6-autoconfig 
 | 
If on, automatically gets the IPv6 address from the DHCP 
 | 
 
mask-length 
 | 
Configures IPv4 or IPv6 subnet mask length using CIDR ( /xx) notation 
 | 
 
subnet-mask 
 | 
Configures IPv4 subnet mask using dotted decimal notation 
 | 
 
comments 
 | 
Adds free text comments to an interface definition 
 | 
 
mac-addr 
 | 
Configures the interface hardware MAC address 
 | 
 
mtu 
 | 
Configure the Maximum Transmission Unit size for an interface 
 | 
 
state 
 | 
Sets interfaces status to on (enabled) or off (disabled). 
 | 
 
link-speed 
 | 
Configures the interface link speed and duplex status 
 | 
 
auto-
 negotiation 
 | 
Configures automatic negotiation of interface link speed and duplex settings - on (enabled) or off (disabled) 
 | 
 
 
 | 
  
 | 
 
Parameter Values 
 | 
<IP> 
 | 
IPv4 or IPv6 address 
 | 
 
<IF> 
 | 
Interface name 
 | 
 
<Mask> 
 | 
Interface net mask in dotted decimal or CIDR (/xx) notation as applicable 
 | 
 
<MAC> 
 | 
Manually enter the applicable hardware address 
 | 
 
<MTU Setting> 
 | 
Integer greater or equal to 68 (Default = 1500) 
 | 
 
<Speed_Duplex> 
 | 
Enter the link speed in Mbps and duplex status using one of these values: 
10M/half
 10M/full
 100M/half
 100M/full
 1000M/full
 10000M/full 
 | 
 
 
 | 
  
 | 
 
Examples 
 | 
set interface eth2 ipv4-address 40.40.40.1 subnet-mask 255.255.255.0 
  
set interface eth2 mtu 1500 set interface eth2 state on 
set interface eth2 link-speed 1000M/full 
 | 
 
Comments 
 | 
There are some command options and parameters that you cannot do using the WebUI. 
 | 
 
  
 | 
Important - After using CLI commands to add, configure or delete features, you must run the save config command. This makes sure that the new configuration settings remain after reboot. 
 | 
 
 
Aliases
Interface aliases let you assign more than one IPv4 address to physical or virtual interfaces (bonds, bridges, VLANS and loopbacks). This section shows you how to configure an alias using the WebUI and the CLI. 
Configuration using the WebUI
To configure an interface alias using the WebUI: 
- In the navigation tree, select  > .
 - Click  > . To change an existing alias interface, select an interface and then click .
 - In the (or ) window, select to set the alias interface status to UP.
 - On the tab, enter the IPv4 address and subnet mask.
 - On the tab, select the interface to which this alias is assigned. 
 You cannot change the interface for an existing alias definition. 
 The new alias interface name is automatically created by adding a sequence number to the interface name. For example, the name of first alias added to eth1 is . She second alias added is , and so on.  
To delete an interface alias: 
- In the navigation tree, select  > . 
 - Select an interface alias and click .
 - When the confirmation message shows, click 
  
Configuring Aliases - CLI (interface)
 | 
 | 
 | 
 | 
 
Description 
 | 
Configure an alias to a physical interface. 
 | 
 
Syntax 
 | 
add interface <IF> alias <IP>/<Mask> 
delete interface <IF> alias <Alias IF> 
 | 
 
Parameter Values 
 | 
<IP> 
 | 
IPv4 address 
 | 
 
<IF> 
 | 
Interface name 
 | 
 
<Mask> 
 | 
IPv4 subnet mask length using CIDR ( /xx) notation 
 | 
 
<Alias IF> 
 | 
Interface alias name in the format <IF>:XX, where XX is the automatically assigned sequence number. 
 | 
 
 
 | 
  
 | 
 
Examples 
 | 
add interface eth1 alias 10.10.99.1/24 
delete interface eth1 alias eth1:2 
 | 
 
Comments 
 | 
A new alias interface name is automatically created by adding a sequence number to the original interface name. For example, the name of first alias added to eth1 is . She second alias added is , and so on. 
 | 
 
  
 | 
Important - After using CLI commands to add, configure or delete features, you must run the save config command. This makes sure that the new configuration settings remain after reboot. 
 | 
 
 
VLAN Interfaces
You can configure virtual LAN (VLAN) interfaces on Ethernet interfaces. VLAN interfaces let you configure subnets with a secure private link to gateways and management servers using your existing topology. With VLAN interfaces, you can multiplex Ethernet traffic into many channels using one cable. 
This section shows you how to configure VLAN interfaces using the WebUI and the CLI. 
Configuring VLAN Interfaces - WebUI
To configure a VLAN interface using the WebUI: 
- In the WebUI navigation tree, select  > .
 - Click  > . To change an existing VLAN interface, select an interface and then click .
 - In the (or )  window, select the option to set the VLAN interface to UP.
 -  and tabs, enter the IP addresses and subnet information as necessary. You can optionally select the  option.
 - On the tab, enter or select a (VLAN tag) between 2 and 4094.
  
 - In the  field, select the physical interface related to this VLAN.
 
