Description
Adds a new user who can access the administration web portal and SSH.
Syntax
add administrator username
<username> [ password-hash
<password-hash> ] permission
<permission>
Parameters
Parameter |
Description |
---|---|
password-hash |
Virtual field used for calculating a hashed password Type: An encrypted password |
permission |
The administrator role and permissions Options: read-write, readonly, networking |
username |
Indicates the administrator user name Type: A string that contains [A-Z], [0-9], and ’_’ characters |
Example
add administrator username admin password-hash TZXPLs20bN0RA permission read-write
Output
Failure shows an appropriate error message.
Description
Deletes an existing defined administrator. The system will not allow deletion of the last administrator.
Syntax
delete administrator username
<username>
Parameters
Parameter |
Description |
---|---|
username |
Indicates the administrator user name Type: A string that contains [A-Z], [0-9], and ’_’ characters |
Example
delete administrator username admin
Output
Failure shows an appropriate error message.
Configures an existing user with administrator privileges.
Description
Configures a new password for an existing administrator. You will be prompted to add a new password following this command (this command cannot be used in a script).
Syntax
set administrator username
<username> password
Parameters
Parameter |
Description |
---|---|
username |
Indicates the administrator user name Type: A string that contains [A-Z], [0-9], and ’_’ characters |
Example
set administrator username admin password
Output
Failure shows an appropriate error message.
Description
Configures an existing administrator’s permission level and password (by hash).
Syntax
set administrator username
<username> permission
<permission> [ password-hash
<password-hash> ]
Parameters
Parameter |
Description |
---|---|
password-hash |
Virtual field used for calculating a hashed password Type: An encrypted password |
permission |
The administrator role and permissions Options: read-write, readonly, networking |
username |
Indicates the administrator user name Type: A string that contains [A-Z], [0-9], and ’_’ characters |
Example
set administrator username admin permission read-write password-hash TZXPLs20bN0RA
Output
Failure shows an appropriate error message.
Configure users with administrator privileges through a RADIUS server.
Description
Configures users with administrator privileges through a RADIUS server.
Syntax
set administrators radius-auth { true [ use-radius-groups { true
radius-groups
<radius-groups> | false } ] [ permission
<permission> ] | false
}
Parameters
Parameter |
Description |
---|---|
permission |
Administrators role Options: read-write, readonly, networking |
radius-auth |
Administrators RADIUS authentication Type: Boolean (true/false) |
radius-groups |
RADIUS groups for authentication. Example: RADIUS-group1, RADIUS-class2 Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’, ’,’ and space characters |
use-radius-groups |
Use RADIUS groups for authentication Type: Boolean (true/false) |
Example
set administrators radius-auth true use-radius-groups true radius-groups My group permission read-write
Output
Failure shows an appropriate error message.
Description
Shows settings of an existing user with administrator privileges.
Syntax
show administrator username
<username>
Parameters
Parameter |
Description |
---|---|
username |
Indicates the administrator user name Type: A string that contains [A-Z], [0-9], and ’_’ characters |
Example
show administrator username admin
Output
Failure shows an appropriate error message.
Shows settings of all users with administrator privileges.
Description
Shows settings of all users with administrator privileges.
Syntax
show administrators
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show administrators
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of all users with administrator privileges.
Syntax
show administrators advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show administrators advanced-settings
Output
Failure shows an appropriate error message.
Description
Shows RADIUS related settings for users with administrator privileges.
Syntax
show administrators radius-auth
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show administrators radius-auth
Output
Failure shows an appropriate error message.
Description
Configures session settings for administrators. The settings are global for all administrators.
Syntax
set administrator session-settings [ lockout-enable
<lockout-enable> ] [ max-lockout-attempts
<max-lockout-attempts> ] [ lock-period
<lock-period>
] [ inactivity-timeout
<inactivity-timeout> ] [ password-complexity-level
<password-complexity-level> ] [ password-expiration-timeout
<password-expiration-timeout> ]
Parameters
Parameter |
Description |
---|---|
inactivity-timeout |
Allowed web interface session idle time before automatic logout is executed (in minutes) Type: A number with no fractional part (integer) |
lock-period |
Once locked out, the administrator will be unable to login for this long Type: A number with no fractional part (integer) |
lockout-enable |
Limit administrators login failure attempts Options: on, off |
max-lockout-attempts |
The maximum number of consecutive login failure attempts before the administrator is locked out Type: A number with no fractional part (integer) |
password-complexity-level |
Set of additional restrictions on administrator passwords, according to the selected mode Options: low, high |
password-expiration-timeout |
Number of days before administrator is required to change his password. Takes effect only if password complexity level is set to ’high’ Type: A number with no fractional part (integer) |
Example
set administrator session-settings lockout-enable on max-lockout-attempts
5 lock-period 5 inactivity-timeout 5 password-complexity-level
low password-expiration-timeout 5
Output
Failure shows an appropriate error message.
Description
Shows session settings for users with administrator privileges.
Syntax
show administrator session-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show administrator session-settings
Output
Failure shows an appropriate error message.
Description
Shows statistics regarding the DSL internet connection (applicable on appliance models with DSL).
Syntax
show adsl statistics
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show adsl statistics
Output
Failure shows an appropriate error message.
Configures aggressive aging feature’s behavior. Aggressive Aging is designed to optimize how the device is dealing with a large connection number by aggressively reducing the timeout of existing connections when necessary.
Description
Configures aggressive aging default reduced timeouts.
Syntax
set aggressive-aging [ icmp-timeout
<icmp-timeout> ] [ icmp-timeout-enable
<icmp-timeout-enable> ] [ other-timeout
<other-timeout> ] [ other-timeout-enable
<other-timeout-enable> ] [ pending-timeout
<pending-timeout> ] [ pending-timeout-enable
<pending-timeout-enable>
] [ tcp-end-timeout
<tcp-end-timeout> ] [ tcp-end-timeout-enable
<tcp-end-timeout-enable> ] [ tcp-start-timeout
<tcp-start-timeout> ] [ tcp-start-timeout-enable
<tcp-start-timeout-enable> ] [ tcp-timeout
<tcp-timeout> ] [ tcp-timeout-enable
<tcp-timeout-enable> ] [
udp-timeout
<udp-timeout> ] [ udp-timeout-enable
<udp-timeout-enable>
] [ general
<general> ] [ log
<log> ] [ connt-limit-high-watermark-pct
<connt-limit-high-watermark-pct> ] [ connt-mem-high-watermark-pct
<connt-mem-high-watermark-pct> ] [ memory-conn-status
<memory-conn-status> ]
Parameters
Parameter |
Description |
---|---|
connt-limit-high- watermark-pct |
Connection table percentage limit Type: A number with no fractional part (integer) |
connt-mem-high- watermark-pct |
Memory consumption percentage limit Type: A number with no fractional part (integer) |
general |
Enable aggressive aging of connections Type: Boolean (true/false) |
icmp-timeout |
ICMP connections reduced timeout Type: A number with no fractional part (integer) |
icmp-timeout-enable |
Enable reduced timeout for ICMP connections Type: Boolean (true/false) |
log |
Tracking options for aggressive aging Options: log, none |
memory-conn-status |
Choose when aggressive aging timeouts are enforced Options: both, connections, memory |
other-timeout |
Other IP protocols reduced timeout Type: A number with no fractional part (integer) |
other-timeout-enable |
Enable reduced timeout for non TCP/UDP/ICMP connections Type: Boolean (true/false) |
pending-timeout |
Pending Data connections reduced timeout Type: A number with no fractional part (integer) |
pending-timeout- enable |
Enable reduced timeout for non TCP/UDP/ICMP connections Type: Boolean (true/false) |
tcp-end-timeout |
TCP termination reduced timeout Type: A number with no fractional part (integer) |
tcp-end-timeout- enable |
Enable reduced timeout for TCP termination Type: Boolean (true/false) |
tcp-start-timeout |
TCP handshake reduced timeout Type: A number with no fractional part (integer) |
tcp-start-timeout- enable |
Enable reduced timeout for TCP handshake Type: Boolean (true/false) |
tcp-timeout |
TCP session reduced timeout Type: A number with no fractional part (integer) |
tcp-timeout-enable |
Enable reduced timeout for TCP session Type: Boolean (true/false) |
udp-timeout |
UDP connections reduced timeout Type: A number with no fractional part (integer) |
udp-timeout-enable |
Enable reduced timeout for UDP connections Type: Boolean (true/false) |
Example
set aggressive-aging icmp-timeout 30 icmp-timeout-enable true other-timeout 30 other-timeout-enable true pending-timeout 30 pending-timeout-enable true tcp-end-timeout 3600 tcp-end-timeout-enable true tcp-start-timeout 3600 tcp-start-timeout-enable true tcp-timeout
3600 tcp-timeout-enable true udp-timeout 3600 udp-timeout-enable true general true log log connt-limit-high-watermark-pct 80
connt-mem-high-watermark-pct 80 memory-conn-status both
Output
Failure shows an appropriate error message.
Description
Configures aggressive aging advanced settings.
Syntax
set aggressive-aging advanced-settings connections [ other-timeout-enable
<other-timeout-enable> ] [ connt-limit-high-watermark-pct
<connt-limit-high-watermark-pct>
] [ tcp-start-timeout-enable
<tcp-start-timeout-enable> ] [ icmp-timeout-enable
<icmp-timeout-enable> ] [ general
<general>
] [ tcp-timeout-enable
<tcp-timeout-enable> ] [ tcp-timeout
<tcp-timeout> ] [ tcp-start-timeout
<tcp-start-timeout> ] [
udp-timeout-enable
<udp-timeout-enable> ] [ udp-timeout
<udp-timeout>
] [ pending-timeout-enable
<pending-timeout-enable> ] [ log
<log>
] [ connt-mem-high-watermark-pct
<connt-mem-high-watermark-pct> ] [ tcp-end-timeout-enable
<tcp-end-timeout-enable> ] [ icmp-timeout
<icmp-timeout> ] [ tcp-end-timeout
<tcp-end-timeout> ] [ memory-conn-status
<memory-conn-status> ] [ pending-timeout
<pending-timeout> ] [ other-timeout
<other-timeout> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set aggressive-aging advanced-settings connections other-timeout-enable true connt-limit-high-watermark-pct -1000000 tcp-start-timeout-enable true icmp-timeout-enable true general true tcp-timeout-enable true tcp-timeout
-1000000 tcp-start-timeout -1000000 udp-timeout-enable true udp-timeout
-1000000 pending-timeout-enable true log log connt-mem-high-watermark-pct
-1000000 tcp-end-timeout-enable true icmp-timeout -1000000 tcp-end-timeout
-1000000 memory-conn-status both pending-timeout -1000000 other-timeout
-1000000
Output
Failure shows an appropriate error message.
Shows aggressive aging settings.
Description
Shows aggressive aging settings.
Syntax
show aggressive-aging
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show aggressive-aging
Output
Failure shows an appropriate error message.
Description
Shows aggressive aging advanced settings.
Syntax
show aggressive-aging advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show aggressive-aging advanced-settings
Output
Failure shows an appropriate error message.
Configures policy for Anti-Spam blade.
Description
Configures the policy for Anti-Spam blade.
Syntax
set antispam [ mode
<mode> ] [ detection-method
<detection-method> ] [ log
<log> ] [ action-spam-email-content
<action-spam-email-content> ] [ flag-subject-stamp
<flag-subject-stamp> ] [ detect-mode
<detect-mode>
] [ specify-suspected-spam-settings { true [ suspected-spam-log
<suspected-spam-log> ] [ action-suspected-spam-email-content
<action-suspected-spam-email-content> ] [ flag-suspected-spam-subject-stamp
<flag-suspected-spam-subject-stamp> ] | false } ]
Parameters
Parameter |
Description |
---|---|
action-spam-email- content |
Action to be used upon spam detection in email content: block, flag-header, flag-subject Options: block, flag-header, flag-subject |
action-suspected- spam-email-content |
Action to be used upon suspected spam detection in email content: block, flag-header, flag-subject Options: block, flag-header, flag-subject |
detect-mode |
Detect-Only mode: on, off Type: Boolean (true/false) |
detection-method |
Type of spam detection: Either Sender’s IP address or both Sender’s IP address and content based detection Options: email-content, sender-ipaddr-reputation-only |
flag-subject-stamp |
Text to add to spam emails’ subject (depends on action chosen for detected spam) Type: A string of alphanumeric characters with space between them |
flag-suspected-spam- subject-stamp |
Text to add to suspected spam emails subject (depends on action chosen for detected spam) Type: A string of alphanumeric characters with space between them |
log |
Tracking options for spam emails: log, alert or none Options: none, log, alert |
mode |
Anti-Spam blade mode: on, off Options: on, off |
specify-suspected- spam-settings |
Handle suspected spam emails differently from spam emails Type: Boolean (true/false) |
suspected-spam-log |
Tracking options for suspected spam emails: log, alert or none Options: none, log, alert |
Example
set antispam mode on detection-method email-content log none
action-spam-email-content block flag-subject-stamp several words detect-mode true specify-suspected-spam-settings true suspected-spam-log none
action-suspected-spam-email-content block flag-suspected-spam-subject-stamp several words
Output
Failure shows an appropriate error message.
Description
Configures advanced setting for the Anti-Spam blade.
Syntax
set antispam advanced-settings ip-rep-fail-open
<ip-rep-fail-open>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set antispam advanced-settings ip-rep-fail-open true
Output
Failure shows an appropriate error message.
Description
Configures advanced setting for the Anti-Spam blade.
Syntax
set antispam advanced-settings email-size-scan
<email-size-scan>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set antispam advanced-settings email-size-scan 1024
Output
Failure shows an appropriate error message.
Description
Configures advanced setting for the Anti-Spam blade.
Syntax
set antispam advanced-settings scan-outgoing
<scan-outgoing>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set antispam advanced-settings scan-outgoing true
Output
Failure shows an appropriate error message.
Description
Configures advanced setting for the Anti-Spam blade.
Syntax
set antispam advanced-settings spam-engine-timeout
<spam-engine-timeout>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set antispam advanced-settings spam-engine-timeout 15
Output
Failure shows an appropriate error message.
Description
Configures advanced setting for the Anti-Spam blade.
Syntax
set antispam advanced-settings allow-mail-track
<allow-mail-track>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set antispam advanced-settings allow-mail-track none
Output
Failure shows an appropriate error message.
Description
Configures advanced setting for the Anti-Spam blade.
Syntax
set antispam advanced-settings transparent-proxy
<transparent-proxy>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
text
set antispam advanced-settings transparent-proxy true
Output
Failure shows an appropriate error message.
Description
Configures advanced setting for the Anti-Spam blade.
Syntax
set antispam advanced-settings ip-rep-timeout
<ip-rep-timeout>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set antispam advanced-settings ip-rep-timeout 15
Output
Failure shows an appropriate error message.
Description
Configures advanced setting for the Anti-Spam blade.
Syntax
set antispam advanced-settings spam-engine-all-mail-track
<spam-engine-all-mail-track>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set antispam advanced-settings spam-engine-all-mail-track none
Output
Failure shows an appropriate error message.
Shows the configured policy for the Anti-Spam blade.
Description
Shows the configured policy for the Anti-Spam blade.
Syntax
show antispam
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show antispam
Output
Failure shows an appropriate error message.
Description
Shows the advanced settings in the configured policy for the Anti-Spam blade.
Syntax
show antispam advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show antispam advanced-settings
Output
Failure shows an appropriate error message.
Adds a new Anti-Spam "allow" exception.
Description
Adds a new Anti-Spam "allow" exception for a specific IP address.
Syntax
add antispam allowed-sender ipv4-addr
<ipv4-addr>
Parameters
Parameter |
Description |
---|---|
ipv4-addr |
Anti-Spam allowed IP address Type: IP address |
Example
add antispam allowed-sender ipv4-addr 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Adds a new Anti-Spam "allow" exception for a sender email or domain.
Syntax
add antispam allowed-sender sender-or-domain
<sender-or-domain>
Parameters
Parameter |
Description |
---|---|
sender-or-domain |
Anti-Spam allowed domain or sender Type: A domain or email address |
Example
text
add antispam allowed-sender sender-or-domain myEmail@mail.com
Output
Failure shows an appropriate error message.
