In This Section: |
You can make changes to your appliance with the WebUI or Command Line Interface (CLI). When using CLI note these aspects:
bashUser on
bashUser off
CLISH Auto-completion
All CLISH commands support auto-completion. Standard Check Point and native Linux commands can be used from the CLISH shell but do not support auto-completion. These are examples of the different commands:
fetch,
set
, show
cphaprob,
fw, vpn
ping, tcpdump, traceroute
The CLI commands are formatted according to these syntax rules.
Notation |
Description |
---|---|
Text without brackets |
Items you must type as shown |
<Text inside angle brackets> |
Placeholder for which you must supply a value |
[Text inside square brackets] |
Optional items |
Vertical pipe (|) |
Separator for mutually exclusive items; choose one |
{Text inside curly brackets} |
Set of required items; choose one |
Ellipsis (…) |
Multiple values or parameters can be entered |
You can run clish commands from Expert mode.
Syntax
clish [ -A -i { -c Cmd | -f File -v} -h -C ]
Parameters
Parameter |
Description |
---|---|
|
Single command to execute |
|
File to load commands from |
|
Verbose |
|
Ignore cmd failure in batch mode and continue |
|
Run as admin |
|
List available commands |
|
Help (this message) |
Note - If the default shell you logged in with was clish, and then you logged in to expert from it, you cannot run clish from expert (running clish->expert->clish does not work, but expert->clish works). |
These standard Linux commands are also supported by the Check Point Small and Medium Business Appliance CLI.
arp
netstat
nslookup
ping
resize
sleep
tcpdump
top
traceroute
uptime
Description
Adds a new firewall access rule to the outgoing (clear) traffic Rule Base.
Syntax
add access-rule type outgoing [ action
<action> ] [ log <log> ] [ source
<source> ] [ source-negate
<source-negate> ] [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [ service-negate
<service-negate> ] [ disabled
<disabled> ] [ comment
<comment> ] [ hours-range-enabled { true hours-range-from
<hours-range-from> hours-range-to
<hours-range-to> | false } ] [ { position
<position> | position-above
<position-above> | position-below
<position-below> } ] [ name <name> ] [ { [ application-name
<application-name> ] | [ application-id
<application-id> ] } ] [ application-negate
<application-negate> ] [ limit-application-download { true limit
<limit> | false } ] [ limit-application-upload { true limit
<limit> | false } ]
Parameters
Parameter |
Description |
---|---|
action |
The action taken when there is a match on the rule Options: block, accept, ask, inform, block-inform |
application-id |
Applications or web sites that are accepted or blocked |
application-name |
Applications or web sites that are accepted or blocked |
application-negate |
If true, the rule accepts or blocks all applications but the selected application Type: Boolean (true/false) |
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
disabled |
Indicates if the rule is disabled Type: Boolean (true/false) |
hours-range-enabled |
If true, time is configured Type: Boolean (true/false) |
hours-range-from |
Time in the format HH:MM Type: A time format hh:mm |
hours-range-to |
Time in the format HH:MM Type: A time format hh:mm |
limit |
Applications traffic upload limit (in kbps) Type: A number with no fractional part (integer) |
limit-application-download |
If true, download is limited Type: Boolean (true/false) |
limit-application-upload |
If true, upload is limited Type: Boolean (true/false) |
log |
Defines which logging method to use: None - do not log, Log - Create log, Alert - log with alert, Account - account rule Options: none, log, alert, account |
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
service |
The network service object that the rule should match to |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the source is all traffic except what is defined in the source field Type: Boolean (true/false) |
Example
add access-rule type outgoing action block log none source TEXT source-negate true destination TEXT destination-negate true service TEXT service-negate true disabled true comment “This is a comment.” hours-range-enabled true hours-range-from 23:20 hours-range-to 23:20 position 2 name word application-name hasOne application-negate true limit-application-download true limit 200 limit-application-upload true limit 5
Output
Failure shows an appropriate error message.
Deletes an existing firewall access rule to the outgoing (clear) traffic Rule Base.
Description
Deletes an existing firewall access rule to the outgoing (clear) traffic Rule Base by rule position.
Syntax
delete access-rule type outgoing position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
Example
delete access-rule type outgoing position 2
Output
Failure shows an appropriate error message.
Description
Deletes an existing firewall access rule to the outgoing (clear) traffic Rule Base by rule name.