 
  
 | 
Note - You cannot change the VLAN ID or physical interface for an existing VLAN interface. To change these parameters, delete the VLAN interface and then create a New VLAN interface. 
 | 
 
 
Configuration Using the CLI
This section is a reference for the VLAN interface commands.   
 | 
 | 
 | 
 | 
 
Description 
 | 
Use these commands to configure bridge interfaces. 
 | 
 
Syntax 
 | 
add interface <IF> vlan <VLAN ID> 
set interface <IF> <VLAN ID> 
   ipv4-address <IP> mask-length <Length>|subnet-mask<Mask> 
   ipv6-address <IP> mask-length <Length> 
   ipv6-autoconfig 
delete interface <IF> vlan <VLAN ID> 
 | 
 
Parameters 
 | 
interface 
 | 
Configure an interface 
 | 
 
ipv4-address 
 | 
Assign an IPv4 address 
 | 
 
ipv6-address 
 | 
Assign an IPv6 address 
 | 
 
ipv6-autoconfig 
 | 
Automatically configure an IPv6 address 
 | 
 
on 
 | 
Enable automatic configuration  
 | 
 
off 
 | 
Disable automatic configuration 
 | 
 
 
 | 
  
 | 
 
Values 
 | 
<IF>  
 | 
Physical interface related to this VLAN 
 | 
 
<VLAN  ID> 
 | 
VLAN identifier (integer range 1-4094) 
 | 
 
<IP>  
 | 
IP address (IPv4 or IPv6) 
 | 
 
<Length> 
 | 
Mask length (integer value) 
 | 
 
 
 | 
  
 | 
 
Example 
 | 
add interface vlan eth1 
  
set interface eth1.99 ipv4-address 99.99.99.1 subnet-mask 255.255.255.0 
  
set interface eth1.99 ipv6-address 209:99:1 mask-length 64  
  
delete interface eth1 vlan 99 
 | 
 
  
 | 
Important - After using CLI commands to add, configure or delete features, you must run the save config command. This makes sure that the new configuration settings remain after reboot. 
 | 
 
 
CLI Procedures
To add a new VLAN interface: 
Run add interface <IF Name> vlan <VLAN ID> 
<IF Name> - Physical interface associated with this VLAN<VLAN ID> - VLAN ID (VLAN tag)
 Example: 
add interface eth1 vlan 10 
To add IP addresses to a VLAN interface: 
Run:
 set interface <IF Name>.<VLAN ID> ipv4-address <IPv4 Address> [ipv6-address <IPv6 Address>]  
<IF Name> - Physical interface associated with this VLAN<VLAN ID> - VLAN ID (VLAN tag)<IPv4 Address> - Interface IPv4 address and the subnet in CIDR notation (xxx.xxx.xxx.xxx/xx)<IPv6-address> - Interface IPv6 address and the prefix (only if you are using IPv6)
 Examples: 
set interface eth1.99 ipv4-address 99.99.99.1 subnet-mask 255.255.255.0 
set interface eth1.99 ipv6-address 209:99:1 mask-length 64  
To delete a VLAN Interface: 
Run:
 delete interface <IF Name> vlan <VLAN ID> 
Example:
 delete interface eth1 vlan 10 
Bond Interfaces (Link Aggregation)
Check Point security devices support , a technology that joins multiple physical interfaces into one virtual interface, known as a . The bond interface gives fault tolerance and increases throughput by sharing the load among many interfaces. Check Point devices support the IEEE 802.3ad Link Aggregation Control Protocol (LCAP) for dynamic link aggregation. 
  
A  (also known as a  or ) is identified by its  (for example: bond1) and is assigned an IP address. The physical interfaces included in the bond are called and do not have IP addresses.  
You can define bond interfaces using one of these functional  strategies: 
- : Gives redundancy when there is an interface or link failure. This strategy also supports switch redundancy. You can configure High Availability to work one of in these modes:
-  - Selects the active slave interface sequentially. 
 -  - If the active slave interface goes down, the connection automatically fails over to the primary slave interface. If the primary slave interface is not available, the connection fails over to a different slave.
 
  - : Slave interfaces are active simultaneously. Traffic is distributed among the slave interfaces to maximize throughput. Load Sharing does not support switch redundancy. You can configure load sharing using one of these modes:
-  - Selects the active slave interface sequentially. 
 -  - Dynamically uses active slaves to share the traffic load using the LACP protocol. This protocol enables full interface monitoring between the gateway and a switch.
 - - Selects the algorithm for slave selection according to the TCP/IP layer.
 
   
Configuring Bond Interfaces - WebUI
To configure a bond interface using the WebUI: 
- Make sure that the slave interfaces do not have IP addresses.
 - On the WebUI  page, click .
 - For a new bond interface, select > . For an existing Bond interface, double-click the bond interface
 - Select the option to activate the bond interface.
 - On the and tabs (optional), enter the IP address information.
 - On the tab, select or enter a name. This parameter is an integer between 1 and 1024.
 - Select slave interfaces from the  list and then click .
 - Select an  ( is the default).
 - On the tab, select a ng option and its frequency in milliseconds:
-  - This sets the frequency of requests sent to the Media Independent Interface (MMI) to confirm that a slave interface is up. The valid range is 1-5000 ms and the default is 100 ms. 
 -  - This defines the frequency of ARP requests sent to confirm that a slave interface is up. ARP requests are sent to as many as five external MAC addresses.
 
   
 - Select the and intervals in milliseconds. This parameter defines the waiting time, in milliseconds, to confirm the slave interface status before taking the specified action.
 - Select the  (for Active/Backup bonds only).
 - Select the  (XOR only). This parameter selects the algorithm for slave selection according to the specified TCP/IP layer.
 - Select the . This parameter sets the LACPDU packet transmission rate.
  
Configuring Bond Interfaces - CLI
When using the CLI, bond interfaces are known as . 
When using the CLI to create a bond interface, do these procedures in order: 
- Create the bond interface.
 - Define the slave interfaces and set them to the UP (on) State.
 - Define the bond operating mode.
 - Define other bond parameters as necessary.
 - Make sure that the bond interface is working correctly.
 
