In This Section: |
Use the
or set virtual-system
command to change context to a different virtual device. vsenv
set virtual-system
- Run from the CLIvsenv
- Run from Expert modeSyntax
set virtual-system
<vsid>
vsenv <vsid>
Parameter |
Description |
vsid |
ID of the virtual device. |
Example
set virtual-system
3
Output
Context is set to vsid 3 |
This section describes how to use Gaia CLI commands on VSX Gateways. For more about Gaia CLI commands, see the R76 Gaia Administration Guide.
Many CLI commands for VSX are run on each context (virtual device) separately. Change the context to a different virtual device and then run the command.
Configure roles permissions for users on each virtual device. When you create virtual devices, they do not receive any role permissions. You can use the CLI to:
R76 VSX does not support the Gaia WebUI. You cannot configure role permissions for the WebUI.
For more about configuring roles, see the R76 Gaia Administration Guide.
Syntax
add rba role <name> virtual-system-access <vsid>
delete rba role <name> virtual-system-access <vsid|all>
Parameter |
Description |
name |
Role name as a character string that contains letters, numbers or the underscore (_) character. The role name must start with a letter. |
vsid |
ID of the virtual device. Use commas to enter multiple virtual devices. |
all |
Deletes access permissions to all virtual devices. |
Example
add rba role newRole domain-type System all-features
add rba role newRole virtual-system-access 0,2,3
Use the CLI to create and configure roles for the VSX Gateway. Assign virtual devices to a role, so that the users of that role can access them.
To create roles for a VSX Gateway:
add rba role
add rba role <name> virtual-system-access <vsid>
save config
This is an example of creating roles.
GizaVSXGW1:0> add rba role newRole domain-type System all-features GizaVSXGW1:0> add rba role newRole virtual-system-access 0,2,3 GizaVSXGW1:0> save config |
Use the CLI to create new users and assign them to a role.
To add users to a role:
add user <username> uid <user-id> homedir <home directory path>
set user <username> password
add rba user role <role name>
save config
This is an example of creating users.
GizaVSXGW1:0> add user user1 uid 160 homedir /home/user1 WARNING Must set password and a role before user can login. - Use 'set user USER password' to set password. - Use 'add rba user USER roles ROLE' to set a role. - Use 'add rba role ROLE virtual-system-access' to set allowed virtual-system role. GizaVSXGW1:0> set user user1 password New password: Verify new password: GizaVSXGW1:0> add rba user user1 roles newRole |
Use the
and add
commands to configure the role permissions for virtual devices.delete rba role
Syntax
add rba role <name> virtual-system-access <vsid>
delete rba role <name> virtual-system-access <vsid|all>
Parameter |
Description |
name |
Role name as a character string that contains letters, numbers or the underscore (_) character. The role name must with a letter. |
vsid |
ID of the virtual device. Use commas to enter multiple virtual devices. |
all |
Deletes access permissions to all virtual devices. |
Example
add rba role newRole virtual-system-access 0,2
delete rba role newRole virtual-system-access all
Use the
command to show the virtual devices on the VSX Gateway.virtual-system
Syntax
show virtual-system all
Output
Virtual Systems list VS ID VS NAME 0 VSX_GW 1 VSX_GW1_VSW 2 VS1 3 VS2 |
This section explains how to use the
command to set affinities in VSX. When you run this command, VSX automatically creates or updates the affinity configuration files. All affinity configurations are saved even after you reboot the VSX Gateway.fw ctl affinity
There are processes that are affinity exceptions and are not included in the affinity commands that you run. The
file contains the list of processes that are affinity exceptions.$FWDIR/conf/vsaffinity_exception.conf
Important - Do not add Check Point processes to this list. Doing so can make the system unstable. |
You cannot set affinity to kernel threads.
When there is a conflict between affinities, there are priorities that are used to determine which CPU affinity is used. This is the priority order from highest to lowest:
Run the
command to set these CPU affinities:fw ctl affinity
You must be in Expert mode to run the
command.fw ctl affinity
Set the affinity of firewall instances to one or more CPUs for each Virtual System separately.