Syntax
delete access-rule type outgoing name
<name>
Parameters
Parameter |
Description |
---|---|
name |
name Type: A string of alphanumeric characters without space between them |
Example
delete access-rule type outgoing name word
Output
Failure shows an appropriate error message.
Configures an existing firewall access rule to the outgoing (clear) traffic Rule Base.
Description
Configures an existing firewall access rule to the outgoing (clear) traffic Rule Base by position.
Syntax
set access-rule type outgoing position
<position> [ action
<action>
] [ log
<log> ] [ source
<source> ] [ source-negate
<source-negate> ] [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [ service-negate
<service-negate> ] [ disabled
<disabled>
] [ comment
<comment> ] [ hours-range-enabled { true hours-range-from
<hours-range-from> hours-range-to
<hours-range-to> | false } ] [ { position <position> | position-above
<position-above> | position-below
<position-below> } ] [ name
<name> ] [ { [ application-name
<application-name>
] | [ application-id
<application-id> ] } ] [ application-negate
<application-negate> ] [ limit-application-download { true limit
<limit> | false } ] [ limit-application-upload { true limit
<limit> | false } ]
Parameters
Parameter |
Description |
---|---|
action |
The action taken when there is a match on the rule Options: block, accept, ask, inform, block-inform |
application-id |
Applications or web sites that are accepted or blocked |
application-name |
Applications or web sites that are accepted or blocked |
application-negate |
If true, the rule accepts or blocks all applications but the selected application Type: Boolean (true/false) |
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
disabled |
Indicates if the rule is disabled Type: Boolean (true/false) |
hours-range-enabled |
If true, time is configured Type: Boolean (true/false) |
hours-range-from |
Time in the format HH:MM Type: A time format hh:mm |
hours-range-to |
Time in the format HH:MM Type: A time format hh:mm |
limit |
Applications traffic upload limit (in kbps) Type: A number with no fractional part (integer) |
limit-application-download |
If true, download is limited Type: Boolean (true/false) |
limit-application-upload |
If true, upload is limited Type: Boolean (true/false) |
log |
Defines which logging method to use: None - do not log, Log - Create log, Alert - log with alert, Account - account rule Options: none, log, alert, account |
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
service |
The network service object that the rule should match to |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the source is all traffic except what is defined in the source field Type: Boolean (true/false) |
Example
set access-rule type outgoing position 2 action block log none source TEXT source-negate true destination TEXT destination-negate true
service TEXT service-negate true disabled true comment “This is a comment.” hours-range-enabled true hours-range-from 23:20 hours-range-to 23:20 position 2 name word application-name hasOne application-negate true
limit-application-download true limit 100 limit-application-upload true limit 5
Output
Failure shows an appropriate error message.
Description
Configures an existing firewall access rule to the outgoing (clear) traffic Rule Base by name.
Syntax
set access-rule type outgoing name
<name> [ action
<action> ] [ log
<log> ] [ source
<source> ] [ source-negate
<source-negate> ] [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [ service-negate
<service-negate> ] [ disabled
<disabled>
] [ comment
<comment> ] [ hours-range-enabled { true hours-range-from
<hours-range-from> hours-range-to
<hours-range-to> | false } ] [ { position
<position> | position-above
<position-above> | position-below
<position-below> } ] [ name
<name> ] [ { [ application-name
<application-name>
] | [ application-id
<application-id> ] } ] [ application-negate
<application-negate> ] [ limit-application-download { true limit
<limit> | false } ] [ limit-application-upload { true limit
<limit> | false } ]
Parameters
Parameter |
Description |
---|---|
action |
The action taken when there is a match on the rule Options: block, accept, ask, inform, block-inform |
application-id |
Applications or web sites that are accepted or blocked |
application-name |
Applications or web sites that are accepted or blocked |
application-negate |
If true, the rule accepts or blocks all applications but the selected application Type: Boolean (true/false) |
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
disabled |
Indicates if the rule is disabled Type: Boolean (true/false) |
hours-range-enabled |
If true, time is configured Type: Boolean (true/false) |
hours-range-from |
Time in the format HH:MM Type: A time format hh:mm |
hours-range-to |
Time in the format HH:MM Type: A time format hh:mm |
limit |
Applications traffic upload limit (in kbps) Type: A number with no fractional part (integer) |
limit-application-download |
If true, download is limited Type: Boolean (true/false) |
limit-application-upload |
If true, upload is limited Type: Boolean (true/false) |
log |
Defines which logging method to use: None - do not log, Log - Create log, Alert - log with alert, Account - account rule Options: none, log, alert, account |
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
service |
The network service object that the rule should match to |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the source is all traffic except what is defined in the source field Type: Boolean (true/false) |
Example
set access-rule type outgoing name word action block log none source TEXT source-negate true destination TEXT destination-negate true service TEXT service-negate true disabled true comment “This is a comment.”
hours-range-enabled true hours-range-from 23:20 hours-range-to 23:20 position 2 name word application-name hasOne application-negate true
limit-application-download true limit 100 limit-application-upload true limit 5
Output
Failure shows an appropriate error message.