 
  
 | 
Note - Before running the CLI commands, make sure that the slave interfaces do not have an IP Address already assigned. 
 | 
 
 
Link Aggregation - CLI (bonding)
This section is a quick reference for link aggregation commands. The next sections include procedures for different tasks, including explanations of the configuration options.  
 | 
 | 
 | 
 | 
 
Description 
 | 
Use these commands to configure link aggregation. 
 | 
 
Syntax 
 | 
add bonding group <Bond ID> interface <Slave> 
delete bonding group <Bond ID> interface <Slave> 
set bonding group <Bond ID> 
   primary VALUE 
   mii-interval VALUE  
   up-delay VALUE  
   down-delay VALUE  
   arp-polling-interval VALUE  
   mode VALUE 
   lacp-rate VALUE  
   xmit-hash-policy VALUE  
show bonding group <Bond ID> show bonding groups 
 | 
 
Parameters 
 | 
<Bond ID> 
 | 
ID of bond, an integer between 1 and 1024 
 | 
 
<Slave> 
 | 
Slave interface name 
 | 
 
primary  
 | 
Name of primary slave interface 
 | 
 
mii-interval 
 | 
Frequency that the system polls the Media Independent Interface (MII) to get status 
 | 
 
up-delay
 down-delay 
 | 
Waiting time to confirm the slave interface status before taking the specified action (0-5000 ms  default = 200 ms). 
 | 
 
arp-polling-interval 
 | 
Frequency of ARP requests sent to confirm a that slave interface is up 
 | 
 
mode 
 | 
Bond interface operating mode: 
round-robin -  Selects the active slave interface sequentially.active-backup - If the active slave interface goes down, the connection automatically fails over to the primary slave interface. If the primary slave interface is not available, the connection fails over to a different slave.xor - Selects the algorithm for slave selection according to the TCP/IP layer.8023AD - Dynamically uses active slaves to share the traffic load using the LACP protocol. This protocol enables full interface monitoring between the gateway and a switch.
  | 
 
lacp-rate 
 | 
Sets the LACPDU packet transmission rate 
 | 
 
xmit-hash-policy 
 | 
Selects the algorithm for slave selection according to the specified TCP/IP layer 
 | 
 
 
 | 
  
 | 
 
Example 
 | 
set bonding group 666 20 eth2 
show bonding groups 
 | 
 
Output 
 | 
Bonding Interface: 20 
    Bond Configuration 
        xmit_hash_policy Not configured 
        down-delay 200 
        primary Not configured 
        mode round-robin 
        up-delay 200 
        mii-interval 100 
        lacp_rate Not configured 
        arp-polling-interval 0 
        Bond Interfaces 
            eth2 
            eth3 
 | 
 
 
 | 
  
 | 
 
  
 | 
Important - After using CLI commands to add, configure or delete features, you must run the save config command. This makes sure that the new configuration settings remain after reboot. 
 | 
 
 
Creating or Deleting a Bond Interface
To add a new bond interface: 
Run add bonding group <Bond_id>. 
<Bond ID> - Bond name (integer between 1 and 1024) 
Example: 
add bonding group 777 
To delete a bond interface: 
- Make sure that you remove all slave interfaces from the bond.
 - Run 
delete bonding group <bond_id>.
  
 | 
Important - After using CLI commands to add, configure or delete features, you must run the save config command. This makes sure that the new configuration settings remain after reboot. 
 | 
 
 
  
Defining the Bond Operating Mode
You can define bond interfaces using one of these operating modes: 
-  - Selects the active slave interface sequentially.
 -  - If the active slave interface goes down, the connection automatically fails over to the primary slave interface. If the primary slave interfaces is not available, the connection fails over to a different slave.
 -  - Dynamically uses active slaves to share the traffic load using the LACP protocol. This protocol enables full interface monitoring between the gateway and a switch.
 - - Selects the algorithm for slave selection according to the TCP/IP layer.
 
 To define the bond operating mode: 
Run set bonding group <Bond_id> mode <mode>. 
-  - Bond name
 -  - One of these key words:
round-robin (default)active-backupxor8023AD
  
 Example: 
set bonding group 777 mode round-robin 
Defining Slave Interfaces
A bond interface typically contains between two and eight slave interfaces. This section shows how to add and remove a slave interface. The slave interface must not have IP addresses assigned to it. 
To add a slave interface to a bond, run: 
add bonding group <Bond ID> interface <IF Name> 
-  - Bond name
 -  - Slave interface name
 
 Example: 
add bonding group 777 interface eth4 
  
 | 
Note - Do not change the bond state manually. This is done automatically by the bonding driver. 
 | 
 
 
To delete a slave interface from a bond, run: 
delete bonding group <Bond ID> interface <IF Name> 
Example: 
delete bonding group 777 interface eth4 
  
 | 
Note - You must delete all non-primary slave interfaces before you remove the primary slave interface. 
 | 
 
 
Defining the Primary Slave Interface
When using the  operating mode, the system automatically fails over to the primary slave interface, if available. If the primary interface is not available, the system fails over to a different slave interface. By default, the first slave interface that you define is the primary interface. You must define the slave interfaces and set the operating mode as Active/Backup before doing this procedure. 
  
 | 
Note - You must delete all non-primary slave interfaces before you remove the primary slave interface. 
 | 
 
 
To define the primary slave interface, run: 
set bonding group <Bond ID> primary <IF> 
-  - Bond name
 - - Interface name
 
 Example 
set bonding group 777 primary eth4 
Defining the Media Monitoring Interval
This sets the frequency of requests sent to the Media Independent Interface (MMI) to confirm that a slave interface is up. The valid range is 1-5000 ms and the default is 100 ms. 
To configure the MMI, run: 
set bonding group <Bond ID> mii-interval <Interval> 
-  - Bond name
 - - Frequency range (1-5000 ms  default = 100 ms)
 
 Example: 
set bonding group 777 mii-interval 500 
To disable MMI monitoring, run: 
set bonding group <Bond ID> mii-interval 0 
Defining the ARP monitoring interval
This defines the frequency of ARP requests sent to confirm that a slave interface is up. ARP requests are sent to as many as five external MAC addresses. 
To configure the ARP interval, run: 
set bonding group <Bond ID> arp-polling-interval <Interval> 
-  - Bond name
 - - Frequency (1-5000 ms  default = 100 ms)
 
 Example: 
Set bonding group 777 arp-polling-interval 500 
To disable the ARP interval, run: 
set bonding group <Bond ID> arp-polling-interval 0 
Defining the UP and Down Delay Times
This parameter defines the waiting time, in milliseconds, to confirm the slave interface status before taking the specified action. 
To configure the UP and Down delay times, run: 
set bonding group <Bond ID> down-delay <Delay time> 
set bonding group <Bond ID> up-delay <Delay time> 
-  - Bond name
 - - Delay (0-5000 ms  default = 200 ms)
 
 Example: 
set bonding group 777 down-delay 500 
Defining Load Sharing Parameters
When using load sharing modes (XOR or 802.3ad), you can configure these parameters: 
-  - This parameter sets the LACPDU packet transmission rate.
 -  (802.3ad only) - This parameter selects the algorithm for slave selection according to the specified TCP/IP layer.
 