Syntax
fw ctl affinity -s -d {-inst <instances> -cpu <cpus>|-fwkall <cores>}
Parameter |
Description |
<instances> |
Number range of firewall instances that you are setting affinity. Use a dash to set a range of instances. |
<cpus> |
Number range of CPU processing cores that you are setting affinity. Use a dash to set a range of cores. |
<cores> |
Number of cores that are used for CPU affinity. You cannot use this parameter to assign specific cores to the firewall instances. |
Example
vsenv 1
fw ctl affinity -s -d -inst 0 2-4 -cpu 0-2
fw ctl affinity -s -d -fwkall 3
Output
VDevice 1: CPU 0 1 2 - set successfully |
Notes
You can use this command with the
parameter from any context.-fwkall
Use the
parameter to set the affinity of all the firewall instances to all the Virtual Systems. -fwkall
Syntax
fw ctl affinity -s -d -fwkall <cores>
Parameter |
Description |
<cores> |
Number of cores that are used for CPU affinity. You cannot use this parameter to assign specific cores to the firewall instances. |
Example
fw ctl affinity -s -d -fwkall 3
Output
VDevice 0-2 : CPU 3 4 5 6 7 - set successfully |
Notes
You can use this command with the
parameter from any context.-fwkall
Set the affinity of processes to one or more CPUs. You can use the
parameter to set the affinity for a process to Virtual Systems in any context. If you do not use the -vsid
parameter, the affinity of the current context is set.-vsid
Syntax
fw ctl affinity -s -d -pname <process> [-vsid <vsids>] -cpu <cpus>
Parameter |
Description |
process |
Name of process that you are setting affinity. |
vsids |
Virtual System IDs that you are setting affinity for this process. Use a dash to set a range of Virtual Systems. |
cpus |
Number range of CPU processing cores that you are setting affinity. Use a dash to set a range of cores. |
Example
fw ctl affinity -s -d -pname cpd -vsid 0-1 -cpu 0 2
Output
VDevice 0-1 : CPU 0 2 - set successfully |
Set the affinity of the Virtual Systems to one or more CPUs. You can use the
parameter to set affinity to the specified Virtual Systems. If you do not use the -vsid
parameter, the affinity of the current Virtual System is set.-vsid
Syntax
fw ctl affinity -s -d [-vsid <vsids>] -cpu <cpus>
Parameter |
Description |
vsids |
Virtual System IDs that you are setting affinity. Use a dash to set a range of Virtual Systems. |
cpus |
Number range of CPU processing cores that you are setting affinity. Use a dash to set a range of cores. |
Example
fw ctl affinity -s -d -vsid 0-1 -cpu 0 2
Output
VDevice 0-1 : CPU 0 2 - set successfully |
You can monitor the affinity of processes and Virtual Systems on the VSX Gateway.
Monitor the affinity of processes on the VSX Gateway. You can use the
parameter to show the affinity for a process to the specified Virtual Systems. -vsid
Syntax
fw ctl affinity -l -x [-vsid <vsids>] [-flags [e|h|k|n|t]
Parameter |
Description |
vsids |
Shows the affinity for processes for these Virtual System IDs. Use a dash to set a range of Virtual Systems. |
e |
Do not show processes that are affinity exceptions. Affinity exceptions are configured in the |
h |
Show CPU affinity mask in hexadecimal format. |
k |
Do not show kernel threads. |
n |
Show the process name instead of |
t |
Show information about the process threads. |
Example
fw ctl affinity -l -x -vsid 1 -flags tn
Output
--------------------------------------------------------------- |PID |VSID | CPU |SRC|V|KT |EXC| NAME --------------------------------------------------------------- | 4756 | 0 | all | | | | | pm | 4773 | 0 | all | | | | | confd | 4774 | 0 | all | | | | | searchd | 5008 | 0 | all | | | | | |---searchd | 4780 | 0 | all | | | | | httpd2 | 4781 | 0 | all | | | | | monitord | 24700 | 0 | 0 1 | P | | | | |---cpd | 24704 | 0 | 0 1 | P | | | | |---cpd | 24705 | 0 | 0 1 | P | | | | |---cpd | 22800 | 0 | all | | | | | mpdaemon | 24523 | 0 | all | | | | | fwk_forker | 24525 | 0 | all | | | | | fwk_wd | 24573 | 0 | 1 3 4 6 | P | | | | fw | 24667 | 0 | 1 3 4 6 | P | | | | |---fw | 24668 | 0 | 1 3 4 6 | P | | | | |---fw | 24670 | 0 | 1 3 4 6 | P | | | | |---fw | 24671 | 0 | 1 3 4 6 | P | | | | |---fw | 25412 | 0 | 1 3 4 6 | P | | | | |---fw | 24642 | 0 | 2 3 4 5 6 7 | P | | | | fwk0_dev | 24643 | 0 | 2 3 4 5 6 7 | P | | | | |---fwk0_0 | 30186 | 0 | all | | | | | clishd ---------------------------------------------------------------- |
Show the configured affinities of the Virtual System.