Shows firewall access rules of the outgoing (clear) traffic Rule Base.
Description
Shows a firewall access rule in the outgoing (clear) traffic<tp_ rule> according to name.
Syntax
show access-rule type outgoing name
<name>
Parameters
Parameter |
Description |
---|---|
name |
name Type: A string of alphanumeric characters without space between them |
Example
show access-rule type outgoing name word
Output
Failure shows an appropriate error message.
Description
Shows a firewall access rule in the outgoing (clear) traffic Rule Base according to position
Syntax
show access-rule type outgoing position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of a manual rule in comparison to other manual rules Type: Decimal number |
Example
show access-rule type outgoing position 2
Output
Failure shows an appropriate error message.
Description
Adds a new firewall access rule to the incoming/internal/VPN traffic Rule Base.
Syntax
add access-rule type incoming-internal-and-vpn [ action
<action> ] [ log
<log> ] [ source <source> ] [ source-negate
<source-negate> ] [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [ service-negate
<service-negate> ] [ disabled
<disabled>
] [ comment
<comment> ] [ hours-range-enabled { true hours-range-from
<hours-range-from> hours-range-to
<hours-range-to> | false } ] [ { position
<position> | position-above
<position-above> | position-below
<position-below>
} ] [ name
<name> ] [ vpn
<vpn> ]
Parameters
Parameter |
Description |
---|---|
action |
The action taken when there is a match on the rule Options: block, accept, ask, inform, block-inform |
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
disabled |
Indicates if the rule is disabled Type: Boolean (true/false) |
hours-range-enabled |
If true, time is configured Type: Boolean (true/false) |
hours-range-from |
Time in the format HH:MM Type: A time format hh:mm |
hours-range-to |
Time in the format HH:MM Type: A time format hh:mm |
log |
Defines which logging method to use: None - do not log, Log - Create log, Alert - log with alert, Account - account rule Options: none, log, alert, account |
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
service |
The network service object that the rule should match to |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the source is all traffic except what is defined in the source field Type: Boolean (true/false) |
vpn |
Indicates if traffic is matched on encrypted traffic only or all traffic Type: Boolean (true/false) |
Example
add access-rule type incoming-internal-and-vpn action block log none source TEXT source-negate true destination TEXT destination-negate true service TEXT service-negate true disabled true comment “This is a comment.” hours-range-enabled true hours-range-from 23:20 hours-range-to 23:20 position
2 name word vpn true
Output
Failure shows an appropriate error message.
Deletes an existing firewall access rule to the incoming/internal/VPN traffic Rule Base.
Description
Deletes an existing firewall access rule to the incoming/internal/VPN traffic Rule Base by rule name.
Syntax
delete access-rule type incoming-internal-and-vpn name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Name Type: A string of alphanumeric characters without space between them |
Example
delete access-rule type incoming-internal-and-vpn name word
Output
Failure shows an appropriate error message.
Description
Deletes an existing firewall access rule to the incoming/internal/VPN traffic Rule Base by rule position.
Syntax
delete access-rule type incoming-internal-and-vpn position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
Example
delete access-rule type incoming-internal-and-vpn position 2
Output
Failure shows an appropriate error message.
Configures an existing firewall access rule to the incoming/internal/VPN traffic Rule Base.
Description
Configures an existing firewall access rule to the incoming/internal/VPN traffic Rule Base by position.