 To set the LACP rate, run 
set bonding group <Bond ID> lacp-rate [slow | fast] 
-  - Bond name
 - - LACPDU packets sent every second
 - - LACPDU packets sent every 30 seconds
 
 Example: 
set bonding group 777 lacp-rate  
To set the Transmit Hash Policy, run: 
set bonding group <Bond ID> xmit-hash-policy <layer> 
-  - Bond name
 - - TCP/IP layer
-  - Uses XOR of the physical interface MAC address
 -  - Uses upper layer protocol information
 
  
 Example: 
set bonding group 777 xmit-hash-policy layer2 
Making Sure that Link Aggregation is Working
To make sure that a link aggregation is working for a specified bond interface, run this command from the expert mode: 
cat /proc/net/bonding/<Bond ID> 
Example with output: 
cat /proc/net/bonding/bond666 
Ethernet Channel Bonding Driver: v3.2.4 (January 28, 2008) 
  
Bonding Mode: fault-tolerance (active-backup) 
Primary Slave: None 
Currently Active Slave: eth2 
MII Status: up 
MII Polling Interval (ms): 100 
Up Delay (ms): 100 
Down Delay (ms): 200 
  
Slave Interface: eth2 
MII Status: up 
Link Failure Count: 2 
Permanent HW addr: 00:50:56:94:11:de 
 | 
 
 
Bridge Interfaces
Check Point security devices support bridge interfaces that implement native, Layer-2 bridging. Configuring an interface as a bridge lets network administrators deploy security devices in an existing topology without reconfiguring the existing IP routing scheme. This is an important advantage for large-scale, complex environments. Gaia does not support Spanning Tree Protocol (STP) bridges. 
You configure Ethernet interfaces (including aggregated interfaces) on your Check Point security device to work like ports on a physical bridge. The interfaces then send traffic using Layer-2 addressing. You can configure some interfaces as bridge interfaces, while other interfaces on the same device work as layer-3 devices. Traffic between bridge interfaces is inspected at Layer-2. Traffic between two Layer-3 interfaces, or between a bridge interface and a Layer-3 interface is inspected at Layer-3. 
This section shows you how to configure bridge interfaces using the WebUI and the CLI. 
Configuring Bridge Interfaces - WebUI
To configure a bridge interface in the WebUI: 
- In the WebUI navigation tree, select .
 - Click  > , or select an interface and click .
The (or ) window opens. 
 - On the tab, enter or select a  ID (unique integer between 1 and 1024).
 - Select the interfaces from the  list and then click .
 - Click the or tabs, and then enter the IP addresses and subnet. 
Or click . 
 - Click .
  
bridging group commands
This is a quick reference for bridge interface commands.  
 | 
 | 
 | 
 | 
 
Description 
 | 
Use these commands to configure bridge interfaces. 
 | 
 
Syntax 
 | 
add bridging group <Group Name> [interface <interface>] 
delete bridging group <Group Name> interface <interface> 
show bridging group <Group Name> 
 | 
 
Values 
 | 
<Group Name> 
 | 
Name of bridging group 
 | 
 
<interface> 
 | 
Interface name 
 | 
 
 
 | 
  
 | 
 
Example 
 | 
add bridging group 56 interface eth1 
 | 
 
  
 | 
Important - After using CLI commands to add, configure or delete features, you must run the save config command. This makes sure that the new configuration settings remain after reboot. 
 | 
 
 
Using the CLI
Bridge interfaces are known as  in Gaia clish commands. You can optionally assign an IPv4 or IPv6 address to a bridge interface. 
To create a new bridge group: 
Run:
 > add bridging group <Group Name> 
<Group Name> - Bridging Group name (unique integer between 0 and 1024) 
To add an interface to the bridge group: 
Run:
 > add bridging group <Group Name> interface <interface>  
<interface> - Physical interface name 
Run this command once for each physical interface included in the bridge interface. 
To delete an interface from the bridge group: 
Run:
 > delete bridging group <Group Name> interface <IF>. 
Run this command once for each physical interface included in the bridge interface. 
To delete a bridge group: 
Run:
 > delete bridging group <Group Name>. 
To add or change a bridge interface IP address: 
- For an IPv4 IP address, run
 > set interface <interface> ipv4-address <IP> subnet-mask <Mask>. - For an IPv6 IP address, run
 > set interface <interface> ipv6-address <IP> mask-length <Prefix>.<interface> - Interface name 
<IP> - IP address - IPv4 or IPv6 as required 
<Mask> - IPv4 subnet mask in dotted decimal format 
<Prefix> - IPv6 prefix length 
Example: 
set interface eth 1 ipv6-address 3000:40::1 mask-length 64 
  
Loopback Interfaces
You can define a virtual loopback interface by assigning an IPv4 or IPv6 address to the lo (local) interface. This can be useful for testing purposes or as a proxy interface for an unnumbered interface. This section shows you how to configure a loopback interface using the WebUI and the CLI. 
Configuring Loopback Interfaces - WebUI
To configure a loopback interface using the WebUI: 
- In the navigation tree, select  > .
 - Click  > . To change an existing loopback interface, select an interface and then click .
 - In the (or )window, select to set the loopback interface status to UP.
 - On the tab, enter the IPv4 address and subnet mask.
 - On the tab, enter the IPv6 address and mask length.
 