Deletes an existing Anti-Spam “allow” exception.
Description
Deletes all existing Anti-Spam “allow” exceptions.
Syntax
delete antispam allowed-sender all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete antispam allowed-sender all
Output
Failure shows an appropriate error message.
Description
Deletes an existing Anti-Spam “allow” exception for sender’s email or domain.
Syntax
delete antispam allowed-sender sender-or-domain
<sender-or-domain>
Parameters
Parameter |
Description |
---|---|
sender-or-domain |
Anti-Spam allowed domain or sender Type: A domain name or email address |
Example
delete antispam allowed-sender sender-or-domain myEmail@mail.com
Output
Failure shows an appropriate error message.
Description
Deletes an existing Anti-Spam “allow” exception for a specific IPv4 address.
Syntax
delete antispam allowed-sender ipv4-addr
<ipv4-addr>
Parameters
Parameter |
Description |
---|---|
ipv4-addr |
Anti-Spam allowed IP address Type: IP address |
Example
delete antispam allowed-sender ipv4-addr 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Shows the “allowed” exceptions for the Anti-Spam blade.
Syntax
show antispam allowed-senders
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show antispam allowed-senders
Output
Failure shows an appropriate error message.
Adds a new Anti-Spam "block" exception.
Description
Adds a new Anti-Spam "block" exception for a specific IP address.
Syntax
add antispam blocked-sender ipv4-addr
<ipv4-addr>
Parameters
Parameter |
Description |
---|---|
ipv4-addr |
Anti-Spam blocked IP address Type: IP address |
Example
add antispam blocked-sender ipv4-addr 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Adds a new Anti-Spam "block" exception for a sender email or domain.
Syntax
add antispam blocked-sender sender-or-domain
<sender-or-domain>
Parameters
Parameter |
Description |
---|---|
sender-or-domain |
Anti-Spam blocked domain or sender Type: A domain name or email address |
Example
add antispam blocked-sender sender-or-domain myEmail@mail.com
Output
Failure shows an appropriate error message.
Deletes an existing Anti-Spam "block" exception.
Description
Deletes all existing Anti-Spam “block” exceptions.
Syntax
delete antispam blocked-sender all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete antispam blocked-sender all
Output
Failure shows an appropriate error message.
Description
Deletes an existing Anti-Spam “block” exception for sender’s email or domain.
Syntax
delete antispam blocked-sender sender-or-domain
<sender-or-domain>
Parameters
Parameter |
Description |
---|---|
sender-or-domain |
Anti-Spam blocked domain or sender Type: A domain name or email address |
Example
delete antispam blocked-sender sender-or-domain myEmail@mail.com
Output
Failure shows an appropriate error message.
Description
Deletes an existing Anti-Spam “block” exception for a specific IPv4 address.
Syntax
delete antispam blocked-sender ipv4-addr
<ipv4-addr>
Parameters
Parameter |
Description |
---|---|
ipv4-addr |
Anti-Spam blocked IP address Type: IP address |
Example
delete antispam blocked-sender ipv4-addr 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Shows the “blocked” exceptions for the Anti-Spam blade.
Syntax
show antispam blocked-senders
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show antispam blocked-senders
Output
Failure shows an appropriate error message.
Adds a new custom application object (string or regular expression signature over URL).
Description
Adds a new custom application object (string or regular expression signature over URL).
Syntax
add application application-name
<application-name> category
<category> [ regex-url
<regex-url> ] application-url
<application-url>
Parameters
Parameter |
Description |
---|---|
application-name |
Application name Type: URL |
application-url |
Contains the URLs related to this application |
category |
The primary category for the application (the category which is the most relevant) |
regex-url |
Indicates if regular expressions are used instead of partial strings Type: Boolean (true/false) |
Example
add application application-name http://somehost.example.com category TEXT regex-url true application-url http://somehost.example.com
Output
Failure shows an appropriate error message.
Description
Simplified method for adding a new custom application object (string over URL)
Syntax
add application-url <application-url>
Parameters
Parameter |
Description |
---|---|
application-url |
Application URL |
Example
add application-url http://somehost.example.com
Output
Failure shows an appropriate error message.
Deletes an existing custom application object (string or regular expression signature over URL).
Description
Deletes an existing custom application object by application ID.
Syntax
delete application application-id
<application-id>
Parameters
Parameter |
Description |
---|---|
application-id |
The ID of the application Type: A number with no fractional part (integer) |
Example
delete application application-id 1000000
Output
Failure shows an appropriate error message.
Description
Deletes an existing custom application object by application name.
Syntax
delete application application-name
<application-name>
Parameters
Parameter |
Description |
---|---|
application-name |
Application name Type: URL |
Example
delete application application-name http://somehost.example.com
Output
Failure shows an appropriate error message.
Description
Find an application by name (or partial string) to view further details regarding it.
Syntax
find application
<application-name>
Parameters
Parameter |
Description |
---|---|
application-name |
Application or group name Type: String |
Example
find application TEXT
Output
Failure shows an appropriate error message.
Configures an existing custom application object.
Description
Adds a URL to an existing custom application object by name.
Syntax
set application application-name
<application-name> add url
<url>
Parameters
Parameter |
Description |
---|---|
application-name |
Application name Type: URL |
url |
Application URL |
Example
set application application-name http://somehost.example.com add url http://somehost.example.com
Output
Failure shows an appropriate error message.
Description
Removes a URL from an existing custom application object by name.
Syntax
set application application-name
<application-name> remove url
<url>
Parameters
Parameter |
Description |
---|---|
application-name |
Application name Type: URL |
url |
Application URL |
Example
set application application-name http://somehost.example.com remove url http://somehost.example.com
Output
Failure shows an appropriate error message.
Description
Adds a URL to an existing custom application object by ID.
Syntax
set application application-id
<application-id> add url
<url>
Parameters
Parameter |
Description |
---|---|
application-id |
The ID of the application Type: A number with no fractional part (integer) |
url |
Application URL |
Example
set application application-id 12345678 add url http://somehost.example.com
Output
Failure shows an appropriate error message.
Description
Removes a URL from an existing custom application object by ID.
Syntax
set application application-id
<application-id> remove url
<url>
Parameters
Parameter |
Description |
---|---|
application-id |
The ID of the application Type: A number with no fractional part (integer) |
url |
Application URL |
Example
set application application-id 12345678 remove url http://somehost.example.com
Output
Failure shows an appropriate error message.
Description
Adds a category to an existing custom application object by name.
Syntax
set application application-name
<application-name> add category
<category>
Parameters
Parameter |
Description |
---|---|
application-name |
Application name Type: URL |
category |
Category name |
Example
set application application-name http://somehost.example.com add category TEXT
Output
Failure shows an appropriate error message.
Description
Removes a category from an existing custom application object by name.
Syntax
set application application-name
<application-name> remove category
<category>
Parameters
Parameter |
Description |
---|---|
application-name |
Application name Type: URL |
category |
Category name |
Example
set application application-name http://somehost.example.com remove category TEXT
Output
Failure shows an appropriate error message.
Description
Adds a category to an existing custom application object by ID.
Syntax
set application application-id
<application-id> add category
<category>
Parameters
Parameter |
Description |
---|---|
application-id |
The ID of the application Type: A number with no fractional part (integer) |
category |
Category name |
Example
set application application-id 12345678 add category TEXT
Output
Failure shows an appropriate error message.
Description
Removes a category from an existing custom application object by ID.
Syntax
set application application-id
<application-id> remove category
<category>
Parameters
Parameter |
Description |
---|---|
application-id |
The ID of the application Type: A number with no fractional part (integer) |
category |
Category name |
Example
set application application-id 12345678 remove category TEXT
Output
Failure shows an appropriate error message.
Description
Configures an existing custom application by ID.
Syntax
set application application-id
<application-id> [ category
<category> ] [ regex-url
<regex-url> ]
Parameters
Parameter |
Description |
---|---|
application-id |
The ID of the application Type: A number with no fractional part (integer) |
category |
The primary category for the application (the category which is the most relevant) |
regex-url |
Indicates if regular expressions are used instead of partial strings Type: Boolean (true/false) |
Example
set application application-id 12345678 category TEXT regex-url true
Output
Failure shows an appropriate error message.
Description
Configures an existing custom application by name.
Syntax
set application application-name
<application-name> [ category
<category> ] [ regex-url
<regex-url> ]
Parameters
Parameter |
Description |
---|---|
application-name |
Application name Type: URL |
category |
The primary category for the application (the category which is the most relevant) |
regex-url |
Indicates if regular expressions are used instead of partial strings Type: Boolean (true/false) |
Example
set application application-name http://somehost.example.com category TEXT regex-url true
Output
Failure shows an appropriate error message.
Shows details for a specific application in the Application Control database.
Description
Shows details for a specific application in the Application Control database by application name.
Syntax
show application application-name
<application-name>
Parameters
Parameter |
Description |
---|---|
application-name |
Application or group name Type: String |
Example
show application application-name TEXT
Output
Failure shows an appropriate error message.
Description
Shows details for a specific application in the Application Control database by application ID.
Syntax
show application application-id
<application-id>
Parameters
Parameter |
Description |
---|---|
application-id |
The ID of the application or the group Type: A number with no fractional part (integer) |
Example
show application application-id 12345678
Output
Failure shows an appropriate error message.
Description
Shows details of all applications.
Syntax
show applications
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show applications
Output
Failure shows an appropriate error message.
Description
Configures the default policy for the Application Control and URL filtering blades.
Syntax
set application-control [ mode
<mode> ] [ url-flitering-only
<url-flitering-only> ] [ block-security-categories
<block-security-categories> ] [ block-inappropriate-content
<block-inappropriate-content> ] [ block-other-undesired-applications
<block-other-undesired-applications> ] [ block-file-sharing-applications
<block-file-sharing-applications> ] [ limit-bandwidth { true [ limit-upload { true set-limit
<set-limit> | false } ] [ limit-download { true set-limit
<set-limit> | false } ] | false } ]
Parameters
Parameter |
Description |
---|---|
block-file-sharing- applications |
Block file sharing using torrents and peer-to-peer applications Type: Boolean (true/false) |
block-inappropriate- content |
Control content by blocking Internet access to websites with inappropriate content such as sex, violence, weapons, gambling, and alcohol Type: Boolean (true/false) |
block-other-undesired- applications |
Manually add and block applications or categories of URLs to a group of undesired applications Type: Boolean (true/false) |
block-security- categories |
Block applications and URLs that can be a security risk and are categorized as spyware, phishing, botnet, spam, anonymizer, or hacking Type: Boolean (true/false) |
limit-bandwidth |
Indicates if applications that use a lot of bandwidth are limited (also used for QoS) Type: Boolean (true/false) |
limit-download |
If true, traffic for downloading is limited to the value in maxLimitedDownload Type: Boolean (true/false) |
limit-upload |
If true, traffic for uploading is limited to the value in maxLimitedDownload Type: Boolean (true/false) |
mode |
Applications & URLs mode - true for on, false for off Type: Boolean (true/false) |
set-limit |
The limit, in kbps, for downloading Type: A number with no fractional part (integer) |
url-flitering-only |
Indicates if enable URL Filtering and detection only mode is enabled Type: Boolean (true/false) |
Example
set application-control mode true url-flitering-only true block-security-categories true block-inappropriate-content true
block-other-undesired-applications true block-file-sharing-applications true limit-bandwidth true limit-upload true set-limit 5 limit-download true set-limit 100
Output
Failure shows an appropriate error message.
Description
Shows the configured policy for the Application Control blade
Syntax
show application-control
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show application-control
Output
Failure shows an appropriate error message.
Description
Shows the content of the custom “Other Undesired Applications” group. This group can be chosen to be blocked by default by the Application Control policy.
Syntax
show application-control other-undesired-applications
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show application-control other-undesired-applications
Output
Failure shows an appropriate error message.
Configures Application Control blade’s advanced engine settings.
Description
Configures Application Control blade’s advanced engine settings.
Syntax
set application-control-engine-settings advanced-settings fail-mode
<fail-mode>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set application-control-engine-settings advanced-settings fail-mode allow-all-requests
Output
Failure shows an appropriate error message.
Description
Configures Application Control blade’s advanced engine settings.
Syntax
set application-control-engine-settings advanced-settings
block-requests-when-web-service-unavailable
<block-requests-when-web-service-unavailable>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set application-control-engine-settings advanced-settings block-requests-when-web-service-unavailable true
Output
Failure shows an appropriate error message.
Description
Configures Application Control blade’s advanced engine settings.
Syntax
set application-control-engine-settings advanced-settings enforce-safe-search
<enforce-safe-search>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set application-control-engine-settings advanced-settings enforce-safe-search true
Output
Failure shows an appropriate error message.
Description
Configures Application Control blade’s advanced engine settings.
Syntax
set application-control-engine-settings advanced-settings web-site-categorization-mode
<web-site-categorization-mode>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set application-control-engine-settings advanced-settings web-site-categorization-mode background
Output
Failure shows an appropriate error message.
Description
Configures Application Control blade’s advanced engine settings.
Syntax
set application-control-engine-settings advanced-settings track-browse-time
<track-browse-time>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set application-control-engine-settings advanced-settings track-browse-time true
Output
Failure shows an appropriate error message.
Description
Configures Application Control blade’s advanced engine settings.
Syntax
set application-control-engine-settings advanced-settings http-referrer-identification
<http-referrer-identification>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set application-control-engine-settings advanced-settings http-referrer-identification true
Output
Failure shows an appropriate error message.
Description
Configures Application Control blade’s advanced engine settings.
Syntax
set application-control-engine-settings advanced-settings
categorize-cached-and-translated-pages
<categorize-cached-and-translated-pages>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set application-control-engine-settings advanced-settings categorize-cached-and-translated-pages true
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of the Application Control blade.
Syntax
show application-control-engine-settings advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show application-control-engine-settings advanced-settings
Output
Failure shows an appropriate error message.
Description
Adds a new group object for applications.
Syntax
add application-group name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Application group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - . &) characters without spaces |
Example
add application-group name users
Output
Failure shows an appropriate error message.
Deletes an existing group object of applications.
Description
Deletes an existing group object of applications by group object name.
Syntax
delete application-group name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Application group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - . &) characters without spaces |
Example
delete application-group name users
Output
Failure shows an appropriate error message.
Description
Deletes an existing group object of applications by group object ID.
Syntax
delete application-group application-group-id
<application-group-id>
Parameters
Parameter |
Description |
---|---|
application-group-id |
The ID of the application group Type: A number with no fractional part (integer) |
Example
delete application-group application-group-id 12345678
Output
Failure shows an appropriate error message.
Configures an existing application group object.
Description
Adds an application to an existing application group object by application’s name.
Syntax
set application-group name
<name> add application-name
<application-name>
Parameters
Parameter |
Description |
---|---|
application-name |
Application or group name |
name |
Application group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - . &) characters without spaces |
Example
set application-group name users add application-name hasMany
Output
Failure shows an appropriate error message.
Description
Removes an application from an existing application group object by application’s name.
Syntax
set application-group name
<name> remove application-name
<application-name>
Parameters
Parameter |
Description |
---|---|
application-name |
Application or group name |
name |
Application group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - . &) characters without spaces |
Example
set application-group name users remove application-name hasMany
Output
Failure shows an appropriate error message.
Description
Adds an application to an existing application group object by application’s ID.
Syntax
set application-group name
<name> add application-id
<application-id>
Parameters
Parameter |
Description |
---|---|
application-id |
The ID of the application or the group |
name |
Application group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - . &) characters without spaces |
Example
set application-group name users add application-id hasMany
Output
Failure shows an appropriate error message.
Description
Removes an application from an existing application group object by application’s ID.
Syntax
set application-group name
<name> remove application-id
<application-id>
Parameters
Parameter |
Description |
---|---|
application-id |
The ID of the application or the group |
name |
Application group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - . &) characters without spaces |
Example
set application-group name users remove application-id hasMany
Output
Failure shows an appropriate error message.
Description
Adds an application to an existing application group object by application’s name using group object’s ID.