Syntax
set access-rule type incoming-internal-and-vpn position
<position> [ action
<action> ] [ log
<log> ] [ source
<source> ] [ source-negate
<source-negate>
] [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [ service-negate
<service-negate> ] [ disabled
<disabled>
] [ comment
<comment> ] [ hours-range-enabled { true hours-range-from
<hours-range-from> hours-range-to
<hours-range-to> | false } ] [ { position
<position> | position-above
<position-above> | position-below
<position-below>
} ] [ name
<name> ] [ vpn
<vpn> ]
Parameters
Parameter |
Description |
---|---|
action |
The action taken when there is a match on the rule Options: block, accept, ask, inform, block-inform |
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
disabled |
Indicates if the rule is disabled Type: Boolean (true/false) |
hours-range-enabled |
If true, time is configured Type: Boolean (true/false) |
hours-range-from |
Time in the format HH:MM Type: A time format hh:mm |
hour-range-to |
Time in the format HH:MM Type: A time format hh:mm |
log |
Defines which logging method to use: None - do not log, Log - Create log, Alert - log with alert, Account - account rule Options: none, log, alert, account |
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
service |
The network service object that the rule should match to |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the source is all traffic except what is defined in the source field Type: Boolean (true/false) |
vpn |
Indicates if traffic is matched on encrypted traffic only or all traffic Type: Boolean (true/false) |
Example
set access-rule type incoming-internal-and-vpn position 2 action block log none source TEXT source-negate true destination TEXT destination-negate
true service TEXT service-negate true disabled true comment “This is a comment.” hours-range-enabled true hours-range-from 23:20 hours-range-to 23:20 position
2 name word vpn true
Output
Failure shows an appropriate error message.
Description
Configures an existing firewall access rule to the incoming/internal/VPN traffic Rule Base by name.
Syntax
set access-rule type incoming-internal-and-vpn name
<name> [ action
<action>
] [ log
<log> ] [ source
<source> ] [ source-negate
<source-negate> ] [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [ service-negate
<service-negate> ] [ disabled
<disabled>
] [ comment
<comment> ] [ hours-range-enabled { true hours-range-from
<hours-range-from> hours-range-to
<hours-range-to> | false } ] [ { position
<position> | position-above
<position-above> | position-below
<position-below>
} ] [ name
<name> ] [ vpn
<vpn> ]
Parameters
Parameter |
Description |
---|---|
action |
The action taken when there is a match on the rule Options: block, accept, ask, inform, block-inform |
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
disabled |
Indicates if the rule is disabled Type: Boolean (true/false) |
hours-range-enabled |
If true, time is configured Type: Boolean (true/false) |
hours-range-from |
Time in the format HH:MM Type: A time format hh:mm |
hours-range-to |
Time in the format HH:MM Type: A time format hh:mm |
log |
Defines which logging method to use: None - do not log, Log - Create log, Alert - log with alert, Account - account rule Options: none, log, alert, account |
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
service |
The network service object that the rule should match to |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the source is all traffic except what is defined in the source field Type: Boolean (true/false) |
vpn |
Indicates if traffic is matched on encrypted traffic only or all traffic Type: Boolean (true/false) |
Example
set access-rule type incoming-internal-and-vpn name word action block log none source TEXT source-negate true destination TEXT destination-negate true service TEXT service-negate true disabled true comment “This is a comment.” hours-range-enabled true hours-range-from 23:20 hours-range-to 23:20 position
2 name word vpn true
Output
Failure shows an appropriate error message.
Shows firewall access rules of the incoming/internal/VPN traffic Rule Base.
Description
Shows a firewall access rule in the incoming/internal/VPN traffic Rule Base according to position.
Syntax
show access-rule type incoming-internal-and-vpn position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of a manual rule in comparison to other manual rules Type: Decimal number |
Example
show access-rule type incoming-internal-and-vpn position 2
Output
Failure shows an appropriate error message.
Description
Shows a firewall access rule in the incoming/internal/VPN traffic Rule Base according to name
Syntax
show access-rule type incoming-internal-and-vpn name
<name>
Parameters
Parameter |
Description |
---|---|
name |
name Type: A string of alphanumeric characters without space between them |
Example
show access-rule type incoming-internal-and-vpn name word
Output
Failure shows an appropriate error message.
Description
Configures various hardware settings.
Syntax
set additional-hw-settings [ reset-timeout
<reset-timeout> ]
Parameters
Parameter |
Description |
---|---|
reset-timeout |
Indicates the amount of time (in seconds) that you need to press and hold the factory defaults button on the back panel to restore to the factory defaults image Type: A number with no fractional part (integer) |
Example
set additional-hw-settings reset-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows advanced hardware related setings.
Syntax
show additional-hw-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show additional-hw-settings
Output
Failure shows an appropriate error message.
Description
Adds a new AD server object.