 The new loopback interface name is automatically created by adding a sequence number to the string ''. For example, the name of first loopback interface is . She second loopback interface is , and so on.  
To delete an interface alias: 
- In the navigation tree, select  > . 
 - Select an alias interface and click .
 - When the confirmation message shows, click 
  
Configuring Loopback Interfaces - CLI (interface)
Description 
 | 
Configure loopback interfaces 
 | 
 
Syntax 
 | 
add interface lo loopback <IP>/<Mask> 
delete interface lo loopback <IF> 
 | 
 
Parameters and Values 
 | 
loopback 
 | 
Configures a loopback interface. 
 | 
 
lo 
 | 
You must use the lo (local interface) keyword to define a loopback interface. 
 | 
 
<IP> 
 | 
IPv4 or IPv6 address. 
 | 
 
<Mask> 
 | 
IPv4 subnet mask or IPv6 mask length using CIDR ( /xx) notation. 
 | 
 
<IF> 
 | 
Loopback interface name (loopXX) 
 | 
 
 
 | 
  
 | 
 
Examples 
 | 
add interface lo loopback 10.10.99.1/24 
add interface lo loopback 2010:10:99::1/64 
delete interface lo loopback loop01 
 | 
 
Comments 
 | 
When you create a new loopback interface, Gaia automatically assigns a name in the format loopXX, where XX is a sequence number starting from 00. 
 | 
 
 
  
 | 
Important - After using CLI commands to add, configure or delete features, you must run the save config command. This makes sure that the new configuration settings remain after reboot. 
 | 
 
 
VPN Tunnel Interfaces
Virtual Tunnel Interface. A virtual interface that is a member of an existing, Route Based, VPN tunnel.  Each peer Security Gateway has one VTI that connects to the tunnel.  
The VPN tunnel and its properties are defined by the VPN community that contains the two gateways. You must define the VPN community and its member Security Gateways before you can create a VTI. To learn more about Route Based VPN, see Route Based VPN in the R76 VPN Administration Guide. 
The procedure for configuring a VTI includes these steps: 
- Make sure that the VPN Software Blade is enabled and licensed on the applicable Security Gateways.
 - Create and configure the Security Gateways.
 - Define a VPN community in SmartDashboard that includes the two peer Security Gateways.
 - Make Route Based VPN the default option. Do this procedure one time for each Security Management Server.
 - Define the VTI using the WebUI or CLI.
 - Define Route Based VPN Rules.
 - Save the configuration and install the policy.
  
Defining the VPN Community
You must define the VPN Community and add the member Security Gateways to it before you configure a VPN Tunnel Interface. This section includes the basic procedure for defining a Site to Site VPN Community. To learn more about VPN communities and their definition procedures, see the R76 VPN Administration Guide. 
To define a VPN Community for Site to Site VPN: 
- In SmartDashboard, click the VPN Communities tab 
  in the navigation tree.  - Right-click  and select  >  or.
 - In the  window  tab, enter the VPN community name.
 - Select .
This option automatically adds a rule to encrypt all traffic between gateways in a VPN community. 
 - On the  tab, select member gateways from the list.
For star communities, use the  and  tabs to do this. 
 - Configure other community parameters as necessary.
 - Save your configuration to the database.
  
Making Route Based VPN the Default Option
When Domain Based VPN and Route Based VPN are defined for a Security Gateway, Domain Based VPN is active by default. You must do two short procedures to make sure that Route Based VPN is always active.  
The first procedure defines an empty encryption domain group for your peer gateways. You do this step one time for each Security Management Server. The second step is to make Route Based VPN the default option for all Security Gateways. 
To Define an empty group: 
- In the SmartDashboard navigation tree, right-click and then select > . 
 - In the  window, enter a group name in the applicable field.
 Do not add members to this group. 
 To make Route Based VPN the default choice: 
- In SmartDashboard, double-click the applicable Security Gateway.
 - In the window, click .
 - In the section, select and then select the empty group.
 
 Do these steps for each Security Gateway. 
Configuring VPN Tunnel Interfaces
You can configure the VPN Tunnel Interfaces using Gaia WebUI or CLI. 
Configuring VPN Tunnel Interfaces - WebUI
This section shows you how to configure a VPN Tunnel interface using the WebUI. 
To configure a VPN Tunnel Interface: 
- In the Gaia WebUI, select I > .
 - Click >  to create a new interface. 
 Double-click an existing VTI to change its parameters. - In the  window, configure these parameters:
-  - Unique tunnel name (integer from 1 to 99)
 Gaia automatically adds the prefix 'vpnt' to the tunnel name. - - Remote peer name as defined in the VPN community. You must define the two peers in the VPN community before you can define the VTI. The Peer ID is an alpha-numeric character string.
 -  - Select or .
 - - Defines the local peer IPv4 address (numbered VTI only).
 -  - Defines the remote peer IPv4 address (numbered VTI only).
 -  - Local peer interface name (unnumbered VTI only).
 
   
Configuring VPN Tunnel Interfaces - CLI (vpn tunnel)
This section shows the CLI commands used to add or delete VPN Tunnel Interfaces. 
Description 
 | 
Add or delete a VPN Tunnel Interface (VTI) 
 | 
 
Syntax 
 | 
add vpn tunnel <Tunnel ID> 
   type numbered local <Local IP> remote <Remote IP> peer <Peer IP>  
   type unnumbered peer <Peer ID> dev <IF> 
  
delete vpn tunnel <Tunnel ID> 
 | 
 
Parameters 
 | 
type numbered 
 | 
Defines a numbered VTI that uses a specified, static IPv4 addresses for local and remote connections 
 | 
 
type unnumbered 
 | 
Defines an unnumbered VTI that uses the interface and the remote peer name to get addresses 
 | 
 
local 
 | 
Defines the local peer IPv4 address (numbered VTI only) 
 | 
 
remote 
 | 
Defines the remote peer IPv4 address (numbered VTI only) 
 | 
 
peer 
 | 
Remote peer name as defined in the VPN community. You must define the two peers in the VPN community before you can define the VTI. The Peer ID is an alpha-numeric character string. 
 | 
 
dev  
 | 
Defines the interface (unnumbered VTI only) 
 | 
 
 
 | 
  
 | 
 
Parameter Values 
 | 
<Tunnel ID> 
 | 
Unique tunnel name (integer from 1 to 99) Gaia automatically adds the prefix 'vpnt' to the tunnel name 
Example: vnpt10 
 | 
 