Syntax
set application-group application-group-id
<application-group-id> add application-name
<application-name>
Parameters
Parameter |
Description |
---|---|
application-group-id |
The ID of the application group Type: A number with no fractional part (integer) |
application-name |
Application or group name |
Example
set application-group application-group-id 12345678 add application-name hasMany
Output
Failure shows an appropriate error message.
Description
Removes an application from an existing application group object by application’s name using group object’s ID.
Syntax
set application-group application-group-id
<application-group-id> remove application-name
<application-name>
Parameters
Parameter |
Description |
---|---|
application-group-id |
The ID of the application group Type: A number with no fractional part (integer) |
application-name |
Application or group name |
Example
set application-group application-group-id 12345678 remove application-name hasMany
Output
Failure shows an appropriate error message.
Description
Adds an application to an existing application group object by application’s ID using group object’s ID.
Syntax
set application-group application-group-id
<application-group-id> add application-id
<application-id>
Parameters
Parameter |
Description |
---|---|
application-group-id |
The ID of the application group Type: A number with no fractional part (integer) |
application-id |
The ID of the application or the group |
Example
set application-group application-group-id 12345678 add application-id hasMany
Output
Failure shows an appropriate error message.
Description
Removes an application from an existing application group object by application’s ID using group object’s ID.
Syntax
set application-group application-group-id
<application-group-id> remove application-id
<application-id>
Parameters
Parameter |
Description |
---|---|
application-group-id |
The ID of the application group Type: A number with no fractional part (integer) |
application-id |
The ID of the application or the group |
Example
set application-group application-group-id 12345678 remove application-id hasMany
Output
Failure shows an appropriate error message.
shows the configuration of the Application group objects.
Description
Shows the configuration of a specific application group object by ID.
Syntax
show application-group application-group-id
<application-group-id>
Parameters
Parameter |
Description |
---|---|
application-group-id |
The ID of the application group Type: A number with no fractional part (integer) |
Example
show application-group application-group-id 12345678
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a specific application group object by name.
Syntax
show application-group name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Application group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - . &) characters without spaces |
Example
show application-group name users
Output
Failure shows an appropriate error message.
Description
Shows the configuration of all specific application group objects.
Syntax
show application-groups
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show application-groups
Output
Failure shows an appropriate error message.
Description
Configures the activation of the IP address Anti-Spoofing feature.
Syntax
set antispoofing advanced-settings global-activation
<global-activation>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set antispoofing advanced-settings global-activation true
Output
Failure shows an appropriate error message.
Description
Shows the configuration for IP addresses Anti-Spoofing functionality.
Syntax
show antispoofing advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show antispoofing advanced-settings
Output
Failure shows an appropriate error message.
Description
Creates a backup file that contains the current settings for the appliance and saves them to a file. The file is saved to either a USB device or TFTP server. You can use these options when the backup file is created:
Syntax
backup settings to {usb|tftp server
<serverIP>} [filename
<filename>] [file-encryption {off|on password
<pass>}] [backup-policy {on|off}] [add-comment
<comment>]
Parameters
Parameter |
Description |
---|---|
|
Comment that is added to the file. |
|
Name of the backup file. |
|
Password for the file. Alphanumeric and special characters are allowed. |
|
IPv4 address of the TFTP server. |
Return Value
0 on success, 1 on failure
Example
backup settings to usb file-encryption on password admin backup-policy on add-comment check_point_new_configuration
Output
Success prints OK. Failure shows an appropriate error message.
Comments
When saving the backup file to a USB device, the backup settings command fails if there are two USB devices connected to the appliance.
Description
Shows previous backup information of the appliance's settings.
show backup-settings-log
shows the log file of previous backup settings operations.
Syntax
show backup-settings-{log|info {from tftp server
<server> filename
<file>|from usb filename
<file>}}
Parameters
Parameter |
Description |
---|---|
|
IP address or host name of the TFTP server |
|
Name of backup file |
Example
show backup-settings-log
show backup-settings-info from usb filename backup
Output
Success shows backup settings information. Failure shows an appropriate error message.
Configures schedule for Software Blade updates.
Description
Configures schedule forSoftware Blades updates.
Syntax
set blade-update-schedule [ schedule-ips
<schedule-ips> ] [ schedule-anti-bot
<schedule-anti-bot> ] [ schedule-anti-virus
<schedule-anti-virus> ] [ schedule-appi
<schedule-appi> ] [ recurrence { daily time
<time> | weekly day-of-week
<day-of-week> time
<time> | hourly hour-interval
<hour-interval> | monthly day-of-month
<day-of-month> time
<time> } ]
Parameters
Parameter |
Description |
---|---|
day-of-month |
If the update occurs monthly, this is the day in which it occurs Type: A number with no fractional part (integer) |
day-of-week |
If the update occurs weekly, this is the weekday in which it occurs Options: sunday, monday, tuesday, wednesday, thursday, friday, saturday |
hour-interval |
If the update occurs hourly, this indicates the hour interval between each update Type: A number with no fractional part (integer) |
recurrence |
The recurrence of the updates - hourly, daily, weekly or monthly Type: Press TAB to see available options |
schedule-anti-bot |
Indicates if Anti-Bot blade is automatically updated according to configured schedule Type: Boolean (true/false) |
schedule-anti-virus |
Indicates if Anti-Virus blade is automatically updated according to configured schedule Type: Boolean (true/false) |
schedule-appi |
Indicates if Application Control blade is automatically updated according to configured schedule Type: Boolean (true/false) |
schedule-ips |
Indicates if IPS blade is automatically updated according to configured schedule Type: Boolean (true/false) |
time |
The hour of the update (Format: HH:MM in 24 hour clock) Type: A time format hh:mm |
Example
set blade-update-schedule schedule-ips true schedule-anti-bot true schedule-anti-virus true schedule-appi true recurrence daily time 23:20
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for Software Blade updates.
Syntax
set blade-update-schedule advanced-settings max-num-of-retries
<max-num-of-retries>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set blade-update-schedule advanced-settings max-num-of-retries 10
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for Software Blade updates.
Syntax
set blade-update-schedule advanced-settings timeout-until-retry
<timeout-until-retry>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set blade-update-schedule advanced-settings timeout-until-retry 10
Output
Failure shows an appropriate error message.
Shows the configuration of Software Blade updates schedule.
Description
Shows the configuration of Software Blade updates schedule
Syntax
show blade-update-schedule
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show blade-update-schedule
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of Software Blade updates schedule.
Syntax
show blade-update-schedule advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show blade-update-schedule advanced-settings
Output
Failure shows an appropriate error message.
Description
Adds a new bookmark link that will appear for VPN remote access users in the SNX VPN remote access landing page.
Syntax
add bookmark label
<label> url
<url> [ tooltip
<tooltip> ] [ type
<type> ] [ is-global
<is-global> ] [ user-name
<user-name> ] [ password
<password> ] [ screen-width
<screen-width> ] [ screen-height
<screen-height> ]
Parameters
Parameter |
Description |
---|---|
is-global |
Indicates if the bookmark will be displayed for all remote access users Type: Boolean (true/false) |
label |
Text for the bookmark in the SSL Network Extender portal Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
password |
The password for remote desktop connection Type: A string that contains alphanumeric and special characters |
screen-height |
The height of the screen when the bookmark is remote desktop Type: A number with no fractional part (integer) |
screen-width |
The width of the screen when the bookmark is remote desktop Type: A number with no fractional part (integer) |
tooltip |
Tooltip for the bookmark in the SSL Network Extender portal Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
type |
The type of the bookmark - link or remote desktop connection Options: link, rdp |
url |
Bookmark URL - should start with Type: URL |
user-name |
The user name for remote desktop connection Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
add bookmark label myLabel url http://www.checkpoint.com/ tooltip “This is a comment.” type link is-global true user-name admin password a(&7Ba screen-width 1920 screen-height 1080
Output
failure shows an appropriate error message.
Deletes an existing bookmark link that appears in the SNX VPN remote access landing page.
Description
Deletes an existing bookmark link by label.
Syntax
delete bookmark label
<label>
Parameters
Parameter |
Description |
---|---|
label |
Text for the bookmark in the SSL Network Extender portal Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
delete bookmark label myLabel
Output
Failure shows an appropriate error message.
Description
Deletes all existing bookmark links.
Syntax
delete bookmark all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete bookmark all
Output
Failure shows an appropriate error message.
Description
Configures an existing bookmark shown to users in the SNX landing page.
Syntax
set bookmark [ label
<label> ] [ new-label
<new-label> ] [ url
<url> ] [ tooltip
<tooltip> ] [ type
<type> ] [ is-global
<is-global> ] [ user-name
<user-name> ] [ password
<password> ] [ screen-width
<screen-width> ] [ screen-height
<screen-height> ]
Parameters
Parameter |
Description |
---|---|
is-global |
Indicates if the bookmark will be displayed for all remote access users Type: Boolean (true/false) |
label |
Text for the bookmark in the SSL Network Extender portal Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
new-label |
Text for the bookmark in the SSL Network Extender portal Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
password |
The password for remote desktop connection Type: A string that contains alphanumeric and special characters |
screen-height |
The height of the screen when the bookmark is remote desktop Type: A number with no fractional part (integer) |
screen-width |
The width of the screen when the bookmark is remote desktop Type: A number with no fractional part (integer) |
tooltip |
Tooltip for the bookmark in the SSL Network Extender portal Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
type |
The type of the bookmark - link or remote desktop connection Options: link, rdp |
url |
Bookmark URL - should start with http:// or https:// for a bookmark of type link Type: URL |
user-name |
The user name for remote desktop connection Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
set bookmark label myLabel new-label myNewLabel url http://www.checkpoint.com/ tooltip myToolTip type link is-global true user-name admin password a(&7Ba screen-width 1920 screen-height
1080
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a bookmark defined to be shown to users when connecting to the SNX portal using remote access VPN.
Syntax
show bookmark label
<label>
Parameters
Parameter |
Description |
---|---|
label |
Text for the bookmark in the SSL Network Extender portal Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
show bookmark label myLabel
Output
Failure shows an appropriate error message.
Description
Shows all bookmarks defined to be shown to users when connecting to the SNX portal using remote access VPN.
Syntax
show bookmarks
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show bookmarks
Output
Failure shows an appropriate error message.
Description
Adds a new bridge.
Syntax
add bridge [ name
<name> ]
Parameters
Parameter |
Description |
---|---|
name |
Bridge name Type: A bridge name should be br0-9 |
Example
add bridge name br7
Output
Failure shows an appropriate error message.
Description
Deletes an existing bridge.
Syntax
delete bridge
<name>
Parameters
Parameter |
Description |
---|---|
name |
Bridge name Type: A bridge name should be br0-9 |
Example
delete brdige br7
Output
Failure shows an appropriate error message.
Configures an existing bridge interface.
Description
Configures an existing bridge interface.
Syntax
set bridge
<name> stp
<stp>
Parameters
Parameter |
Description |
---|---|
name |
Bridge name Type: A bridge name should be br0-9 |
stp |
Spanning Tree Protocol mode Options: on, off |
Example
set bridge br7 stp on
Output
Failure shows an appropriate error message.
Description
Adds an existing network/interface to an existing bridge.
Syntax
set bridge
<name> add member
<member>
Parameters
Parameter |
Description |
---|---|
member |
Network name |
name |
Bridge name Type: A bridge name should be br0-9 |
Example
set bridge br7 add member My_Network
Output
Failure shows an appropriate error message.
Description
Removes an existing network/interface from an existing bridge.
Syntax
set bridge
<name> remove member
<member>
Parameters
Parameter |
Description |
---|---|
member |
Network name |
name |
Bridge name Type: A bridge name should be br0-9 |
Example
set bridge br7 remove member My_Network
Output
Failure shows an appropriate error message.
Description
Shows configuration and statistics of a defined bridge.
Syntax
show bridge
<name>
Parameters
Parameter |
Description |
---|---|
name |
Bridge name Type: A bridge name should be br0-9 |
Example
show bridge br7
Output
Failure shows an appropriate error message.
Description
Shows details of all defined bridges.
Syntax
show bridges
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show bridges
Output
Failure shows an appropriate error message.
Description
Shows current system date and time.
Syntax
show clock
Parameters
Parameter |
Description |
---|---|
|
|
Example
show clock
Output
Success shows date and time. Failure shows an appropriate error message.
Description
Configures different settings for zero-touch deployment. Command is relevant to preset files.
Syntax
set cloud-deployment [ cloud-url
<cloud-url> ] [ gateway-name
<gateway-name>
] [ template
<template> ] [ container
<container> ]
Parameters
Parameter |
Description |
---|---|
cloud-url |
The DNS or IP address through which the device will connect to the cloud service Type: URL |
container |
Container Type: String |
gateway-name |
The appliance name used to identify the gateway Type: A string that contains [A-Z], [0-9] and ’-’ characters |
template |
Template Type: String |
Example
set cloud-deployment cloud-url http://www.checkpoint.com/ gateway-name My-appliance template TEXT container TEXT
Output
Failure shows an appropriate error message.
Description
Shows the configuration of cloud management connection.
Syntax
show cloud-deployment
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show cloud-deployment
Output
Failure shows an appropriate error message.
Description
Force sending a report to Cloud Services.
Syntax
send cloud-report type
<type>
Parameters
Parameter |
Description |
---|---|
type |
The report type Options: top-last-hour, top-last-day, top-last-week, top-last-month, 3d |
Example
send cloud-report type top-last-hour
Output
Failure shows an appropriate error message.
Description
Force a manual reconnection to Cloud Services.
Syntax
reconnect cloud-services
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
reconnect cloud-services
Output
Failure shows an appropriate error message.
Configures settings for cloud/SMP management connection.
Description
Configures settings for cloud/SMP management connection.
Syntax
set cloud-services [ { [ activation-key
<activation-key> ] | [ [ service-center
<service-center> ] [ gateway-id
<gateway-id> ] [
registration-key
<registration-key> ] ] } ] [ confirm-untrusted-certificate
<confirm-untrusted-certificate> ] [ mode
<mode> ]
Parameters
Parameter |
Description |
---|---|
activation-key |
A key received from the Cloud Services provider which is used to initialize the connection to the Cloud Services Type: String |
confirm-untrusted-certificate |
Is the service center URL is a trusted certificate Type: Boolean (true/false) |
gateway-id |
Gateway id (in the format <gateway name>.<portal name>). This is not needed if an activation-key was configured. Type: cloudGwName |
mode |
Indicates if the device is managed by a cloud service Options: off, on |
registration-key |
Registration key that acts as a password when connecting to the cloud service for the first time. This is not needed if an activation-key was configured. Type: A registration key |
service-center |
The DNS or IP address through which the device will connect to the cloud service for the first time. This is not needed if an activation-key was configured. Type: URL |
Example
set cloud-services activation-key TEXT confirm-untrusted-certificate true mode off
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for cloud/SMP management connection.
Syntax
set cloud-services advanced-settings cloud-management-configuration [ smp-login
<smp-login> ] [ show-mgmt-server-details-on-login
<show-mgmt-server-details-on-login> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set cloud-services advanced-settings cloud-management-configuration smp-login true show-mgmt-server-details-on-login true
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of cloud management connection.
Syntax
show cloud-services advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show cloud-services advanced-settings
Output
Failure shows an appropriate error message.
Description
Shows connection details for cloud management connection.
Syntax
show cloud-services connection-details
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show cloud-services connection-details
Output
Failure shows an appropriate error message.
Configure settings for the “firmware upgrade” Cloud Services.
Description
Configures settings for the “firmware upgrade” Cloud Services.
Syntax
set cloud-services-firmware-upgrade [ activate
<activate> ] frequency
{ immediately-when-available | daily time
<time> | monthly day-of-month
<day-of-month> time
<time> | weekly day-of-week
<day-of-week> time
<time> }
Parameters
Parameter |
Description |
---|---|
activate |
Enable auto firmware upgrades. Upgrades may occur immediately or be scheduled according to a predefined frequency Type: Boolean (true/false) |
day-of-month |
Choose the desired day of the month Type: A number with no fractional part (integer) |
day-of-week |
Choose the desired day of week Options: sunday, monday, tuesday, wednesday, thursday, friday, saturday |
frequency |
Indicates the preferred time to perform upgrade once a new firmware is detected Type: Press TAB to see available options |
time |
The hour of the upgrade (Format: HH:MM in 24 hour clock) Type: A time format hh:mm |
Example
set cloud-services-firmware-upgrade activate true frequency immediately-when-available
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for the “firmware upgrade” Cloud Services.