Syntax
fw ctl affinity -l
Example
fw ctl affinity -l
Output
VS_0 cpd: CPU 0 2 VS_0 FWK_INSTANCE_0: CPU 3 7 VS_0 FWK_INSTANCE_4: CPU 3 7 VS_0 fwd: CPU 3 7 VS_0 fwk: CPU 0 1 VS_1: CPU 2 4 6 VS_1 fwd: CPU 4 5 VS_1 fwk: CPU 2 3 4 5 6 7 |
This section describes the vsx commands.
Note - |
Description |
|
|||||||||||||||||||||
Syntax |
|
|||||||||||||||||||||
Parameters |
|
|
||||||||||||||||||||
Return Value |
|
|||||||||||||||||||||
Output |
fw vsx fetch Fetching VSX Configuration From: 10.18.99.101 Local VSX Configuration is Up-To-Date. Cleaning un-used Virtual Systems entries (local.vskeep). Purge operation succeeded. Fetching Virtual Systems configuration file (local.vsall). SecureXL device has been enabled for vsid 1 SecureXL device has been enabled for vsid 2 SecureXL device has been enabled for vsid 3 Virtual Systems configuration file installed successfully |
Description |
Retrieves a specific Virtual System configuration file based on information stored locally on the gateway. |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|
Syntax |
|
|||||||||
Parameters |
|
|
||||||||
Return Value |
|
|||||||||
Example |
|
|||||||||
Output |
|
Description |
Displays VSX status information. |
|||||||||
Syntax |
|
|||||||||
Parameters |
|
|
||||||||
Output |
||||||||||
|
||||||||||
Output for a specific Virtual System |
||||||||||
|
Description |
Resets SIC for the Virtual System. Run |
---|---|
Syntax |
|
Example
vsenv 1
vsx sic reset
Output
resetting SIC for VSID 1 |
Note - On the management server, use the |
Displays the status of an interface bond, or with the -a argument, a summary table of all bonds. When a bond is specified information for each slave interface is also displayed.
cphaconf show_bond {<bond-name>|-a}
[Expert@GW-1]# cphaconf show_bond bond0 Bond name: bond0 Bond mode: Load Sharing Bond status: Up Balancing mode: 802.3ad Layer3+4 Load Balancing Configured slave interfaces: 4 In use slave interfaces: 4 Required slave interfaces: 2 Slave Name | Status | Link -------------------------------------------- eth2 | Active | Yes eth3 | Active | Yes eth4 | Active | Yes eth5 | Active | Yes |
Required slave interfaces
.Status
column can contain these values:Down
(Load Sharing mode only) - the physical link is down.Active
- currently handling traffic.Standby
(High Availability mode only) - the interface is ready, and can support internal bond failover.Not Available
(High Availability mode only) - either the physical link is broken, or that the Cluster member is in status down. The bond cannot failover in this state.Link
column reports whether the physical link exists.Initiates bond interface failover in the High Availability mode.
cphaconf failover_bond <bond-name>
Displays the status of all interface bonds and VLANs for all the Virtual Systems. For a High Availability bond, specifies whether it can failover.