<Local IP> 
 | 
Local peer IPv4 address (numbered VTI only) in dotted decimal format 
 | 
 
<remote IP> 
 | 
Remote peer IPv4 address (numbered VTI only) in dotted decimal format 
 | 
 
<Peer ID> 
 | 
Remote peer name as defined in the VPN community. You must define the two peers in the VPN community before you can define the VTI. The Peer ID is an alpha-numeric character string. 
 | 
 
<IF> 
 | 
Local peer interface name (unnumbered VTI only) 
 | 
 
 
 | 
  
 | 
 
Example 
 | 
add vpn tunnel 20 type numbered local 10.10.10.1 remote 20.20.20.1 peer MyPeer 
add vpn tunnel 10 type unnumbered peer MyPeer dev eth1
 delete vpn tunnel 10 
 | 
 
 
  
 | 
Important - After using CLI commands to add, configure or delete features, you must run the save config command. This makes sure that the new configuration settings remain after reboot. 
 | 
 
 
CLI Configuration Procedures for VPN Tunnel Interfaces
To add a numbered VPN Tunnel Interface: 
Run: 
add vpn tunnel <Tunnel ID> type numbered local <Local IP> remote <Remote IP> peer <Peer ID> 
<Tunnel ID> - Unique tunnel name (integer from 1 to 99) Gaia automatically adds the prefix 'vpnt' to the tunnel nametype numbered - Defines a numbered VTI that uses a specified, static IPv4 addresses for local and remote connectionslocal <Local IP> - Local peer IPv4 address (numbered VTI only) in dotted decimal formatremote <Remote IP> - Remote peer IPv4 address (numbered VTI only) in dotted decimal formatpeer <Peer ID> - Remote peer name as defined in the VPN community. You must define the two peers in the VPN community before you can define the VTI. The Peer ID is an alpha-numeric character string.
 To add an unnumbered VPN Tunnel Interface: 
Run: 
add vpn tunnel <Tunnel ID> type unnumbered local peer <Peer ID> 
<Tunnel ID> - Unique tunnel name (integer from 1 to 99) Gaia automatically adds the prefix 'vpnt' to the tunnel nametype unnumbered - Defines an unnumbered VTI that uses the interface and the remote peer name to get addressespeer <Peer ID> - Remote peer name as defined in the VPN community. You must define the two peers in the VPN community before you can define the VTI. The Peer ID is an alpha-numeric character string.dev <IF> - Local peer interface name (unnumbered VTI only)
 To Delete a VPN Tunnel Interface 
Run: 
delete vpn tunnel <Tunnel ID> 
<Tunnel ID> - Unique tunnel name (integer from 1 to 99) Gaia automatically adds the prefix 'vpnt' to the tunnel name 
Defining VPN Rules
To make sure that your security rules work correctly with Route Based VPN traffic, you must add directional matching conditions and allow OSPF traffic. This section includes procedures for configuring security rules to do this. 
Defining Directional Matching VPN Rules
This section contains the procedure for defining directional matching rules. Directional matching is necessary for Route Based VPN when a VPN community is included in the VPN column in the rule. This is because without bi-directional matching, the rule only applies to connections between a community and an encryption domain (Domain Based Routing). 
 Name 
 | 
Source 
 | 
Destination 
 | 
VPN 
 | 
Service 
 | 
Action 
 | 
 
VPN Tunnel 
 | 
Any 
 | 
Any 
 | 
MyIntranet 
 | 
Any 
 | 
accept 
 | 
 
 
The directional rule must contain these directional matching conditions: 
- Community > Community
 - Community > Internal_Clear
 - Internal_Clear > Community
 
 is the name of a VPN Community.  refers to all traffic from IP addresses to and from the specified VPN community. 
 Name 
 | 
Source 
 | 
Destination 
 | 
VPN 
 | 
Service 
 | 
Action 
 | 
 
VPN Tunnel 
 | 
Any 
 | 
Any 
 | 
MyIntranet > MyIntranet MyIntranet > Internal_Clear Internal_Clear > MyIntranet 
 | 
Any 
 | 
accept 
 | 
 
 
  
 | 
Note - It is not necessary to define bidirectional matching rules if the VPN column contains the value. 
 | 
 
 
To enable VPN directional matching: 
- In SmartDashboard, go to > >  > .
 - Select the  option.
 - In SmartDashboard, double-click each member gateway and go to the page. 
- Click to update the topology, to include the newly defined VTIs.
 - Click .
 
  
 To define a VPN directional matching rule: 
- Double-click the VPN cell in the applicable rule.
 - In the  window, select .
 - Click to define sets of matching conditions.
 - In the  window, select the source and destination matching conditions.
Do this step for each set of matching conditions. 
  
Defining Rules to Allow OSPF Traffic
One advantage of Route Based VPN is the fact that you can use dynamic routing protocols to distribute routing information between Security Gateways. The OSPF (Open Shortest Path First) protocol is commonly used with VTIs. This section shows you how to allow OSPF traffic in a VPN community. 
To learn about configuring OSPF, see the R76 Gaia Advanced Routing Administration Guide. 
To Allow OSPF traffic for a VPN Community: 
- Using the Gaia WebUI or CLI, add the applicable VPN Tunnel Interfaces to the OSPF configuration page.
 - In SmartDashboard, add a rule that allows traffic to the VPN community (or all communities) using the OSPF service.
  