Syntax
set cloud-services-firmware-upgrade advanced-settings max-num-of-retries
<max-num-of-retries>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set cloud-services-firmware-upgrade advanced-settings max-num-of-retries
15
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for the “firmware upgrade” Cloud Services.
Syntax
set cloud-services-firmware-upgrade advanced-settings timeout-until-retry
<timeout-until-retry>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set cloud-services-firmware-upgrade advanced-settings timeout-until-retry
15
Output
Failure shows an appropriate error message.
Shows configuration of the "Firmware Upgrade" Cloud Services.
Description
Shows configuration of the “Firmware Upgrade” Cloud Services.
Syntax
show cloud-services-firmware-upgrade
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show cloud-services-firmware-upgrade
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of the “Firmware Upgrade” Cloud Services.
Syntax
show cloud-services-firmware-upgrade advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show cloud-services-firmware-upgrade advanced-settings
Output
Failure shows an appropriate error message.
Description
Shows the currently managed blades by the cloud management.
Syntax
show cloud-services managed-blades
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show cloud-services managed-blades
Output
Failure shows an appropriate error message.
Description
Shows the currently managed services by the cloud management.
Syntax
show cloud-services managed-services
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show cloud-services managed-services
Output
Failure shows an appropriate error message.
Description
Fetch configuration now from your Cloud Services Security Management Server.
Syntax
fetch cloud-services policy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
fetch cloud-services policy
Output
Failure shows an appropriate error message.
Description
Shows the current status of the cloud management connection.
Syntax
show cloud-services status
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show cloud-services status
Output
Failure shows an appropriate error message.
Description
Shows all available CLI commands.
Syntax
show commands
Parameters
Parameter |
Description |
---|---|
|
|
Example
show commands
Output
List of all available CLI commands.
Description
Defines and manages the critical cluster member properties of the appliance. When a critical process fails, the appliance is considered to have failed.
Syntax
cphaprob [-i[a]] [-d
<device>] [-s {ok|init|problem}] [-f
<file>] [-p] [register|unregister|report|list|state|if]
Parameters
Parameter |
Description |
---|---|
|
Registers <appliance> as a critical process. |
|
Lists all devices in the cluster. |
|
The name of the device as it appears in the output of the cphaprob list. |
|
The configuration change is permanent and applies after the appliance reboots. |
|
If <device> fails to contact ClusterXL in <timeout> seconds, <device> is considered to have failed. To disable this parameter, enter the value 0. |
|
Status to be reported. ok – <appliance> is alive init – <appliance> is initializing problem – <appliance> has failed |
|
Option to automatically register several appliances. The file defined in the <file> field should contain the list of appliances with these parameters:
|
|
Unregisters <device> as a critical process. |
|
Reports the status of the <device> to the gateway. |
|
Displays that state of: -i – Internal (as well as external) devices, such as interface check and High Availability initialization. -e – External devices, such as devices registered by the user or outside the kernel. For example, fwd, sync, filter. -ia – All devices, including those used for internal purposes, such as note initialization and load-balance configuration. |
|
Displays the state of all the gateways in the High Availability configuration. |
|
Displays the state of interfaces. |
Example
cphaprob -d $process -t 0 -s ok -p register
Output
Success prints OK. Failure shows an appropriate error message.
These are some typical scenarios for the cphaprob command.
Argument |
Description |
---|---|
|
Register <device> as a critical process, and add it to the list of devices that must be running for the cluster member to be considered active. |
|
Register all the user defined critical devices listed in <file>. |
|
Unregister a user defined <device> as a critical process. This means that this device is no longer considered critical. |
|
Unregister all the user defined <device>. |
|
Report the status of a user defined critical device to ClusterXL. |
|
View the list of critical devices on a cluster member, and of all the other machines in the cluster. |
|
View the status of a cluster member, and of all the other members of the cluster. |
|
View the state of the cluster member interfaces and the virtual cluster interfaces. |
Examples
cphaprob -d <device> -t <timeout(sec)> -s <ok|init|problem> [-p] register |
Description
Disables High Availability on the appliance. Running cphastop
on an appliance that is a cluster member stops the appliance from passing traffic. State synchronization also stops.
Syntax
cphastop
Parameters
Parameter |
Description |
---|---|
|
|
Return Value
0 on success, 1 on failure
Example
cphastop
Output
Success prints OK
. Failure shows an appropriate error message.
Description
Creates a Check Point Support Information (CPinfo) file on a machine at the time of execution.
The files is saved to a USB drive or TFTP server.
The CPinfo output file enables Check Point's support engineers to analyze setups from a remote location.
Syntax
cpinfo {to-tftp
<ipaddr>|to-usb}
Parameters
Parameter |
Description |
---|---|
|
IPv4 address |
Return Value
0 on success, 1 on failure
Example
cpinfo to-usb
Output
Success prints Creating cpinfo.txt file
. Failure shows an appropriate error message.
Start all Check Point processes and applications running on a machine.
Description
Starts firewall services.
Syntax
cpstart
Parameters
Parameter |
Description |
---|---|
n/a |
|
Return Value
0 on success, 1 on failure
Example
cpstart
Output
Success shows Starting CP products...
. Failure shows an appropriate error message.
Description
Shows Check Point statistics for applications.
Syntax
cpstat [-p
<port>] [-s
<SICname>] [-f
<flavor>] [-o
<polling>] [-c
<count>] [-e
<period>] [-x] [-j] [-d] application_flag
<flag>
Parameters
Parameter |
Description |
---|---|
|
Port number of the server. The default is the standard server port (18192). |
|
Secure Internal Communication (SIC) name of the server. |
|
The flavor of the output (as it appears in the configuration file). The default is the first flavor found in the configuration file. |
|
Polling interval (seconds) specifies the pace of the results. The default is 0, meaning the results are shown only once. |
|
Specifies how many times the results are shown. The default is 0, meaning the results are repeatedly shown. |
|
Specifies the interval (seconds) over which 'statistical' olds are computed. Ignored for regular olds. |
|
XML output mode |
|
Json output mode |
|
Debug mode. |
<flag> |
One of these applications is displayed: One of the following:
|
Return Value
0 on success, 1 on failure
Example
cpstat -c 3 -o 3 fw
Output
Success shows OK
. Failure shows an appropriate error message.
The following flavors can be added to the application flags:
fw
— "default", "interfaces", "all", "policy", "perf", "hmem", "kmem", "inspect", "cookies", "chains", "fragments", "totals", "ufp", "http", "ftp", "telnet", "rlogin", "smtp", "pop3", "sync"vpn
— "default", "product", "IKE", "ipsec", "traffic", "compression", "accelerator", "nic", "statistics", "watermarks", "all"fg
— "all"ha
— "default", "all"os
— "default", "ifconfig", "routing", "memory", "old_memory", "cpu", "disk", "perf", "multi_cpu", "multi_disk", "all", "average_cpu", "average_memory", "statistics"mg
— "default"persistency
— "product", "Tableconfig", "SourceConfig"polsrv
— "default", "all"uas
— "default"svr
— "default"cpsemd
— "default"cpsead
— "default"asm
— "default", "WS"ls
— "default"ca
— "default", "crl", "cert", user", "all"Description
Stops firewall services and terminates all Check Point processes and applications running on the appliance.
Syntax
cpstop
Parameters
Parameter |
Description |
---|---|
|
|
Return Value
0 on success, 1 on failure
Example
cpstop
Output
Success shows Uninstalling Security Policy...
. Failure shows an appropriate error message.
Description
The cpwd_admin
utility can be used to verify if a process is running and to stop and start a process if necessary.
Syntax
cpwd_admin {del <name>|detach
<name>|list|kill|exist|start_monitor|stop_monitor|
monitor_list}
Parameters
Parameter |
Description |
---|---|
|
Deletes process |
|
Detaches process |
|
Print status of processes |
|
Stops cpWatchDog |
|
Checks if cpWatchDog is running |
|
cpwd starts monitoring this machine |
|
cpwd stops monitoring this machine |
|
Displays list of monitoring processes |
|
Name of process |
Return Value
0 on success, 1 on failure
Example
cpwd_admin start_monitor
Output
Success shows OK
. Failure shows an appropriate error message.
Configures the device’s date and time.
Description
Manually configure the device’s date.
Syntax
set date
<date>
Parameters
Parameter |
Description |
---|---|
date |
Date in the format YYYY-MM-DD Type: A date format yyyy-mm-dd |
Example
set date 2000-01-01
Output
Failure shows an appropriate error message.
Description
Manually configure the device’s time.
Syntax
set time
<time>
Parameters
Parameter |
Description |
---|---|
time |
Time in the format HH:MM Type: A time format hh:mm |
Example
set time 23:20
Output
Failure shows an appropriate error message.
Description
Manually configure the device’s time zone.
Syntax
set timezone
<timezone>
Parameters
Parameter |
Description |
---|---|
timezone |
Timezone location |
Example
set timezone GMT-11:00(Midway-Island)
Output
Failure shows an appropriate error message.
Description
Configures if the daylight savings will be changed automatically.
Syntax
set timezone-dst automatic
<timezone-dst automatic>
Parameters
Parameter |
Description |
---|---|
timezone-dst automatic |
Automatic adjustment clock for daylight saving changes flag Options: on, off |
Example
set timezone-dst automatic on
Output
Failure shows an appropriate error message.
Shows date and time.
Description
Shows current date of the appliance.
Syntax
show date
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show date
Output
Failure shows an appropriate error message.
Description
Shows current time of the appliance.
Syntax
show time
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show time
Output
Failure shows an appropriate error message.
Description
Shows current time zone of the appliance.
Syntax
show timezone
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show timezone
Output
Failure shows an appropriate error message.
Description
Shows current daylight savings configuration of the appliance.
Syntax
show timezone-dst
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show timezone-dst
Output
Failure shows an appropriate error message.
Description
Restores the default settings of the appliance without affecting the software image. All the custom user settings for the appliance are deleted.
Syntax
restore default-settings [preserve-sic {yes|no}|preserve-license {yes|no}|force {yes|no}]
Parameters
Parameter |
Description |
---|---|
|
Select whether to preserve your current SIC settings. |
|
Select whether to preserve your current license. |
|
Skip the confirmation question. |
Return Value
0 on success, 1 on failure
Example
restore default-settings preserve-sic yes
Output
n/a
Comments
The appliance automatically reboots after the default settings are restored.
Description
Configures advanced settings for DHCP Relay functionality.
Syntax
set dhcp-relay advanced-settings use-internal-ip-addrs-as-source
<use-internal-ip-addrs-as-source>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set dhcp-relay advanced-settings use-internal-ip-addrs-as-source true
Output
Failure shows an appropriate error message.
Description
Shows advanced settings for DHCP relay.
Syntax
show dhcp-relay advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show dhcp-relay advanced-settings
Output
Failure shows an appropriate error message.
Description
Shows configuration for all DHCP servers.
Syntax
show dhcp servers
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show dhcp servers
Output
Failure shows an appropriate error message.
Description
Deletes the configured exclude range from the DHCP server settings of a specific network/interface.
Syntax
delete dhcp server interface
<name> exclude-range
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
delete dhcp server interface My_Network exclude-range
Output
Failure shows an appropriate error message.
Configures DHCP server settings.
Description
Configures a custom DHCP option.
Syntax
set dhcp server interface
<cliName> custom-option name
<custom-option name> type
<type> tag
<tag> data
<data>
Parameters
Parameter |
Description |
---|---|
cliName |
cliName Type: virtual |
custom-option name |
Set the name of the object Type: A string that contains alphanumeric characters or hyphen |
data |
Set the desired value of the object Type: String |
tag |
Select a unique tag for the object Type: A number with no fractional part (integer) |
type |
Select the appropriate type to store your object Options: string, int8, int16, int32, uint8, uint16, uint32, boolean, ipv4-address, ipv4-address-array, hex-string |
Example
set dhcp server interface LAN1 custom-option name MyOption type string tag 43 data TEXT
Output
Failure shows an appropriate error message.
Description
Configures if a DHCP server is active or not on an existing network/interface.
Syntax
set dhcp server interface
<name> { disable | enable }
Parameters
Parameter |
Description |
---|---|
dhcp |
Use DHCP Server with a specified IP address range Options: off, on, relay |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network off
Output
Failure shows an appropriate error message.
Description
Configures DHCP relay functionality on an existing network/interface.
Syntax
set dhcp server interface
<name> relay relay-to
<relay relay-to> { [ secondary
<secondary> ] | [ relay-secondary
<relay-secondary> ] }
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
relay relay-to |
Enter the DHCP server IP address Type: IP address |
relay-secondary |
This field is deprecated. Please use field ’secondary’ |
secondary |
Enter the secondary DHCP server IP address Type: IP address |
Example
set dhcp server interface My_Network relay relay-to 192.168.1.1 secondary 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures an IP address pool for a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> include-ip-pool
<include-ip-pool>
Parameters
Parameter |
Description |
---|---|
include-ip-pool |
DHCP range Type: A range of IP addresses |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network include-ip-pool 192.168.1.1-192.168.1.10
Output
Failure shows an appropriate error message.
Description
Configures the default gateway provided by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> default-gateway
<default-gateway>
Parameters
Parameter |
Description |
---|---|
default-gateway |
A virtual field calculated by the values of the fields: dhcpGwMode & dhcpGw |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network default-gateway auto
Output
Failure shows an appropriate error message.
Description
Configures the WINS mode provided by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> wins-mode
<wins-mode>
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
wins-mode |
Configure the WINS Server |
Example
set dhcp server interface My_Network wins-mode auto
Output
Failure shows an appropriate error message.
Description
Configures the WINS servers IP addresses provided by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> wins primary
<wins primary> [ secondary
<secondary> ]
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
secondary |
Configure the IP address for the second WINS server |
wins primary |
Configure the IP address for the first WINS server |
Example
set dhcp server interface My_Network wins primary 192.168.1.1 secondary 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the lease time used by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> lease-time
<lease-time>
Parameters
Parameter |
Description |
---|---|
lease-time |
Configure the timeout in hours for a single device to retain a dynamically acquired IP address |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network lease-time 30
Output
Failure shows an appropriate error message.
Description
Configures the domain used by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> domain
<domain>
Parameters
Parameter |
Description |
---|---|
domain |
The domain name of the DHCP |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network domain myHost.com
Output
Failure shows an appropriate error message.
Description
Configures the NTP servers used by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> ntp
<ntp> [ secondary
<secondary> ]
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
ntp |
Configure the first NTP (Network Time Protocol) server to be distributed to DHCP client |
secondary |
Configure the second NTP (Network Time Protocol) server to be distributed to DHCP client |
Example
set dhcp server interface My_Network ntp 192.168.1.1 secondary 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the TFTP server used by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> tftp
<tftp>
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
tftp |
Configure TFTP server to be distributed to DHCP client |
Example
set dhcp server interface My_Network tftp 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the TFTP bootfile used by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> file
<file>
Parameters
Parameter |
Description |
---|---|
file |
Configure TFTP bootfile to be distributed to DHCP client |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network file word
Output
Failure shows an appropriate error message.
Description
Configures the Call Manager servers used by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> callmgr
<callmgr> [ secondary
<secondary> ]
Parameters
Parameter |
Description |
---|---|
callmgr |
Configure the first Call manager server to be distributed to DHCP client |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
secondary |
Configure the second Call manager server to be distributed to DHCP client |
Example
set dhcp server interface My_Network callmgr 192.168.1.1 secondary 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the X-Windows display manager server used by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> xwin-display-mgr
<xwin-display-mgr>
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
xwin-display-mgr |
Configure X-Windows display manager to be distributed to DHCP client |
Example
set dhcp server interface My_Network xwin-display-mgr 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the Avaya Manager server used by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> avaya-voip
<avaya-voip>
Parameters
Parameter |
Description |
---|---|
avaya-voip |
Configure Avaya IP phone to be distributed to DHCP client |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network avaya-voip 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the Nortel Manager server used by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> nortel-voip
<nortel-voip>
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
nortel-voip |
Configure Nortel IP phone to be distributed to DHCP client |
Example
set dhcp server interface My_Network nortel-voip 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the Thomson Manager server used by a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> thomson-voip
<thomson-voip>
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
thomson-voip |
Configure Thomson IP phone to be distributed to DHCP client |
Example
set dhcp server interface My_Network thomson-voip 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the DNS servers provided by a DHCP server on an existing network/interface. In automatic mode the device will provide its own IP address when configured as DNS proxy, and the DNS servers it is configured with otherwise.