cphaprob -a if
# cphaprob -a if vsid 0: ------ Required interfaces: 1 Required secured interfaces: 0 bond1 Inbound: UP Outbound: DOWN (127 secs) non sync(non secured), broadcast, bond High Availability eth0 UP non sync(non secured), multicast eth1 DOWN (127 secs) sync(secured), broadcast Virtual cluster interfaces: 1 eth0 172.16.6.115 vsid 2: ------ Required interfaces: 0 Required secured interfaces: 0 eth1 DOWN (38.6 secs) sync(secured), broadcast eth3 Inbound: UP Outbound: DOWN (38.6 secs) non sync(non secured), multicast Virtual cluster interfaces: 1 eth3 10.0.0.10 |
Description |
Performs various VSX maintenance tasks. You run this command from the expert mode on the management server (Security Management Server or a Main Domain Management Server in a Multi-Domain Security Management environment). |
|||||||||||||
Syntax |
vsx_util <sub-command> [parameters] |
|||||||||||||
Parameters |
|
|
||||||||||||
Comments |
Note - You must close SmartDashboard before executing the |
The
command typically requires you to enter the following information before executing the command: vsx_util
vsx_util
sub-commands are interactive and require additional user input. Brief descriptions of additional input requirements appear in the Input section for the various sub-commands. The instructions on the screen typically provide helpful information regarding required information.Description |
Adds a new member to an existing VSX cluster. |
---|---|
Syntax |
|
Input |
|
Comments |
Run the command and follow the instructions on the screen. When the command finishes executing, you must also Run the vsx_util add_member_reconf command. See Adding a New Member before using this command. |
Description |
Restores VSX configuration after adding a cluster member |
Syntax |
|
Input |
|
Comments |
Execute the command and follow the instructions on the screen. Reboot the member after the command script finishes. Review the procedure for defining a new member before using this command. |
Description |
Automatically replaces designated existing interfaces with new interfaces on all virtual devices to which the existing interfaces connect. This command is useful when converting a deployment to use Link Aggregation, especially where VLANs connect to many virtual devices. |
|
Syntax |
|
|
Comments |
|
|
Important - You must close SmartDashboard for all Multi-Domain Security Management Domain Management Servers using the affected interfaces prior to running this command. |
To change interfaces:
vsx_util reconfigure command
to push the updated configuration to VSX Gateways or cluster members.vsx_util reconfigure command
to push the updated configuration to the VSX Gateways or cluster members.Description |
Changes gateway or cluster member management IP address |
Syntax |
|
Input |
|
Comments |
|
Description |
Changes the cluster internal communication network IP address |
Syntax |
|
Input |
|
Comments |
|
Description |
Automatically replaces designated existing interfaces with new interfaces on all virtual devices to which the existing interfaces connect. This command is useful when converting a deployment to use Link Aggregation, especially where VLANs connect to many virtual devices. |
|
Syntax |
|
|
Comments |
|
|
Important - You must close SmartDashboard for all Multi-Domain Security Management Domain Management Servers using the affected interfaces prior to running this command. |
To change interfaces:
vsx_util reconfigure command
to push the updated configuration to VSX Gateways or cluster members.vsx_util reconfigure command
to push the updated configuration to the VSX Gateways or cluster members.Description |
Change the gateway or member management subnet |
---|---|
Syntax |
|
Input |
|
Comments |
To perform this action, execute the command and follow the instructions on the screen. Reboot the VSX Gateway or cluster members after the command script finishes. |
Description |
Converts the cluster type from High Availability to VSLS or from VSLS to High Availability |
---|---|
Syntax |
|
Input |
VSX cluster object name ClusterXL mode: HA for High Availability or LS for Virtual System Load Sharing |
Comments |
Backup the management database before using this command. To perform this action, execute the command and follow the instructions on the screen. When switching to High Availability, all Virtual Systems are active on the same member by default. Peer Virtual Systems are standby on other members. When converting to VSLS, all members must be in the Per Virtual System state. |
|
Restores a VSX configuration to a newly installed gateway or cluster member |
Syntax |
vsx_util reconfigure |
Input |
VSX cluster member name SIC activation key assigned to the Security Management Server or Domain Management Server Retype to confirm the SIC activation key |