Syntax
add ad-server domain
<domain> ipv4-address
<ipv4-address> username
<username> password
<password> user-dn
<user-dn> use-branch-path { true branch-path
<branch-path> | false }
Parameters
Parameter |
Description |
---|---|
branch-path |
The branch of the domain to be used Type: An LDAP DN |
domain |
Domain name Type: Host name |
ipv4-address |
Domain controller IP address |
password |
The user’s password Type: A string that contains alphanumeric and special characters |
use-branch-path |
Select only if you want to use only part of the user database defined in the Active Directory Type: Boolean (true/false) |
user-dn |
FQDN of the user Type: An LDAP DN |
username |
A user name with administrator privileges to communicate with the AD server Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
add ad-server domain myHost.com ipv4-address 192.168.1.1 username admin password a(&7Ba user-dn cn=John Doe,dc=example,dc=com use-branch-path true branch-path cn=John Doe,dc=example,dc=com
Output
Failure shows an appropriate error message.
Description
Deletes an existing AD server object.
Syntax
delete ad-server
<domain>
Parameters
Parameter |
Description |
---|---|
domain |
Domain name Type: Host name |
Example
delete ad-server myHost.com
Output
Failure shows an appropriate error message.
Description
Configures an existing AD server object.
Syntax
set ad-server
<domain> [ ipv4-address
<ipv4-address> ] [ username
<username>
] [ password
<password> ] [ user-dn
<user-dn> ] [ use-branch-path { true [ branch-path
<branch-path> ] | false } ]
Parameters
Parameter |
Description |
---|---|
branch-path |
The branch of the domain to be used Type: An LDAP DN |
domain |
Domain name Type: Host name |
ipv4-address |
Domain controller IP address |
password |
The user’s password Type: A string that contains alphanumeric and special characters |
use-branch-path |
Select only if you want to use only part of the user database defined in the Active Directory Type: Boolean (true/false) |
user-dn |
FQDN of the user Type: An LDAP DN |
username |
A user name with administrator privileges to communicate with the AD server Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
set ad-server myHost.com ipv4-address 192.168.1.1 username admin password a(&7Ba user-dn cn=John Doe,dc=example,dc=com use-branch-path true branch-path cn=John Doe,dc=example,dc=com
Output
Failure shows an appropriate error message.
Description
Shows settings of a configured AD server object.
Syntax
show ad-server
<domain>
Parameters
Parameter |
Description |
---|---|
domain |
Domain name Type: Host name |
Example
show ad-server myHost.com
Output
Failure shows an appropriate error message.
Description
Shows settings of all configured AD server objects.
Syntax
show ad-servers
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ad-servers
Output
Failure shows an appropriate error message.
Description
Adds a new IP address range object.
Syntax
add address-range name
<name> start-ipv4
<start-ipv4> end-ipv4
<end-ipv4> [ dhcp-exclude-ip-addr
<dhcp-exclude-ip-addr> ]
Parameters
Parameter |
Description |
---|---|
dhcp-exclude-ip-addr |
Indicates if the object’s IP address(es) is excluded from internal DHCP daemon Options: on, off |
end-ipv4 |
The end of the IP range |
name |
Network Object name Type: String |
start-ipv4 |
The beginning of the IP range |
Example
add address-range name TEXT start-ipv4 192.168.1.1 end-ipv4 192.168.1.1 dhcp-exclude-ip-addr on
Output
failure shows an appropriate error message.
Description
Deletes an existing address range object.
Syntax
delete address-range
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name Type: String |
Example
delete address-range TEXT
Output
Failure shows an appropriate error message.
Description
Configures an existing IP address range object.
Syntax
set address-range
<name> [ name
<name> ] [ start-ipv4
<start-ipv4> ] [ end-ipv4
<end-ipv4> ] [ dhcp-exclude-ip-addr
<dhcp-exclude-ip-addr> ]
Parameters
Parameter |
Description |
---|---|
dhcp-exclude-ip-addr |
Indicates if the object’s IP address(es) is excluded from internal DHCP daemon Options: on, off |
end-ipv4 |
The end of the IP range |
name |
Network Object name Type: String |
start-ipv4 |
The beginning of the IP range |
Example
set address-range TEXT name TEXT start-ipv4 192.168.1.1 end-ipv4 192.168.1.1 dhcp-exclude-ip-addr on
Output
Failure shows an appropriate error message.
Description
Shows settings of a configured IP address range object.
Syntax
show address-range
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name Type: String |
Example
show address-range TEXT
Output
Failure shows an appropriate error message.
Description
Shows settings of all configured IP address range objects.
Syntax
show address-ranges
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show address-ranges
Output
Failure shows an appropriate error message.
Description
Adds a specific IPv4 address or a network IPv4 address from which the administrator can remotely access the appliance.