Syntax
set dhcp server interface
<name> dns { none | manual [ primary
<primary> ] [ secondary
<secondary> ] [ tertiary
<tertiary> ] | auto }
Parameters
Parameter |
Description |
---|---|
dns |
Configure the DNS Server |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
primary |
Configure the IP address for the first DNS server |
secondary |
Configure the IP address for the second DNS server |
tertiary |
Configure the IP address for the third DNS server |
Example
set dhcp server interface My_Network dns none
Output
Failure shows an appropriate error message.
Description
Configures the primary DNS server provided by a DHCP server on an existing network/interface in manual mode.
Syntax
set dhcp server interface
<name> dns primary
<dns primary>
Parameters
Parameter |
Description |
---|---|
dns primary |
Configure the IP address for the first DNS server |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network dns primary 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the secondary DNS server provided by a DHCP server on an existing network/interface in manual mode.
Syntax
set dhcp server interface
<name> dns secondary
<dns secondary>
Parameters
Parameter |
Description |
---|---|
dns secondary |
Configure the IP address for the second DNS server |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network dns secondary 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the tertiary DNS server provided by a DHCP server on an existing network/interface in manual mode.
Syntax
set dhcp server interface
<name> dns tertiary
<dns tertiary>
Parameters
Parameter |
Description |
---|---|
dns tertiary |
Configure the IP address for the third DNS server |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network dns tertiary 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Removes a custom DHCP option from a DHCP server on an existing network/interface.
Syntax
set dhcp server interface
<name> remove custom-option
<custom-option>
Parameters
Parameter |
Description |
---|---|
custom-option |
Set the name of the object |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set dhcp server interface My_Network remove custom-option MyOption
Output
Failure shows an appropriate error message.
Shows configuration of DHCP servers.
Description
Shows the configuration of a DHCP server configured on a specific interface/network.
Syntax
show dhcp server interface
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
show dhcp server interface My_Network
Output
Failure shows an appropriate error message.
Description
Shows the IP address pool of a DHCP server configured on a specific interface/network.
Syntax
show dhcp server interface
<name> ip-pool
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
show dhcp server interface My_Network ip-pool
Output
Failure shows an appropriate error message.
Description
Shows information about your appliance, such as the current firmware version and additional details.
Syntax
show diag
Parameters
Parameter |
Description |
---|---|
|
|
Example
show diag
Output
Current system information.
Description
Shows the file system space used and space available.
Syntax
show disk-usage [-h|-m|-k]
Parameters
Parameter |
Description |
---|---|
|
Human readable (e.g. 1K 243M 2G) |
|
1024*1024 blocks |
|
1024 blocks |
Example
show disk-usage
-h
Output
Current file system space used and space available.
Deletes configured DNS settings.
Description
Deletes configured primary DNS.
Syntax
delete dns [ primary ipv4-address ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete dns primary ipv4-address
Output
Failure shows an appropriate error message.
Description
Deletes configured secondary DNS.
Syntax
delete dns [ secondary ipv4-address ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete dns secondary ipv4-address
Output
Failure shows an appropriate error message.
Description
Deletes configured tertiary DNS.
Syntax
delete dns [ tertiary ipv4-address ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete dns tertiary ipv4-address
Output
Failure shows an appropriate error message.
Description
Deletes configured domain name of the appliance.
Syntax
delete domainname
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete domainname
Output
Failure shows an appropriate error message.
Configures the DNS and domain settings for the device.
Description
Configures the DNS settings for the device.
Syntax
set dns [ primary ipv4-address
<primary ipv4-address> ] [ secondary ipv4-address
<secondary ipv4-address> ] [ tertiary ipv4-address
<tertiary ipv4-address> ]
Parameters
Parameter |
Description |
---|---|
primary ipv4-address |
First global DNS IP address Type: IP address |
secondary ipv4- address |
Second global DNS IP address Type: IP address |
tertiary ipv4-address |
Third global DNS IP address Type: IP address |
Example
set dns primary ipv4-address 192.168.1.1 secondary ipv4-address 192.168.1.1 tertiary ipv4-address 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures the DNS mode for the device. It can either use manually configured DNS servers or use the DNS servers provided to him by the active internet connection from his ISP.
Syntax
set dns mode
<mode>
Parameters
Parameter |
Description |
---|---|
mode |
Status of appliance using global DNS servers Options: global, internet |
Example
set dns mode global
Output
Failure shows an appropriate error message.
Description
Configures the DNS proxy mode. DNS proxy allows treating the configured network objects as a hosts list which the device can translate from hostname to IP address for local networks.
Syntax
set dns proxy { on [ resolving
<resolving> ] | off }
Parameters
Parameter |
Description |
---|---|
proxy |
Relay DNS requests from internal network clients to the DNS servers defined above Type: Press TAB to see available options |
resolving |
Use network objects as a hosts list to translate names to their IP addresses Options: on, off |
Example
set dns proxy on resolving on
Output
Failure shows an appropriate error message.
Description
Configures the domain settings for the device.
Syntax
set domainname
<domainname>
Parameters
Parameter |
Description |
---|---|
domainname |
Identification string that defines a realm of administrative autonomy, authority, or control in the Internet Type: A FQDN |
Example
set domainname somehost.example.com
Output
Failure shows an appropriate error message.
Shows configuration for DNS and domain name.
Description
Shows configuration for DNS.
Syntax
show dns
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show dns
Output
Failure shows an appropriate error message.
Description
Shows configuration for domain name.
Syntax
show domainname
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show domainname
Output
Failure shows an appropriate error message.
Description
Set DSL configuration parameters.
Syntax
set dsl advanced-settings global-settings [ ginp
<ginp> ] [ sra
<sra> ]
Parameters
Parameter |
Description |
---|---|
ginp |
Enhanced Impulse Noise Protection |
sra |
Enables Seamless Rate Adaption |
Example
set dsl advanced-settings global-settings ginp downstream-and-upstream sra true
Output
N/A
Description
Set DSL standard related configuration parameters.
Syntax
set dsl advanced-settings standards [ vdsl2
<true|false> ] [ dmt
< true|false > ] [ adsl-lite
<
true|false > ] [ adsl2
< true|false > ] [ adsl2plus
< true|false > ] [ t1413
< true|false > ] [ annex-m
< true|false > [ annex-l
< true|false > ] [ vdsl-8a
< true|false > ] [ vdsl-8b
< true|false > ] [ vdsl-8c
< true|false > ] [ vdsl-8d
< true|false > ] [ vdsl-12a
< true|false > ] [ vdsl-12b
< true|false >] [ vdsl-17a
< true|false > ] [ vdsl-us0
< true|false > ]
Parameters
Parameter |
Description |
---|---|
vdsl2 |
Supports ITU G.993.2 VDSL2 standard. |
dmt |
Supports ITU G.992.1 ADSL (G.dmt) standard. |
adsl-lite |
Supports ITU G.992.2 ADSL Lite (G.lite) standard. |
adsl2 |
Supports ITU G.992.3 ADSL2 standard. |
adsl2plus |
Supports ITU G.992.5 Annex M ADSL2+M standard. |
t1413 |
Supports ANSI T1.413-1998 Issue 2 ADSL. |
annex-m |
In an Annex A appliance: Combined with supported ADSL2+ it specifies support for Annex M ADSL2+. In an Annex B appliance: Combined with supported ADSL2 it specifies support for Annex J ADSL2. |
annex-l |
Combined with enabled ADSL2 (G.992.3) specifies support for Annex L. |
vdsl-8a |
Supports VDSL Profile 8a. |
vdsl-8b |
Supports VDSL Profile 8b. |
vdsl-8c |
Supports VDSL Profile 8c. |
vdsl-8d |
Supports VDSL Profile 8d. |
vdsl-12a |
Supports VDSL Profile 12a. |
vdsl-12b |
Supports VDSL Profile 12b. |
vdsl-17a |
Supports VDSL Profile 17a. |
vdsl-us0 |
Enables usage of first upstream band in VDSL2. |
Example
set dsl advanced-settings standards adsl2plus false
Output
N/A
Description
Show all DSL advanced settings parameters.
Syntax
show dsl advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show dsl advanced-settings
Sample Output
show dsl advanced-settings
adsl2plus: true
vdsl-8d: true
vdsl-8c: true
vdsl-8b: true
annex-m: false
t1413: true
vdsl-17a: true
adsl-lite: true
vdsl2: true
annex-l: false
vdsl-12b: true
adsl2: true
dmt: true
ginp: disabled
sra: false
vdsl8a: true
vdsl-us0: true
vdsl-12a: true
Description
Show DSL statistics.
Syntax
show dsl statistics
Parameters
Parameter |
Description |
---|---|
tpstc |
Indicates the TPS-TC layer. Possible values: ATM, PTM. |
mode |
Indicates the negotiated DSL mode. Example for a value: VDSL Annex B. |
status |
Indicates the status of DSL connection synchronization. Example values: Showtime, G.994. |
bitrate-up |
Indicates the upstream DSL bit rate. |
bitrate-down |
Indicates the downstream DSL bit rate. |
vendor |
4 hexa digits representing the vendor of the DSL chip in the peer DSLAM/MSAG (i.e. IFTN, BDCM) + 4 hex digits representing the firmware version of the vendor. |
power-up |
Indicates the appliance transmission power (dBm). |
hec-up |
Indicates the number of HEC errors counted by the peer DSLAM/MSAG. |
attn-up |
Indicates the upstream attenuation (dB). |
attn-down |
Indicates the attenuation of the power from the peer DSLAM/MSAG to the appliance (dB). |
rs-down |
Indicates the number of RS words that were received by the appliance in the downstream. |
rs-corrected-down |
Indicates the number of RS words that were corrected by the appliance in the downstream. |
rs-up |
Indicates the number of RS words that were received by the peer DSLAM/MSAG in the upstream. |
rs-corrected-up |
Indicates the number of RS words that were corrected by the peer DSLAM/MSAG in the upstream. |
hec-up |
Indicates the number of HEC errors counted by the peer DSLAM/MSAG. |
hec-down |
Indicates the number of HEC errors counted by the appliance. |
total-cells-up |
Indicates the number of 53 bytes (cells in the case of ATM) that were transmitted by the appliance. |
total-cells-down |
Indicates the number of 53 bytes (cells in the case of ATM) that were received by the appliance. |
configured-sra |
Indicates the seamless rate adaptation (SRA) that was configured in the appliance. Possible values: On, Off. |
configured-trellis |
Indicates whether trellis was enabled in the appliance configuration. Possible values: On, Off. |
configured-ginp |
Indicates the upstream/downstream on/off for the configured Enhanced Impulse response. Possible values: Off/Off, Off/On, On/Off, On/On |
configured-bitswap |
Indicates the upstream/downstream on/off for the Bit Swap configured in the appliance. Possible values: On, Off. |
vectoring |
Indicates the vectoring status. Possible values: 0: Vectoring Training State. 1: Showtime vectoring state, idle, not reporting errors. 2: Initial showtime vector mode state, transition to full factoring when the peer sends a vectoring configuration message. 3: Vectoring state where error samples are being reported upon peer request. 4: Vectoring is disabled. 5: DSLAM/MSAG doesn’t support vectoring. |
Example
show dsl statistics
Sample Output
show dsl statistics
snr-down: 8.7
configured-ginp: Off/Off
power-up: 7.6
rs-corrected-down: 421298
rs-corrected-up: 208
configured-sra: Off
rs-up: 1610329207
configured-trellis: On
total-cells-down: 2609810117
snr-up: 15.4
tpstc: PTM
bitrate-up: 5024
vectoring: 5 (DSLAM is not a vectored DSLAM)
vendor: IFTN:0xb206
status: Showtime
rs-down: 2127995393
mode: VDSL2 Annex B
hec-up: 0
bitrate-down: 48470
training: Showtime
power-down: 7.7
total-cells-up: 0
hec-down: 0
attn-down: 25.9
attn-up: 0.0
configured-bitswap: Off
Configures a persistent domain name for the device.
Description
Configures a persistent domain name for the device.
Syntax
set dynamic-dns { is_active } provider
<provider> password
<password> user
<user> domain
<domain>
Parameters
Parameter |
Description |
---|---|
domain |
The domain name (sometimes called host name) within your account that the device will use Type: A FQDN |
is-active |
Is the DDNS service active Type: Boolean (enable/disable) |
password |
The password of the account Type: A string that contains alphanumeric and special characters |
provider |
Select the DDNS provider that you have already set up an account with Options: no-ip.com, DynDns |
user |
The user name of the account Type: DynDns provider: begins with a letter and have 2-25 alphanumeric char acters. no-ip.com provider: length is 6-15 characters and contains only a-z, 0-9, -, _ |
Example
set dynamic-dns enable provider no-ip.com password a(&7Ba user myUser17
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for the DDNS service.
Syntax
set dynamic-dns advanced-settings iterations
<iterations>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set dynamic-dns advanced-settings iterations 15
Output
Failure shows an appropriate error message.
Shows configuration for DDNS service.
Description
Shows configuration for DDNS service.
Syntax
show dynamic-dns
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show dynamic-dns
Output
Failure shows an appropriate error message.
Description
Shows advanced settings for DDNS service.
Syntax
show dynamic-dns advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show dynamic-dns advanced-settings
Output
Failure shows an appropriate error message.
Manages dynamic objects on the appliance. The dynamic_objects
command specifies an IP address to which the dynamic object is resolved.
First, define the dynamic object in the SmartDashboard. Then create the same object with the CLI (-n argument). After the new object is created on the gateway with the CLI, you can use the dynamic_objects command to specify an IP address for the object.
Any change you make to dynamic objects' ranges are applied immediately to the objects. It is not necessary to reinstall the policy.
Description
Manages dynamic objects on the appliance.
Syntax
dynamic_objects -o
<object> [-r
<fromIP> <toIP> ...] [-a] [-d] [-l] [-n
<object> ] [-c] [-do
<object>]
Parameters
Parameter |
Description |
---|---|
|
Name of the dynamic object that is being configured. |
|
Defines the range of IP addresses that are being configured for this object. |
|
Adds range of IP addresses to the dynamic object. |
|
Deletes range of IP addresses from the dynamic object. |
|
Lists dynamic objects that are used on the appliance. |
|
Creates a new dynamic object. |
|
Compare the objects in the dynamic objects file and in objects. |
|
Deletes the dynamic object. |
<object> |
Name of dynamic object. |
<fromIP> |
Starting IPv4 address. |
<toIP> |
Ending IPv4 address. |
Example
dynamic_objects -n sg80gw -r 190.160.1.1 190.160.1.40 -a
Output
Success shows Operation completed successfully
. Failure shows an appropriate error message.
Description
Exits from the shell.
Syntax
exit
Parameters
Parameter |
Description |
---|---|
|
|
Return Value
None
Example
exit
Output
None
Description
Sets the initial password or password hash for the expert shell
Syntax
set expert {password|password-hash} {
<pass>|
<pass_hash>}
Parameters
Parameter |
Description |
---|---|
<pass> |
Password using alphanumeric and special characters |
<pass_hash> |
Password MD5 string representation |
Example
set expert password-hash $1$fGT7pGX6$oo9LUBJTkLOGKLhjRQ2rw1
Output
Success shows OK
. Failure shows an appropriate error message.
Comments
To generate a password-hash, you can use this command on any Check Point SMB Appliance gateway (as an expert user).
cryptpw –a md5
<password string>
Description
Fetches a policy from the Security Management Server with IPv4 address <ip_addr> or from the local gateway.