Comments |
For more about how to use the vsx_util reconfigure command, go to sk97552. This command is also useful for restoring a gateway or cluster member after a system failure. Execute the command and follow the instructions on the screen. A new gateway or cluster member must have the same hardware specifications and configuration as its replacement and other cluster members. Most importantly, it must have the same number of interfaces (or more) and the same management IP address. The new or replacement machine must be a new installation. You cannot use a machine with a previous VSX configuration. |
Description |
Removes a member from an existing cluster |
---|---|
Syntax |
vsx_util remove_member |
Comments |
Backup the management database before using this command Make certain that you remove member license before executing this command Execute the command and follow the instructions on the screen |
Description |
Displays selected interface information in a VSX deployment. Provides information regarding interface types, connections to virtual devices, and IP addresses. The output appears on the screen and is also saved to the i |
|||||||||||
Syntax |
vsx_util show_interfaces |
|||||||||||
Parameters |
|
|
||||||||||
Sample Output |
||||||||||||
Which interface would you like to display? 1) All Interfaces 2) All Physical Interfaces 3) All Warp Interfaces 4) A Specific Interface Enter your choice: 4 Enter Interface Name:eth1 +-------------------+---------------------+----+---------------+---------------+ |Type & Interface | virtual device Name |VSID| IP Address | Netmask | +-------------------+---------------------+----+---------------+---------------+ |V eth1.11 |vs1 |2 |10.1.1.11 |255.255.255.0 | +-------------------+---------------------+----+---------------+---------------+ |V eth1.44 |vs4 |6 |10.4.4.44 |255.255.255.0 | +-------------------+---------------------+----+---------------+---------------+ |V eth1.22 |vs2 |3 |10.2.2.22 |255.255.255.0 | +-------------------+---------------------+----+---------------+---------------+ |V eth1.33 |vs3 |4 |10.3.3.33 |255.255.255.0 | +-------------------+---------------------+----+---------------+---------------+ |V eth1.55 |vs5 |5 |10.5.5.55 |255.255.255.0 | +-------------------+---------------------+----+---------------+---------------+ Type: M - Management Interface S - Synchronization Interface V - VLAN Interface W - Warp Interface U - Used Interface A - Available Interface X - Unknown Interface E - Error in Interface Properties |
Description |
Upgrades Gateways and/or cluster members to newer versions |
Syntax |
|
Comments |
This command updates all VSX objects in the management database to the designated newer version. Backs up the management server. Execute the command and follow the instructions on the screen. After the command script finishes, execute the vsx_util reconfigure command. |
Description |
Displays virtual device configuration and status, including troubleshooting information. This command also compares the management server database with the actual VSX Gateways and cluster member configurations. |
---|---|
Syntax |
vsx_util view_vs_conf |
Output
Interfaces configuration table: +-------------------------+--------------+-----------------------------+ |Interfaces |Mgmt |VSX GW | | +----------+--------------+--------------+---------+---------+---------+ |Name |Address |Mask | Member1 | Member2 | Member3 | +----------+--------------+--------------+---------+---------+---------+ |eth1.51 |20.10.10.1 |255.255.255.0 | V | V | V | |wrp128 |172.23.50.181 |255.255.255.0 | V | V | V | +----------+--------------+--------------+---------+---------+---------+ Interfaces Table Legend: V: Interface exists on the gateway and matches management information - - Interface does not exist on the gateway. N/A - Fetching virtual device configuration from the gateway failed. !IP - Interface exists on the gateway, but there is an IP address mismatch. !MASK - Interface exists on the gateway, but there is a net mask mismatch. |
Routing table: +----------------------------------------------------+----+-------------+ |Routes |Mgmt|VSX GW(s) | +------------+--------------+-------------+----------+----+------+------+ |Destination |Mask |Gateway |Interface | |Member|Member| +------------+--------------+-------------+----------+----+------+------+ |172.23.50.0 |255.255.255.0 | |wrp128 | V | V | V | |20.10.10.0 |255.255.255.0 | |eth1.51 | V | V | V | |20.30.30.0 |255.255.255.0 |172.23.50.82 | | V | V | V | +-----------------+-------------------+------------------+--------------+-----+--------+---------+ |