 Name 
 | 
Source 
 | 
Destination 
 | 
VPN 
 | 
Service 
 | 
Action 
 | 
 
Allow OSPF 
 | 
Any 
 | 
Any 
 | 
MyIntranet  
 | 
ospf 
 | 
accept 
 | 
 
 
Completing the VTI Configuration
You must save your configuration to the database and install policies to the Security Gateways before the VPN can be fully functional. 
To complete the VTI configuration: 
- Save the configuration to the database.
 - Install the policy to the gateways.
 - Make sure that the VTI tunnel and the rules are working correctly.
  
ARP
The Address Resolution Protocol (ARP) allows a host to find the physical address of a target host on the same physical network using only the target’s IP address. ARP is a low-level protocol that hides the underlying network physical addressing and permits assignment of an arbitrary IP address to every machine. ARP is considered part of the physical network system and not as part of the Internet protocols. 
Configuring ARP- WebUI
To show dynamic ARP entries 
- In the WebUI, go to the  page.
 - If you are in the Static Arp topic, click 
 
 To show static ARP entries 
- In the WebUI, go to the  page.
 - If you are in the Dynamic Arp topic, click 
 
 To change Static and dynamic ARP parameters 
- In the WebUI, go to the  page.
 - If you are in the Dynamic Arp topic, click 
 - In the  section: 
- Enter the  This is the maximum number of entries in the arp cache. 
  Default: 1024, Range: 1024-16384 - Enter the This is the time, in seconds, to keep resolved dynamic ARP entries. If the entry is not referred to and is not used by traffic before the time elapses, it is deleted. Otherwise, a request will be sent to verify the MAC address.  
  Default: 60 (seconds), Range: 60-86400 (24 hours) 
  
 To add a static ARP entry 
- In the WebUI, go to the  page.
 - If you are in the Dynamic Arp topic, click 
 - Click .
 - Enter the  of the static ARP entry and the  used when forwarding packets to the IP address. 
 - .
 
 To delete a Static ARP entry 
- In the WebUI, go to the  page.
 - If you are in the Dynamic Arp topic, click 
 - Select a Static ARP entry
 - Click .
 
 To flush all dynamic ARP entries 
- In the WebUI, go to the  page.
 - If you are in the Static Arp topic, click  
 - Click .
  
Configuring ARP - CLI (arp)
Description 
 | 
Commands to configure the Address Resolution Protocol (ARP) 
 | 
 
Syntax 
 | 
To add a static arp entry 
add arp static ipv4-address VALUE macaddress VALUE 
  
To delete static and dynamic arp entries 
delete arp dynamic all 
delete arp static ipv4-address VALUE 
  
To set arp parameters 
set arp table validity-timeout VALUE 
set arp table cache-size VALUE 
  
To show arp parameters 
show arp dynamic all 
show arp static all 
show arp table validity-timeout 
show arp table cache-size 
  
  
 | 
 
Parameters 
 | 
static 
 | 
Configured static arp entries  
 | 
 
dynamic  
 | 
Configured dynamic arp entries  
 | 
 
ipv4-address  
 | 
IP Address of a static ARP entry. Range: Dotted-quad ([0-255].[0-255].[0-255].[0-255]). 
Default: No Default 
 | 
 
macaddress  
 | 
The hardware address used when forwarding packets to the given IP address.  Range: Six hexadecimal octets separated by colon. 
Default: No Default 
 | 
 
table validity-timeout 
 | 
This is the time, in seconds, to keep resolved dynamic ARP entries. If the entry is not referred to and is not used by traffic before the time elapses, it is deleted. Otherwise, a request will be sent to verify the MAC address.  
  Default: 60 (seconds), Range: 60-86400 (24 hours) 
 | 
 
table cache-size 
 | 
This is the maximum number of entries in the arp cache. 
  Default: 1024, Range: 1024-16384 
 | 
 
 
 | 
  
 | 
 
 
  
 | 
Important - After using CLI commands to add, configure or delete features, you must run the save config command. This makes sure that the new configuration settings remain after reboot. 
 | 
 
 
DHCP Server
You can configure the Gaia device to be a Dynamic Host Configuration Protocol (DHCP) server. The DHCP server allocates IP addresses and other network parameters to network hosts. DHCP makes it unnecessary to configure each host manually, and therefore reduces configuration errors. 
You configure DHCP server subnets on the Gaia device interfaces. A DHCP subnet allocates these network parameters to hosts behind the Gaia interface: 
- IPv4 address 
 - Default Gateway (optional)
 - DNS parameters (optional):
- Domain name
 - Primary, secondary and tertiary DNS server
 
  
 This is the general workflow for allocating DHCP parameters to hosts (for the details, see the next section): 
- To define a DHCP subnet on a Gaia device interface:
- Enable DHCP on the Gaia network interface.
 - Define the network IPv4 address of the subnet on the interface.
 - Define an IPv4 address pool.
 - Optional: Define routing and DNS parameters for hosts.
 
  - Define additional DHCP subnets on other Gaia interfaces, as needed.
 - Enable the DHCP server process. 
 - Configure the network hosts to use the DHCP server.
  
Configuring a DHCP Server- WebUI
To allocate DHCP parameters to hosts 
- In the tree view, click  > .
 - In the  section, click . 
The window opens. You now define a DHCP subnet on an Ethernet interface of the Gaia device. Hosts behind the Gaia interface get IPv4 addresses from address pools in the subnet. 
 - Select to enable DHCP for the subnet.
 - In the  tab, enter the  of the interface. Click  to do this automatically. 
 - Enter the .
 - In the  section, click  and define the range of IPv4 addresses that the server will assign to hosts.
 - Optional: Define a in seconds, for host IPv4 addresses. This is applied only if clients do not request a unique lease time. If you do not enter a value, the configuration default is 43,200 seconds.
 - Optional: Define a  in seconds, for host IPv4 addresses. This is the longest lease available. If you do not enter a value, the configuration default is 86,400 seconds.
 - Optional: Click the  tab to define routing and DNS parameters for hosts:
- The IPv4 address of the default gateway for the network hosts
 - . The domain name of the network hosts. For example, 
example.com.  - . The DNS server that the network hosts use to resolve hostnames. 
 - . The DNS server that the network hosts use to resolve hostnames if the primary server does not respond.  
 - . The DNS server that the network hosts use to resolve hostnames if the primary and secondary servers do not respond. 
 