Syntax
fetch policy {local|mgmt-ipv4-address
<ip_addr>}
Parameters
Parameter |
Description |
---|---|
|
IPv4 address of the Security Management Server. |
Return Value
0 on success, 1 on failure
Example
fetch policy mgmt-ipv4-address 192.168.1.100
Output
Success shows Done
. Failure shows an appropriate error message.
The fw commands are used for working with various aspects of the firewall. All fw
commands are executed on the Check Point Security Gateway. For more about the fw
commands, see the Command Line Interface (CLI) Reference Guide.
fw commands can be found by typing fw [TAB]
at a command line. For some of the CLI commands, you can enter the -h
parameter to display all the relevant arguments and parameters. These commands are:
fw command |
Explanation |
|
Turn acceleration on/off |
|
Activate license |
|
Load Anti-Virussignatures to kernel |
|
Control kernel |
|
Turn debug output on or off |
|
Fetch last policy |
|
Fetch default policy |
|
Fetch local policy |
|
Monitor Check Point Appliance traffic |
|
Pull certificate from internal CA |
|
fw daemon |
|
Initialize SIC |
|
Reset SIC |
|
Test SIC with management |
|
Display policy installation status of the gateway. (Command is provided for backward compatibility.) |
|
Display kernel-table content |
|
Unload local policy |
|
Display version |
Configures the default policy for the Firewall blade
Description
Configures the default policy for the Firewall blade.
Syntax
set fw policy [ mode
<mode> ] [ track-allowed-traffic
<track-allowed-traffic>
] [ track-blocked-traffic
<track-blocked-traffic> ]
Parameters
Parameter |
Description |
---|---|
mode |
Current mode for firewall policy |
track-allowed-traffic |
Indicates if accepted connections are logged Options: none, log |
track-blocked-traffic |
Indicates if blocked connections are logged Options: none, log |
Example
set fw policy mode off track-allowed-traffic none track-blocked-traffic none
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for the default policy of the Firewall blade.
Syntax
set fw policy advanced-settings blocked-packets-action
<blocked-packets-action>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set fw policy advanced-settings blocked-packets-action auto
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for the default policy of the Firewall blade.
Syntax
set fw policy advanced-settings log-implied-rules
<log-implied-rules>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set fw policy advanced-settings log-implied-rules true
Output
Failure shows an appropriate error message.
Shows the configured policy for the Firewall blade.
Description
Shows the configured policy for the Firewall blade.
Syntax
show fw policy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show fw policy
Output
Failure shows an appropriate error message.
Description
Shows advanced settings for the Firewall blade.
Syntax
show fw policy advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show fw policy advanced-settings
Output
Failure shows an appropriate error message.
Description
Shows the configuration for customizable messages shown to users upon actions.
Syntax
show fw policy user-check { block | ask | accept }
Parameters
Parameter |
Description |
---|---|
user-check |
Activity message type Type: Press TAB to see available options |
Example
show fw policy user-check block
Output
Failure shows an appropriate error message.
Description
Configures a customizable “accept” message shown to users upon match on browser based traffic.
Syntax
set fw policy user-check accept [ body
<body> ] [ fallback-action
<fallback-action> ] [ frequency
<frequency> ] [ subject
<subject> ] [ title
<title> ]
Parameters
Parameter |
Description |
---|---|
body |
The informative text that appears in the APPI ’Accept’ user message Type: A string that contains only printable characters |
fallback-action |
Indicates the action to take when an ’Accept’ user message cannot be displayed Options: block, accept |
frequency |
Indicates how often is the APPI ’Accept’ user message is being presented to the same user Options: day, week, month |
subject |
The subject of an APPI ’Accept’ user message Type: A string that contains only printable characters |
title |
The title of an APPI ’Accept’ user message Type: A string that contains only printable characters |
Example
set fw policy user-check accept body My Network fallback-action block frequency day subject My Network title My Network
Output
Failure shows an appropriate error message.
Description
Configures a customizable “ask” message shown to users upon match on browser based traffic.
Syntax
set fw policy user-check ask [ body
<body> ] [ confirm-text
<confirm-text>
] [ fallback-action
<fallback-action> ] [ frequency
<frequency> ] [ subject
<subject> ] [ title
<title> ] [ reason-displayed
<reason-displayed> ]
Parameters
Parameter |
Description |
---|---|
body |
The informative text that appears in the APPI ’Ask’ user message Type: A string that contains only printable characters |
confirm-text |
This text appears next to the ’ignore warning’ checkbox of an APPI ’Ask’ user message Type: A string that contains only printable characters |
fallback-action |
The action that is performed when the ’Ask’ message cannot be shown Options: block, accept |
frequency |
Indicates how often is the APPI ’Ask’ user message is being presented to the same user Options: day, week, month |
reason-displayed |
Indicates if the user must enter a reason for ignoring this message in a designated text dialog Type: Boolean (true/false) |
subject |
The subject of an APPI ’Ask’ user message Type: A string that contains only printable characters |
title |
The title of an APPI ’Ask’ user message Type: A string that contains only printable characters |
Example
set fw policy user-check ask body My Network confirm-text My Network fallback-action block frequency day subject My Network title My Network reason-displayed true
Output
Failure shows an appropriate error message.
Description
Configures a customizable “block” message shown to users upon match on browser based traffic.
Syntax
set fw policy user-check block [ body
<body> ] [ redirect-url
<redirect-url>
] [ subject
<subject> ] [ title
<title> ] [ redirect-to-url
<redirect-to-url>]
Parameters
Parameter |
Description |
---|---|
body |
The informative text that appears in the APPI ’Block’ user message Type: A string that contains only printable characters |
redirect-to-url |
Indicates if the user will be redirected to a custom URL in case of a ’Block’ action Type: Boolean (true/false) |
redirect-url |
Indicates the URL to redirect the user in case of a ’Block’ action if configured to do so. The URL to redirect the user in case of a ’Block’ action. Redirection happens only if this functionality is turned on Type: urlWithHttp |
subject |
The subject of an APPI ’Block’ user message Type: A string that contains only printable characters |
title |
The title of an APPI ’Block’ user message Type: A string that contains only printable characters |
Example
set fw policy user-check block body My Network redirect-url urlWithHttp subject My Network title My Network redirect-to-url true
Output
Failure shows an appropriate error message.
Description
Configure the NAS IP\IPv6 address for RADIUS server authentication.
NAS IP\IPv6 address indicates the identifying IP Address of the NAS which is requesting authentication of the user, and should be unique to the NAS within the scope of the RADIUS server.
Syntax
set global-radius-conf [ nas-ip-address <nas-ip-address> ] [ nasIPV6 <nasIPV6> ]
Parameters
Parameter |
Description |
---|---|
nas-ip-address |
Nas ip address Type: IP address |
nasIPV6 |
nasIPV6 Type: ipv6addr |
Example
set global-radius-conf nas-ip-address 192.168.1.1 nasIPV6 ipv6addr
Output
Failure shows an appropriate error message.
Description
Configure the NAS IP\IPv6 address for RADIUS server authentication.
Syntax
show global-radius-conf
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show global-radius-conf
Output
Failure shows an appropriate error message.
Description
Adds a new group of network objects.
Syntax
add group name
<name> [ comments
<comments> ] [ member
<member> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments and explanation about the Network Object group Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
member |
An association field to the contained network objects |
name |
Network Object group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
add group name myObject_17 comments “This is a comment.” member TEXT
Output
Failure shows an appropriate error message.
Description
Deletes an existing group object of network objects.
Syntax
delete group
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
delete group myObject_17
Output
Failure shows an appropriate error message.
Configures an existing network objects group.
Description
Configures an existing network objects group.
Syntax
set group
<name> [ new-name
<new-name> ] [ comments
<comments> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments and explanation about the Network Object group Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
name |
Network Object group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
new-name |
Network Object group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set group myObject_17 new-name myObject_17 comments “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Removes all members from an existing network objects group.
Syntax
set group
<name> remove-all members
Parameters
Parameter |
Description |
---|---|
name |
Network Object group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set group myObject_17 remove-all members
Output
Failure shows an appropriate error message.
Description
Adds an existing network object to an existing network objects group.
Syntax
set group
<name> add member
<member>
Parameters
Parameter |
Description |
---|---|
member |
Network Object name |
name |
Network Object group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set group myObject_17 add member TEXT
Output
Failure shows an appropriate error message.
Description
Removes an existing network object from an existing network objects group.
Syntax
set group
<name> remove member
<member>
Parameters
Parameter |
Description |
---|---|
member |
Network Object name |
name |
Network Object group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set group myObject_17 remove member TEXT
Output
Failure shows an appropriate error message.
Description
Shows the contents of a network object group.
Syntax
show group
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
show group myObject_17
Output
Failure shows an appropriate error message.
Description
Shows the contents of all network object groups.
Syntax
show groups
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show groups
Output
Failure shows an appropriate error message.
Description
Adds a new network host object that can be used for resolving when the device acts as a DNS proxy, and also DHCP settings for this object (exclude/reserve IP address).
Syntax
add host name
<name> [ dhcp-exclude-ip-addr { on [ dhcp-reserve-ip-addr-to-mac { on [ mac-addr
<mac-addr> ] [ reserve-mac-address
<reserve-mac-address> ] | off } ] [ mac-reserved-in-dhcp { on [ mac-addr
<mac-addr> ] [ reserve-mac-address
<reserve-mac-address> ] | off } ] | off } ] [ dns-resolving
<dns-resolving> ] ipv4-address
<ipv4-address>
Parameters
Parameter |
Description |
---|---|
dhcp-exclude-ip-addr |
Indicates if the object’s IP address(es) is excluded from internal DHCP daemon Type: Press TAB to see available options |
dhcp-reserve-ip-addr- to-mac |
Indicates if the IP address is reserved in internal DHCP daemon Type: Press TAB to see available options |
dns-resolving |
Indicates if the name of the server/network object will be used as a hostname for internal DNS service Type: Boolean (true/false) |
ipv4-address |
The beginning of the IP range |
mac-addr |
MAC address of the Network Object Type: MAC address |
mac-reserved-in-dhcp |
This field is deprecated. Please use field ’dhcp-reserve-ip-addr-to-mac’ |
name |
Network Object name Type: String |
reserve-mac-address |
This field is deprecated. Please use field ’mac-addr’ |
Example
add host name TEXT dhcp-exclude-ip-addr on dhcp-reserve-ip-addr-to-mac on mac-addr 00:1C:7F:21:05:BE reserve-mac-address 00:1C:7F:21:05:BE
mac-reserved-in-dhcp on mac-addr 00:1C:7F:21:05:BE reserve-mac-address 00:1C:7F:21:05:BE dns-resolving true ipv4-address 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Deletes an existing network host object.
Syntax
delete host
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name Type: String |
Example
delete host TEXT
Output
Failure shows an appropriate error message.
Description
Configures an existing network object/host.
Syntax
set host
<name> [ name
<name> ] [ dhcp-exclude-ip-addr { on [
dhcp-reserve-ip-addr-to-mac { on [ mac-addr
<mac-addr> ] [ reserve-mac-address
<reserve-mac-address> ] | off } ] [ mac-reserved-in-dhcp { on [ mac-addr
<mac-addr> ] [ reserve-mac-address
<reserve-mac-address> ] | off } ] | off
} ] [ exclude-from-dhcp { on [ dhcp-reserve-ip-addr-to-mac { on [ mac-addr
<mac-addr> ] [ reserve-mac-address
<reserve-mac-address> ] | off } ] [ mac-reserved-in-dhcp { on [ mac-addr
<mac-addr> ] [ reserve-mac-address
<reserve-mac-address> ] | off } ] | off } ] [ dns-resolving
<dns-resolving>] [ ipv4-address
<ipv4-address> ]
Parameters
Parameter |
Description |
---|---|
dhcp-exclude-ip-addr |
Indicates if the object’s IP address(es) is excluded from internal DHCP daemon Type: Press TAB to see available options |
dhcp-reserve-ip-addr- to-mac |
Indicates if the IP address is reserved in internal DHCP daemon Type: Press TAB to see available options |
dns-resolving |
Indicates if the name of the server/network object will be used as a hostname for internal DNS service Type: Boolean (true/false) |
exclude-from-dhcp |
This field is deprecated. Please use field ’dhcp-reserve-ip-addr-to-mac’ |
ipv4-address |
The beginning of the IP range |
mac-addr |
MAC address of the Network Object Type: MAC address |
mac-reserved-in-dhcp |
This field is deprecated. Please use field ’dhcp-reserve-ip-addr-to-mac’ |
name |
Network Object name Type: String |
reserve-mac-address |
This field is deprecated. Please use field ’mac-addr’ |
Example
set host TEXT name TEXT dhcp-exclude-ip-addr on dhcp-reserve-ip-addr-to-mac on mac-addr 00:1C:7F:21:05:BE reserve-mac-address 00:1C:7F:21:05:BE
mac-reserved-in-dhcp on mac-addr 00:1C:7F:21:05:BE reserve-mac-address 00:1C:7F:21:05:BE exclude-from-dhcp on dhcp-reserve-ip-addr-to-mac on mac-addr 00:1C:7F:21:05:BE reserve-mac-address 00:1C:7F:21:05:BE mac-reserved-in-dhcp on mac-addr 00:1C:7F:21:05:BE reserve-mac-address 00:1C:7F:21:05:BE
dns-resolving true ipv4-address 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Shows the configuration of an existing network object.
Syntax
show host
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name Type: String |
Example
show host TEXT
Output
Failure shows an appropriate error message.
Description
Shows the configuration of all existing network objects.
Syntax
show hosts
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show hosts
Output
Failure shows an appropriate error message.
Configures hotspot settings.
Description
Configures hotspot settings.
Syntax
set hotspot [ require-auth
<require-auth> ] [ auth-mode
<auth-mode> ] [ allowed-group
<allowed-group> ] [ timeout
<timeout> ] [ portal-title
<portal-title> ] [ portal-msg
<portal-msg> ] [ show-terms-of-use
<show-terms-of-use> ] [ terms-of-use
<terms-of-use> ] [ redirect-after-auth
<redirect-after-auth> ] [ redirect-after-auth-url
<redirect-after-auth-url> ]
Parameters
Parameter |
Description |
---|---|
allowed-group |
Indicates the specific user group that can authenticate through the hotspot when auth-mode is set to allow-specific-group Type: A string of alphanumeric characters without space between them |
auth-mode |
Allow access to a specific user group only or all users Options: allow-all, allow-specific-group |
portal-msg |
The message shown in hotspot portal Type: A string that contains only printable characters |
portal-title |
The title of the hotspot portal Type: A string that contains only printable characters |
redirect-after-auth |
Indicates if after the user accepts terms or authenticate in the hotspot portal the user will be redirected to a configured external URL instead of the originally requested URL Options: on, off |
redirect-after-auth-url |
Redirect the user to the following URL after the user accepts terms or authenticate in the hotspot portal Type: urlWithHttp |
require-auth |
Indicates if user authentication is required Type: Boolean (true/false) |
show-terms-of-use |
Indicates if a terms and conditions link will be shown in the hotspot portal Options: on, off |
terms-of-use |
Indicates the When users will click the terms and conditions text shown in the hotspot portal Type: A string that contains only printable characters |
timeout |
Time, in minutes, untill the hotspot session expires Type: A number with no fractional part (integer) |
Example
set hotspot require-auth true auth-mode allow-all allowed-group word timeout 15 portal-title My Network portal-msg My Network show-terms-of-use on terms-of-use My Network redirect-after-auth on redirect-after-auth-url urlWithHttp
Output
Failure shows an appropriate error message.
Description
Adds an existing network object as an exception for hotspot portal.
Syntax
set hotspot add exception
<exception>
Parameters
Parameter |
Description |
---|---|
exception |
Network object name |
Example
set hotspot add exception TEXT
Output
Failure shows an appropriate error message.
Description
Removes an existing network object from being an exception to hotspot portal.
Syntax
set hotspot remove exception
<exception>
Parameters
Parameter |
Description |
---|---|
exception |
Network object name |
Example
set hotspot remove exception TEXT
Output
Failure shows an appropriate error message.
Description
Configures advanced hotspot settings.