+-------------------------------------------------------+-----+---------+ |Routes |Mgmt |VSX GW(s)| +---------------+--------------+-------------+----------+-----+---------+ |Destination |Mask |Gateway |Interface | |Member3 | +---------------+--------------+-------------+----------+-----+---------+ |172.23.50.0 |255.255.255.0 | |wrp128 | V | V | |20.10.10.0 |255.255.255.0 | |eth1.51 | V | V | |20.30.30.0 |255.255.255.0 |172.23.50.82 | | V | V | +---------------+--------------+-------------+----------+-----+---------+ Routing Table Legend: V - Route exists on the gateway and matches management information. - - Route does not exist on the gateway. N/A - Fetching virtual device configuration from the gateway failed. !NH - Route exists on the gateway, but there is a Next Hop mismatch. |
Description Display VSLS load sharing configuration and status Usage vsx_util vsls Output Sample output: vsx_util vsls Enter SmartCenter Server/main Domain Management Server IP address (Hit 'ENTER' for 'localhost'): Enter Administrator Name: Enter Administrator Password: Enter ClusterXL Load Sharing cluster object name:
|
Description |
Displays the Virtual System Load Sharing Menu, which allows you to perform a variety of configuration tasks for Load Sharing deployments. You perform configuration tasks interactively by following the instructions on the screen. |
Syntax |
vsx_util vsls |
Output |
VS Load Sharing - Menu ________________________________ 1. Display current VS Load sharing configuration 2. Distribute all Virtual Systems so that each cluster 3. Set all VSs active on one member 4. Manually set priority and weight 5. Import configuration from a file 6. Export configuration to a file 7. Exit Enter redistribution option (1-7) [1] |
Comments |
|
You use the vsx_util vsls command to perform various Virtual System Load Sharing configuration tasks, including:
To work with the vsx_util vsls command:
You use the
command to verify cluster functionality and to debug cluster related problems. This section provides a brief overview of the cphaprob
command and its command options. For complete documentation and use cases, refer to the R76 ClusterXL Administration Guide.cphaprob
A critical device is a process running on a cluster member that enables the member to notify other cluster members that it can no longer function as a member. The device reports to the ClusterXL mechanism regarding its current state or it may fail to report, in which case ClusterXL decides that a failure has occurred and another cluster member takes over. When a critical device (also known as a Problem Notification, or pnote) fails, the cluster member is considered to have failed.
There are a number of built-in critical devices, and the administrator can define additional critical devices. The default critical devices are:
Cluster interfaces on the cluster members.
Synchronization — full synchronization completed successfully.
Filter — the Security Policy, and whether it is loaded.
fwd — the VPN‑1 daemon.
You can include these commands in scripts for automatic execution.
To produce a usage printout for
that shows all the available commands, type cphaprob
at the command line and press Enter. The following output appears:cphaprob
cphaprob state cphaprob [-a] [-vs vsid] if The following commands are NOT applicable for 3rd party: cphaprob -d <device> -t <timeout(sec)> -s <ok|init|problem> [-p] register cphaprob -f <file> register cphaprob -d <device> [-p] unregister cphaprob -a unregister cphaprob -d <device> -s <ok|init|problem> report cphaprob [-i[a]] [-e] [-vs vsid] list cphaprob -vs <vsid> register cphaprob -vs <vsid> unregister cphaprob igmp ................... IGMP membership status cphaprob [-reset] [-a] ldstat ... Sync serialization statistics cphaprob [-reset] [-a] syncstat . Sync transport layer statistics cphaprob fcustat ................ Full connectivity upgrade statistics cphaprob tablestat .............. Cluster tables |
The following table describes the available command options:
Parameter |
Description |
---|---|
|
View the status all cluster members or for a specific Virtual System. |
|
View the state of the cluster member interfaces and the virtual cluster interfaces. |
|
View the list of critical devices on a cluster member, and of all the other machines in the cluster. |
|
Register <device> as a critical process, and add it to the list of devices that must be running for the cluster member to be considered active. |
|
Register all the user defined critical devices listed in |
|
Unregister a user defined |
|
Unregister all user defined devices |
|
Report the status of a user defined critical device to ClusterXL. |
|
View sync serialization statistics. -vs is relevant only for VSLS. |
|
View sync transport layer statistics. -vs is relevant only for VSLS. |
|
Displays interfaces and IP addresses for each cluster member |