Syntax
add admin-access-ipv4-address
{single-ipv4-address|network-ipv4-address} <ip_addr> {subnet-mask <netmask>|mask-length <mask_length>}
Parameters
Parameter |
Description |
---|---|
ip_addr |
IPv4 address |
mask_length |
Interface mask length, a value between 1 - 32 |
netmask |
Interface IPv4 address subnet mask |
Return Value
0 on success, 1 on failure
Example
add admin-access-ipv4-address network-ipv4-address 1.1.1.1 subnet-mask 255.255.255.0
Output
Success shows OK. Failure shows an appropriate error message.
Description
Configures various parameters for administrator access to the device via web/SSH.
Syntax
set admin-access [ interfaces { Wireless access
<access> | VPN access
<access> | LAN access
<access> | any access { allow | block } | WAN access
<access> } ] [ web-access-port
<web-access-port> ] [ ssh-access-port
<ssh-access-port> ] [ support-weak-tls-version
<support-weak-tls-version> ] [ allowed-ipv4-addresses
<allowed-ipv4-addresses> ]
Parameters
Parameter |
Description |
---|---|
access |
Enable administrator access from the Internet (clear traffic from external interfaces) Type: Boolean (true/false) |
allowed-ipv4- addresses |
Administrator access permissions policy for source IP addresses Options: any, from-ip-list, any-except-internet |
ssh-access-port |
SSH Port Type: Port number |
support-weak-tls- version |
For security reasons, it is highly recommended never to change this parameter’s value. Support of TLSv1.0 will be added back to the administration portal to allow connectivity with old browsers (usually ones released prior to 2014). Changing the default of this parameter exposes the administration portal to at- tacks that use vulnerabilities like Heartbleed (CVE-2014-0160). Type: Boolean (true/false) |
web-access-port |
Web Port (HTTPS) Type: Port number |
Example
set admin-access interfaces Wireless access true web-access-port 8080
ssh-access-port 8080 support-weak-tls-version true allowed-ipv4-addresses any
Output
Failure shows an appropriate error message.
Description
Shows settings of administrator access configuration.
Syntax
show admin-access
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show admin-access
Output
Failure shows an appropriate error message.
Description
Show all the configured IP addresses that are permitted for administrator access to the appliance.
Syntax
show admin-access-ip-addresses
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show admin-access-ip-addresses
Output
Failure shows an appropriate error message.
Description
Delete all the reserved IP addresses for administrator access.
Syntax
delete admin-access-ip-address-all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete admin-access-ip-address-all
Output
Failure shows an appropriate error message.
Adds a specific IPv4 address or an IPv4 address network and mask from which the administrator can remotely access the appliance according to configuration.
Description
Adds a specific IPv4 address from which the administrator can remotely access the appliance according to configuration.
Syntax
add admin-access-ipv4-address single-ipv4-address
<single-ipv4-address>
Parameters
Parameter |
Description |
---|---|
single-ipv4-address |
IP address Type: IP address |
Example
add admin-access-ipv4-address single-ipv4-address 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Adds an IPv4 address network and mask from which the administrator can remotely access the appliance according to configuration.
Syntax
add admin-access-ipv4-address network-ipv4-address
<network-ipv4-address> { subnet-mask
<subnet-mask> | [ mask-length
<mask-length> ] }
Parameters
Parameter |
Description |
---|---|
mask-length |
Subnet mask length Type: A string that contains numbers only |
network-ipv4-address |
IP address Type: IP address |
subnet-mask |
Subnet mask Type: Subnet mask |
Example
add admin-access-ipv4-address network-ipv4-address 192.168.1.1 subnet-mask 255.255.255.0
Output
Failure shows an appropriate error message
Description
Deletes a specific IPv4 address or an IPv4 network and subnet from which the administrator can remotely access the appliance according to configuration.
Syntax
delete admin-access-ipv4-address
<ipv4-address>
Parameters
Parameter |
Description |
---|---|
ipv4-address |
IP address Type: IP address |
Example
delete admin-access-ipv4-address 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Shows allowed IP addresses for admin access.
Syntax
show admin-access-ipv4-addresses
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show admin-access-ipv4-addresses
Output
Failure shows an appropriate error message.
Description
Deletes all configured IPv4 addresses from which the administrator can remotely access the appliance according to configuration.
Syntax
delete admin-access-ipv4-address-all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete admin-access-ipv4-address-all
Output
Failure shows an appropriate error message.