Syntax
set hotspot advanced-settings activation
<activation>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set hotspot advanced-settings activation on
Output
Failure shows an appropriate error message.
Description
Configures advanced hotspot settings.
Syntax
set hotspot advanced-settings prevent-simultaneous-login
<prevent-simultaneous-login>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set hotspot advanced-settings prevent-simultaneous-login true
Output
Failure shows an appropriate error message.
Shows hotspot configuration.
Description
Shows hotspot configuration.
Syntax
show hotspot
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show hotspot
Output
Failure shows an appropriate error message.
Description
Shows hotspot advanced settings configuration.
Syntax
Shows hotspot advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
Shows hotspot advanced-settings
Output
Failure shows an appropriate error message.
Configures HTTPS categorization settings (categorization does not require a full SSL inspection mechanism).
Description
Configures advanced HTTPS categorization settings.
Syntax
set https-categorization advanced-settings validate-cert-expiration
<validate-cert-expiration>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set https-categorization advanced-settings validate-cert-expiration true
Output
Failure shows an appropriate error message.
Description
Configures advanced HTTPS categorization settings.
Syntax
set https-categorization advanced-settings validate-unreachable-crl
<validate-unreachable-crl>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
ext
set https-categorization advanced-settings validate-unreachable-crl true
Output
Failure shows an appropriate error message.
Description
Configures advanced HTTPS categorization settings.
Syntax
set https-categorization advanced-settings validate-crl
<validate-crl>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set https-categorization advanced-settings validate-crl true
Output
Failure shows an appropriate error message.
Description
Shows configuration for HTTPS categorization feature.
Syntax
show https-categorization advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show https-categorization advanced-settings
Output
Failure shows an appropriate error message.
Adds a new virtual interface.
Description
Adds a new 802.1q tag-based VLAN over an existing physical interface.
Syntax
add interface
<assignment> vlan
<vlan>
Parameters
Parameter |
Description |
---|---|
assignment |
The switch or bridge which the object belongs to Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
vlan |
Enter a number that is the virtual identifier Type: A number with no fractional part (integer) |
Example
add interface My_Network vlan 12
Output
Failure shows an appropriate error message.
Description
Adds a new numbered/unnumbered Virtual Tunnel Interface (VTI) to be used for Route-based VPN purposes.
Syntax
text
add vpn tunnel
<vpn tunnel> type { unnumbered peer
<peer>
internet-connection
<internet-connection> | numbered local
<local> remote
<remote> peer
<peer> }
Parameters
Parameter |
Description |
---|---|
internet-connection |
The local interface for unnumbered VTI |
local |
Enter the IP address of the interface Type: IP address |
peer |
Remote peer name as defined in the VPN community. You must define the two peers in the VPN community before you can define the VTI. The Peer ID is an alpha-numeric character string. Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
remote |
Defines the remote peer IPv4 address, used at the peer gateway’s point-to-point virtual interface (numbered VTI only) Type: IP address |
type |
The type of VTI: Numbered VTI that uses a specified, static IPv4 addresses for local and remote connections, or unnumbered VTI that uses the interface and the remote peer name to get addresses Type: Press TAB to see available options |
vpn tunnel |
A number identifying the Virtual Tunnel Interface (VTI) Type: A number with no fractional part (integer) |
Example
text
add vpn tunnel 12 type unnumbered peer site17 internet-connection My connection
Output
Failure shows an appropriate error message.
Description
Deletes an existing virtual interface.
Syntax
delete interface
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
delete interface My_Network
Output
Failure shows an appropriate error message.
Configures local networks/interfaces.
Description
Configures local networks/interfaces.
Syntax
set interface
<name> ipv4-address
<ipv4-address> { subnet-mask
<subnet-mask> default-gw
<default-gw> [ dns-primary
<dns-primary> [ dns-secondary
<dns-secondary> [ dns-tertiary
<dns-tertiary> ] ] ] | mask-length
<mask-length> default-gw
<default-gw> [ dns-primary
<dns-primary> [ dns-secondary
<dns-secondary> [ dns-tertiary
<dns-tertiary> ] ] ] }
Parameters
Parameter |
Description |
---|---|
default-gw |
Default gateway Type: IP address |
dns-primary |
First DNS server IP address Type: IP address |
dns-secondary |
Second DNS server IP address Type: IP address |
dns-tertiary |
Third DNS server IP address Type: IP address |
ipv4-address |
The IP address Type: IP address |
mask-length |
Subnet mask length Type: A string that contains numbers only |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
subnet-mask |
Subnet mask Type: Subnet mask |
Example
set interface My_Network ipv4-address 192.168.1.1 subnet-mask 255.255.255.0 default-gw 192.168.1.1 dns-primary 192.168.1.1 dns-secondary 192.168.1.1
dns-tertiary 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures IP address for local networks/interfaces.
Syntax
set interface
<name> ipv4-address
<ipv4-address> { mask-length
<mask-length> | subnet-mask
<subnet-mask> }
Parameters
Parameter |
Description |
---|---|
ipv4-address |
Enter the IP address of the interface Type: IP address |
mask-length |
Represents the network’s mask length Type: A string that contains numbers only |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
subnet-mask |
Enter the Subnet mask of the specified network Type: A subnet mask, or 255.255.255.255 |
Example
set interface My_Network ipv4-address 192.168.1 mask-length 20
Output
Failure shows an appropriate error message.
Description
Configures a physical interface to be unassigned from existing networks.
Syntax
set interface
<name> unassigned
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set interface LAN2 unassigned
Output
Failure shows an appropriate error message.
Description
Configures monitor mode on an existing local network/interface.
Syntax
set interface
<name> monitor-mode
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set interface My_Network monitor-mode
Output
Failure shows an appropriate error message.
Description
Configures advanced settings on an existing local network/interface.
Syntax
set interface
<name> [ mac-address-override
<mac-address-override> ] [ exclude-from-dns-proxy
<exclude-from-dns-proxy> ]
Parameters
Parameter |
Description |
---|---|
exclude-from-dns- proxy |
Exclude from DNS proxy Options: on, off |
mac-address-override |
Override default MAC address Type: MAC address |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set interface My_Network mac-address-override 00:1C:7F:21:05:BE exclude-from-dns-proxy on
Output
Failure shows an appropriate error message.
Description
Configures networking settings on an existing local network/interface.
Syntax
set interface
<name> [ auto-negotiation
<auto-negotiation> ] [ mtu
<mtu> ] [ link-speed
<link-speed> ]
Parameters
Parameter |
Description |
---|---|
auto-negotiation |
Enable this option in order to manually configure the link speed of the interface. Options: on, off |
link-speed |
Configure the link speed of the interface manually Options: 10/full, 10/half, 100/full, 100/half |
mtu |
Configure the Maximum Transmission Unit size for an interface Type: A number with no fractional part (integer) |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set interface My_Network auto-negotiation on mtu 1460 link-speed 10/full
Output
Failure shows an appropriate error message.
Description
Enable/disable an existing local network/interface.
Syntax
set interface
<name> state
<state>
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
state |
The mode of the network - enabled or disabled Options: on, off |
Example
set interface My_Network state on
Output
Failure shows an appropriate error message.
Description
Configures a description for an existing local network/interface.
Syntax
set interface
<name> [ description
<description> ]
Parameters
Parameter |
Description |
---|---|
description |
Description Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set interface My_Network description “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Configures automatic access policy for an existing local network/interface. This feature is relevant when the device is locally managed.
Syntax
set interface
<name> [ lan-access
<lan-access> ] [ lan-access-track
<lan-access-track>
Parameters
Parameter |
Description |
---|---|
lan-access |
Local networks will be accessible from this network once this option is enabled Options: block, accept |
lan-access-track |
Traffic from this network to local networks will be logged once this option is enabled Options: none, log |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set interface My_Network lan-access block lan-access-track none
Output
Failure shows an appropriate error message.
Description
Configure hotspot functionality for an existing local network/interface.
Syntax
set interface
<name> hotspot
<hotspot>
Parameters
Parameter |
Description |
---|---|
hotspot |
Redirect users to the Hotspot portal before allowing access from this interface Options: on, off |
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set interface My_Network hotspot on
Output
Failure shows an appropriate error message.
Description
Shows configuration and details of local networks.
Syntax
show interface
<name> [ all ]
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
show interface My_Network all
Output
Failure shows an appropriate error message.
Description
Shows the list of defined local networks.
Syntax
show interfaces
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show interfaces
Output
Failure shows an appropriate error message.
Description
Shows details of all defined local networks.
Syntax
show interfaces all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show interfaces all
Output
Failure shows an appropriate error message.
Description
Configures advanced IPS engine settings. This command configures if and when IPS will deactivate upon high resource consumption of the device.
Syntax
set ips engine-settings [ protection-scope
<protection-scope> ] [ bypass-under-load { true [ bypass-track
<bypass-track> ] [ gateway-load-thresholds [ cpu-usage-low-watermark
<cpu-usage-low-watermark> ] [ cpu-usage-high-watermark
<cpu-usage-high-watermark> ] [ memory-usage-low-watermark
<memory-usage-low-watermark> ] [ memory-usage-high-watermark
<memory-usage-high-watermark> ] [ threshold-detection-delay
<threshold-detection-delay> ] ] | false } ]
Parameters
Parameter |
Description |
---|---|
bypass-track |
Indicates how the appliance will track events where the bypass mechanism is activated/deactivated Options: none, log, alert |
bypass-under-load |
Indicates if the IPS engine will move to bypass mode if the appliance is under heavy load Type: Boolean (true/false) |
protection-scope |
Indicates if the IPS blade will protect internal networks only or protect all networks (including external networks) Options: protect-internal-hosts-only, perform-ips-inspection-on-all-traffic |
Example
set ips engine-settings protection-scope protect-internal-hosts-only bypass-under-load true bypass-track none gateway-load-thresholds
cpu-usage-low-watermark 75 cpu-usage-high-watermark 80
memory-usage-low-watermark 75 memory-usage-high-watermark 80
threshold-detection-delay 90
Output
Failure shows an appropriate error message.
Description
Configures advanced IPS engine settings. This command configures a legacy error page shown in some legacy IPS HTTP protections.
Syntax
set ips engine-settings advanced-settings AboutConfigIPSErrorPageConfig [ status-code-desc
<status-code-desc> ] [ show-error-code
<show-error-code> ] [ logo-url
<logo-url> ] [ send-detailed-status-code
<send-detailed-status-code>
] [ enable-logo-url
<enable-logo-url> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set ips engine-settings advanced-settings AboutConfigIPSErrorPageConfig status-code-desc “This is a comment.” show-error-code true logo-url http://www.checkpoint.com/ send-detailed-status-code true enable-logo-url true
Output
Failure shows an appropriate error message.
Description
Configures advanced IPS engine settings. This command configures a legacy error page shown in some legacy IPS HTTP protections.
Syntax
set ips engine-settings advanced-settings AboutConfigIPSErrorPage [
send-error-code
<send-error-code> ] [ error-page-for-supported-web-protections
<error-page-for-supported-web-protections> ] [ url
<url> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set ips engine-settings advanced-settings AboutConfigIPSErrorPage
send-error-code true error-page-for-supported-web-protections do-not-show url http://www.checkpoint.com/
Output
Failure shows an appropriate error message.
Shows engine settings for the IPS blade.
Description
Shows engine settings for the IPS blade.
Syntax
show ips engine-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ips engine-settings
Output
Failure shows an appropriate error message.
Description
Shows advanced engine settings for the IPS blade.
Syntax
show ips engine-settings advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ips engine-settings advanced-settings
Output
Failure shows an appropriate error message.
Description
Adds a new loopback interface (A fixed interface in the system that is commonly used for dynamic routing purposes).
Syntax
add interface-loopback ipv4-address
<ipv4-address> { mask-length
<mask-length> | subnet-mask
<subnet-mask> }
Parameters
Parameter |
Description |
---|---|
ipv4-address |
Enter the IP address of the interface Type: IP address |
mask-length |
Represents the network’s mask length Type: A string that contains numbers only |
subnet-mask |
Enter the Subnet mask of the specified network Type: A subnet mask, or 255.255.255.255 |
Example
add interface-loopback ipv4-address 192.168.1.1 mask-length 20
Output
Failure shows an appropriate error message.
Description
Deletes an existing configured loopback interface.
Syntax
delete interface-loopback
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network name Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
delete interface-loopback My_Network
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for internet connectivity.
Syntax
set internet advanced-settings reset-sierra-usb-on-lsi-event
<reset-sierra-usb-on-lsi-event>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set internet advanced-settings reset-sierra-usb-on-lsi-event true
Output
Failure shows an appropriate error message.
Description
Shows advanced settings for configured internet
Syntax
show internet advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show internet advanced-settings
Output
Failure shows an appropriate error message.
Adds a new internet connection.
Description
Adds a new internet connection using an existing physical interface (multiple internet connection can engage in High Availability/Load Sharing).