  - Click .
 - Optional: Define DHCP subnets on other Gaia interfaces, as needed.
 - In the main page, select .
 - Click .
 
 The DHCP server on Gaia is now configured and enabled. 
You can now configure your network hosts to get their network parameters from the DHCP server on Gaia. 
Configuring a DHCP Server - CLI (dhcp)
Description 
 | 
DHCP Server commands allow you to configure the Gaia device as DHCP server for network hosts. 
 | 
 
Syntax 
 | 
To create DHCP Server subnets: 
add dhcp server subnet VALUE  
	netmask VALUE 
	include-ip-pool start VALUE end VALUE 
	exclude-ip-pool start VALUE end VALUE 
  
To change DHCP Server subnet configurations: 
set dhcp server subnet VALUE  
	enable 
	disable 
	include-ip-pool VALUE enable 
	include-ip-pool VALUE disable 
	exclude-ip-pool VALUE enable 
	exclude-ip-pool VALUE disable 
	default-lease VALUE 
	max-lease VALUE 
	default-gateway VALUE 
	domain VALUE 
	dns VALUE 
  
To delete DHCP Server subnets: 
delete dhcp server subnet VALUE  
	exclude-ip-pool VALUE 
	include-ip-pool VALUE 
  
To enable or disable the DHCP Server process: 
set dhcp server  
	disable 
	enable 
  
To view DHCP Server configurations 
show dhcp server  
	all 
	status 
	subnet VALUE ip-pools 
	subnets 
 | 
 
Parameters 
 | 
Parameter  
 | 
Description 
 | 
 
subnet VALUE 
 | 
The IPv4 address of the DHCP subnet on an Ethernet interface of the Gaia device. Hosts behind the Gaia interface get IPv4 addresses from address pools in the subnet. For example, 192.0.2.0 
 | 
 
netmask VALUE 
 | 
The IPv4 subnet mask in CIDR notation. For example, 
 24 
 | 
 
start VALUE 
 | 
The IPv4 address that starts the allocated IP Pool range. For example 192.0.2.20 
 | 
 
end VALUE 
 | 
The IPv4 address that ends the allocated IP Pool range. For example 192.0.2.90 
 | 
 
include-ip-pool VALUE 
 | 
The range of IPv4 addresses to include in the IP pool. For example 192.0.2.20-192.0.2.90 
 | 
 
exclude-ip-pool VALUE 
 | 
The range of IPv4 addresses to exclude from the IP pool. For example: 192.0.2.155-192.0.2.254 
 | 
 
enable 
 | 
Enable the DHCP Server subnet, or the DHCP Server process (depending on the context). 
 | 
 
disable 
 | 
Disable the DHCP Server subnet, or the DHCP Server process (depending on the context). 
 | 
 
default-lease VALUE 
 | 
The default lease in seconds, for host IPv4 addresses. This is applied only if clients do not request a unique lease time. If you do not enter a value, the configuration default is 43,200 seconds. 
 | 
 
max-lease VALUE 
 | 
The maximum lease in seconds, for host IPv4 addresses. This is the longest lease available. If you do not enter a value, the configuration default is 86,400 seconds. 
 | 
 
default-gateway VALUE 
 | 
The IPv4 address of the default gateway for the network hosts 
 | 
 
domain VALUE 
 | 
The domain name of the network hosts. For example, example.com.  
 | 
 
dns VALUE 
 | 
The DNS (Domain Name Service) servers that the network hosts will use to resolve hostnames. Optionally, specify a primary, secondary and tertiary server in the order of precedence. For example 
 192.0.2.101, 192.0.2.102, 192.0.2.103 
 | 
 
all 
 | 
All DHCP server configuration settings. 
 | 
 
subnets 
 | 
DHCP Server subnet configuration settings. 
 | 
 
subnet VALUE ip-pools 
 | 
The IP pools in the DHCP Server subnet, and their status: Enabled or Disabled.  
 | 
 
status 
 | 
The status of the DHCP Server process: Enabled or disabled. 
 | 
 
 
 | 
  
 | 
 
Example 
 | 
gw-9403be> show dhcp server all 
 | 
 
Output 
 | 
DHCP Server Enabled 
DHCP-Subnet 192.0.2.0 
    State           Enabled 
    Net-Mask        24 
    Maximum-Lease   86400 
    Default-Lease   43200 
    Domain          example.com 
    Default Gateway 192.0.2.103 
    DNS             192.0.2.101, 192.0.2.102, 192.0.2.103 
    Pools (Include List) 
        192.0.2.20-192.0.2.90           : enabled 
        192.0.2.120-192.0.2.150         : disabled 
    Pools (Exclude List) 
        192.0.2.155-192.0.2.254         : enabled 
DHCP-Subnet 192.0.2.155 
    State           Disabled 
    Net-Mask        24 
    Maximum-Lease   86400 
    Default-Lease   43200 
    Pools (Include List) 
        192.0.2.10-192.0.2.99           : enabled 
DHCP-Subnet 192.0.2.200 
    State           Disabled 
    Net-Mask        24 
    Maximum-Lease   86400 
    Default-Lease   43200 
 | 
 
 
 | 
  
 | 
 
 
Hosts and DNS
Host Name
You set the host name (system name) during initial configuration. You can change the name. 
Configuring Host Name - WebUI
To show the host name 
The host name is in the header of the WebUI. 
To change the host name 
- Open the page.
 - In the section, enter the 
-  The network name of the Gaia device.
 -  (optional). For example, 
example.com. 
   
Configuring Host Name - CLI (hostname)
Description 
 | 
Use this group of commands to configure the host name of your platform. 
 | 
 
Syntax 
 | 
set hostname VALUE 
show hostname 
 | 
 
 
						
						
					 |