Syntax
WAN
For DHCP:
add internet-connection name
<name> interface
WAN type
dhcp
Parameters
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
interface |
Interface name Type: Press TAB to see available options |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
type |
Connection type Type: Press TAB to see available options |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
For Static:
add internet-connection name
<name> interface
WAN type
static default-gw
<default-gw> ipv4-address
<ipv4-address> mask-length
<mask-length>
add internet-connection name
<name> interface
WAN type
static default-gw
<default-gw> ipv4-address
<ipv4-address> subnet-mask
<subnet-mask> { dns-primary
<dns-primary> dns-secondary
<dns-secondary> dns-tertiary
<dns-tertiary>} { use-connection-as-vlan vlan-id
<vlan-id>} { conn-test-timeout
<conn-test-timeout>}
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
interface |
Interface name Type: Press TAB to see available options |
default-gw |
WAN default gateway (in the advanced section of PPTP and l2TP) Type: IP address |
dns-primary |
First DNS server IP address Type: IP address |
dns-secondary |
Second DNS server IP address Type: IP address |
dns-tertiary |
Third DNS server IP address Type: IP address |
ipv4-address |
IP address field (for static IP and bridge settings) Type: IP address |
mask-length |
Subnet mask length Type: A string that contains numbers only |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
subnet-mask |
Subnet mask Type: A subnet mask, or 255.255.255.255 |
type |
Connection type Type: Press TAB to see available options |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
For L2TP
add internet-connection name
<name> interface
WAN type
l2tp server
<server> password-hash
<password-hash>
add internet-connection name
<name> interface
WAN type
l2tp server
<server> password
<password> username
<username> { local-ipv4-address
<local-ipv4-address> wan-ipv4-address
<wan-ipv4-address> wan-mask-length
<wan-mask-length>
add internet-connection name
<name> interface
WAN type
l2tp server
<server> password
<password> username
<username> { local-ipv4-address
<local-ipv4-address> wan-ipv4-address
<wan-ipv4-address> wan-subnet-mask
<wan-mask-length> default-gw
<default-gw>} { is-unnumbered-pppoe
<is-unnumbered-pppoe> local-ipv4-address
<local-ipv4-address>}
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
interface |
Interface name Type: Press TAB to see available options |
default-gw |
WAN default gateway (in the advanced section of PPTP and l2TP) Type: IP address |
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or 'auto' |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
server |
Server IP address Type: IP address |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
wan-ipv4-address |
Wan IP address wrapper Type: An IP address, or ’auto’ |
wan-mask-length |
WAN subnet mask length Type: A string that contains numbers only |
wan-subnet-mask |
WAN subnet mask (in the advanced section) Type: Subnet mask |
For PPPoE:
add internet-connection name <
name> interface
WAN type
pppoe username
<username> password-hash
<password-hash>
add internet-connection name
<name> interface
WAN type
pppoe username
<username> password
<password-hash> { is-unnumbered-pppoe
<is-unnumbered-pppoe> local-ipv4-address
<local-ipv4-address> }
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
interface |
Interface name Type: Press TAB to see available options |
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or ’auto’ |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
For PPTP:
add internet-connection name <name> interface WAN type pptp server <server> password-hash <password-hash>
add internet-connection name <name> interface WAN type pptp server <server> password <password > username <username> { { local-ipv4-address <local-ipv4-address> wan-ipv4-address <wan-ipv4-address> wan-mask-length <wan-mask-length>
add internet-connection name <name> interface WAN type pptp server <server> password <password> username <username> { local-ipv4-address <local-ipv4-address> wan-ipv4-address <wan-ipv4-address> wan-subnet-mask <wan-subnet-mask> default-gw <default-gw>} { is-unnumbered-pppoe <is-unnumbered-pppoe> local-ipv4-address <local-ipv4-address>}
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
interface |
Interface name Type: Press TAB to see available options |
default-gw |
|
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or ’auto’ |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
server |
Server IP address Type: IP address |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
wan-ipv4-address |
Wan IP address wrapper Type: An IP address, or ’auto’ |
wan-mask-length |
WAN subnet mask length Type: A string that contains numbers only |
wan-subnet-mask |
WAN subnet mask (in the advanced section) Type: Subnet mask |
ADSL
For EoA:
add internet-connection name
<name> interface
ADSL type
eoa
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
encapsulation |
Encapsulation type for the ADSL connection Options: llc, vcmux |
interface |
Interface name Type: Press TAB to see available options |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
standard |
The ADSL standard to use Options: multimode, t1413, glite, gdmt, adsl2, adsl2+ |
type |
Connection type Type: Press TAB to see available options |
vci |
VCI value for the ADSL connection Type: A number between 0 and 65535 |
vpi |
VPI value for the ADSL connection Type: A number between 0 and 255 |
For PPPoA:
add internet-connection name
<name> interface
ADSL type
pppoa username
<username> password-hash
<password-hash>
add internet-connection name
<name> interface
ADSL type
pppoa username
<username> password
<password>{ encapsulation
<encapsulation> is-unnumbered-pppoe
<is-unnumbered-pppoe> local-ipv4-address
<local-ipv4-address> vci
<vci> vpi
<vpi> }
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
encapsulation |
Encapsulation type for the ADSL connection Options: llc, vcmux |
interface |
Interface name Type: Press TAB to see available options |
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or ’auto’ |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
type |
Connection type Type: Press TAB to see available options
|
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
vci |
VCI value for the ADSL connection Type: A number between 0 and 65535 |
vpi |
VPI value for the ADSL connection Type: A number between 0 and 255 |
For PPPoE:
add internet-connection name
<name> interface
ADSL type
pppoe username
<username> password-hash
<password-hash>
add internet-connection name
<name> interface
ADSL type
pppoe username
<username> password
<password> { encapsulation
<encapsulation> is-unnumbered-pppoe
<is-unnumbered-pppoe> local-ipv4-address
<local-ipv4-address> vci
<vci> vpi
<vpi>} { encapsulation
<encapsulation> vci
<vci> vpi
<vpi>} { conn-test-timeout
<conn-test-timeout> standard
<standard>}
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
encapsulation |
Encapsulation type for the ADSL connection Options: llc, vcmux |
interface |
Interface name Type: Press TAB to see available options |
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or ’auto’ |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
vci |
VCI value for the ADSL connection Type: A number between 0 and 65535 |
vpi |
VPI value for the ADSL connection Type: A number between 0 and 255 |
DSL
For IPoE-Dynamic:
add internet-connection name
<name> interface
DSL type
ipoe-dynamic
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
encapsulation |
Encapsulation type for the ADSL connection Options: llc, vcmux |
interface |
Interface name Type: Press TAB to see available options |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
type |
Connection type Type: Press TAB to see available options |
vci |
VCI value for the ADSL connection Type: A number between 0 and 65535 |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
vpi |
VPI value for the ADSL connection Type: A number between 0 and 255 |
For IPoE-Static:
add internet-connection name
<name> interface
DSL type
ipoe-static default-gw
<default-gw> ipv4-address
<ipv4-address> mask-length
<mask-length>
add internet-connection name
<name> interface
DSL type
ipoe-static default-gw
<default-gw> ipv4-address
<ipv4-address> subnet-mask VALUE { dns-primary
<dns-primary> dns-secondary
<dns-secondary> dns-tertiary
<dns-tertiary> }
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
default-gw |
WAN default gateway (in the advanced section of PPTP and l2TP) Type: IP address |
dns-primary |
First DNS server IP address Type: IP address |
dns-secondary |
Second DNS server IP address Type: IP address |
dns-tertiary |
Third DNS server IP address Type: IP address |
encapsulation |
Encapsulation type for the ADSL connection Options: llc, vcmux |
interface |
Interface name Type: Press TAB to see available options |
ipv4-address |
IP address field (for static IP and bridge settings) Type: IP address |
mask-length |
Subnet mask length Type: A string that contains numbers only |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
subnet-mask |
Subnet mask Type: A subnet mask, or 255.255.255.255 |
type |
Connection type Type: Press TAB to see available options |
vci |
VCI value for the ADSL connection Type: A number between 0 and 65535 |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
vpi |
VPI value for the ADSL connection Type: A number between 0 and 255 |
For PPPoE:
add internet-connection name
<name> interface
DSL type
pppoe username
<username> password-hash
<password-hash>
add internet-connection name
<name> interface
DSL type
pppoe username
<username> password
<password> { encapsulation
<encapsulation> is-unnumbered-pppoe
<is-unnumbered-pppoe> local-ipv4-address
<local-ipv4-address> vci
<vci> vpi
<vpi> } { encapsulation
<encapsulation> vci
<vci> vpi
<vpi> } { use-connection-as-vlan vlan-id
<vlan-id> } { conn-test-timeout
<conn-test-timeout>}
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
encapsulation |
Encapsulation type for the ADSL connection Options: llc, vcmux |
interface |
Interface name Type: Press TAB to see available options |
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or 'auto' |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP>
|
vci |
VCI value for the ADSL connection Type: A number between 0 and 65535 |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
vpi |
VPI value for the ADSL connection Type: A number between 0 and 255 |
DMZ
For DHCP:
add internet-connection name
<name> interface
DMZ type
dhcp
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
interface |
Interface name Type: Press TAB to see available options |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
type |
Connection type Type: Press TAB to see available options |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
For Static:
add internet-connection name
<name> interface
DMZ type
static default-gw
<default-gw> ipv4-address
<ipv4-address> mask-length
<mask-length>
add internet-connection name
<name> interface
DMZ type
static default-gw
<default-gw> ipv4-address
<ipv4-address> subnet-mask
<subnet-mask> { dns-primary
<dns-primary> dns-secondary
<dns-secondary> dns-tertiary
<dns-tertiary>} { use-connection-as-vlan vlan-id
<vlan-id>} { conn-test-timeout
<conn-test-timeout>}
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
interface |
Interface name Type: Press TAB to see available options |
default-gw |
WAN default gateway (in the advanced section of PPTP and l2TP) Type: IP address |
dns-primary |
First DNS server IP address Type: IP address |
dns-secondary |
Second DNS server IP address Type: IP address |
dns-tertiary |
Third DNS server IP address Type: IP address |
ipv4-address |
IP address field (for static IP and bridge settings) Type: IP address |
mask-length |
Subnet mask length Type: A string that contains numbers only |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
subnet-mask |
Subnet mask Type: A subnet mask, or 255.255.255.255 |
type |
Connection type Type: Press TAB to see available options |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
For L2TP:
add internet-connection name
<name> interface
DMZ type
l2tp server
<server> password-hash
<password-hash>
add internet-connection name
<name> interface
DMZ type
l2tp server
<server> password
<password> username
<username> { local-ipv4-address
<local-ipv4-address> wan-ipv4-address
<wan-ipv4-address> wan-subnet-mask
<wan-mask-length> default-gw
<default-gw>} { is-unnumbered-pppoe
<is-unnumbered-pppoe> local-ipv4-address
<local-ipv4-address>}
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
interface |
Interface name Type: Press TAB to see available options |
default-gw |
WAN default gateway (in the advanced section of PPTP and l2TP) Type: IP address |
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or ’auto’ |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
server |
Server IP address Type: IP address |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
wan-ipv4-address |
Wan IP address wrapper Type: An IP address, or ’auto’ |
wan-mask-length |
WAN subnet mask length Type: A string that contains numbers only |
wan-subnet-mask |
WAN subnet mask (in the advanced section) Type: Subnet mask |
For PPPoE:
add internet-connection name
<name> interface
DMZ type
pppoe username
<username> password-hash
<password>
add internet-connection name
<name> interface
DMZ type
pppoe username
<username> password
<password> { is-unnumbered-pppoe
<is-unnumbered-pppoe> local-ipv4-address
<local-ipv4-address>}
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
interface |
Interface name Type: Press TAB to see available options |
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or ’auto’ |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
For PPTP:
add internet-connection name
<name> interface
DMZ type
pptp server <server> password-hash
<password-hash>
add internet-connection name
<name> interface
DMZ type
pptp server
<server> password
<password> username
<username> { { local-ipv4-address
<local-ipv4-address> wan-ipv4-address
<wan-ipv4-address> wan-mask-length
<wan-mask-length>
add internet-connection name
<name> interface
DMZ type
pptp server
<server> password
<password> username
<username> { local-ipv4-address
<local-ipv4-address> wan-ipv4-address
<wan-ipv4-address> wan-subnet-mask
<wan-subnet-mask> default-gw
<default-gw>} { is-unnumbered-pppoe
<is-unnumbered-pppoe> local-ipv4-address
<local-ipv4-address>}
Parameter |
Description |
---|---|
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
interface |
Interface name Type: Press TAB to see available options |
default-gw |
WAN default gateway (in the advanced section of PPTP and l2TP) Type: IP address |
dns-primary |
First DNS server IP address Type: IP address |
dns-secondary |
Second DNS server IP address Type: IP address |
dns-tertiary |
Third DNS server IP address Type: IP address |
encapsulation |
Encapsulation type for the ADSL connection Options: llc, vcmux |
ipv4-address |
IP address field (for static IP and bridge settings) Type: IP address |
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once Type: Boolean (true/false) |
isVlan |
isVlan Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or ’auto’ |
mask-length |
Subnet mask length Type: A string that contains numbers only |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
server |
Server IP address Type: IP address |
standard |
The ADSL standard to use Options: multimode, t1413, glite, gdmt, adsl2, adsl2+ |
subnet-mask |
Subnet mask Type: A subnet mask, or 255.255.255.255 |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
vci |
VCI value for the ADSL connection Type: A number between 0 and 65535 |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
vpi |
VPI value for the ADSL connection Type: A number between 0 and 255 |
wan-ipv4-address |
Wan IP address wrapper Type: An IP address, or ’auto’ |
wan-mask-length |
WAN subnet mask length Type: A string that contains numbers only |
wan-subnet-mask |
WAN subnet mask (in the advanced section) Type: Subnet mask |
Example
add internet-connection name My connection interface WAN true vlan-id
-1000000 type static ipv4-address 192.168.1.1 subnet-mask 255.255.255.0
default-gw 192.168.1.1 dns-primary 192.168.1.1 dns-secondary 192.168.1.1
dns-tertiary 192.168.1.1 conn-test-timeout -1000000
Output
Failure shows an appropriate error message.
Description
Adds a new internet connection using an external 3G/4G modem connected directly to the appliance (multiple internet connection can engage in High Availability/Load Sharing).
Syntax
USB:
add internet-connection name
<name> type
analog use-serial-port
false number
<number> { username
<username> password-hash
<password-hash> }
add internet-connection name
<name> type
analog use-serial-port
false number
<number> { username
<username> password
<password> }
add internet-connection name
<name> type
analog use-serial-port
true number
<number> { username
<username> password-hash
<password-hash> }
add internet-connection name
<name> type
analog use-serial-port
true number
<number> username
<username> password
<password> { flow-control
<flow-control> port-speed
<port-speed>} { conn-test-timeout
<conn-test-timeout>}
add internet-connection name
<name> type
cellular number
<number> { conn-test-timeout
<conn-test-timeout> } name
<name>} { apn
<apn> username
<username> password-hash
<password-hash> }
add internet-connection name
<name> type
cellular number
<number> { conn-test-timeout
<conn-test-timeout> name
<name>} { apn
<apn> username
<username> password
<password> }
Parameters
Parameter |
Description |
---|---|
apn |
APN (cellular modem settings) Type: A string that contains [a-z], [0-9], ’-’ and ’.’ characters |
conn-test-timeout |
Connection test timeout Type: A number with no fractional part (integer) |
flow-control |
Flow control (serial port settings) Options: rts-cts, xon-xoff |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
number |
Dialed number of the cellular modem settings Type: A sequence of numbers and #,* characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
port-speed |
Port speed (serial port settings) Options: 9600, 19200, 38400, 57600, 115200, 230400 |
type |
Connection type Type: Press TAB to see available options |
use-serial-port |
Use serial port Type: Boolean (true/false) |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
Example
add internet-connection type analog use-serial-port true number 758996 username MyUsername@MyISP password internetPassword port-speed 9600
flow-control rts-cts conn-test-timeout 50 name My connection
Output
Failure shows an appropriate error message.
Deletes an existing internet connection or internet connection related configuration.
Description
Deletes an existing internet connection by name.
Syntax
delete internet-connection
<name>
Parameters
Parameter |
Description |
---|---|
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
Example
delete internet-connection My connection
Output
Failure shows an appropriate error message.
Description
Deletes an existing internet connection’s ping servers, configured for connection health monitoring.
Syntax
delete internet-connection
<name> probe-icmp-servers [ first ] [ second ] [ third ]
Parameters
Parameter |
Description |
---|---|
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
Example
delete internet-connection My connection probe-icmp-servers first second third
Output
Failure shows an appropriate error message.
Description
Deletes all existing internet connections.
Syntax
delete internet-connections
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete internet-connections
Output
Failure shows an appropriate error message.
Configures internet connections settings.
Description
Configures an existing internet connection.
Syntax
set internet-connection
<name> [ auto-negotiation
<auto-negotiation> ] [ link-speed
<link-speed> ] [ mtu
<mtu> ] [ mac-addr
<mac-addr> ]
Parameters
Parameter |
Description |
---|---|
auto-negotiation |
Disable auto negotiation and manually define negotiation link speed Options: on, off |
link-speed |
Link speed Options: 100/full, 100/half, 10/full, 10/half |
mac-addr |
Default mac address wrapper Type: A MAC address or ’default’ |
mtu |
MTU size. Select ’default’ for default value. Type: A string of alphanumeric characters without space between them |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
Example
set internet-connection My connection auto-negotiation on link-speed 100/full mtu word mac-addr 00:1C:7F:21:05:BE
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for an existing internet connection.
Syntax
set internet-connection
<name> connect-on-demand
<connect-on-demand>
Parameters
Parameter |
Description |
---|---|
connect-on-demand |
Holds the status of the connect on demand feature Type: Boolean (true/false) |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
Example
set internet-connection My connection connect-on-demand true
Output
Failure shows an appropriate error message.
Description
Enable/Disable an existing internet connection.
Syntax
set internet-connection
<name> { enable | disable }
Parameters
Parameter |
Description |
---|---|
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
state |
Connection enabled/disabled Type: Boolean (true/false) |
Example
set internet-connection My connection true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for an existing internet connection. Download bandwidth details allow QoS blade to run on this internet connection in locally/SMP managed mode and when managed using an LSM profile.
Syntax
set internet-connection
<name> qos-download { true [ bandwidth
<bandwidth> ]| false }
Parameters
Parameter |
Description |
---|---|
bandwidth |
ISP download bandwidth Type: A number with no fractional part (integer) |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
qos-download |
Enable QoS (quality of service) restriction on inbound traffic (download) Type: Boolean (true/false) |
Example
set internet-connection My connection qos-download true bandwidth 100
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for an existing internet connection. Upload bandwidth details allow QoS blade to run on this internet connection in locally/SMP managed mode and when managed using an LSM profile.
Syntax
set internet-connection
<name> qos-upload { true [ bandwidth
<bandwidth> ] | false }
Parameters
Parameter |
Description |
---|---|
bandwidth |
ISP upload bandwidth Type: A number with no fractional part (integer) |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
qos-upload |
Enable QoS (quality of service) restriction on outbound traffic (upload) Type: Boolean (true/false) |
Example
set internet-connection My connection qos-upload true bandwidth 5
Output
Failure shows an appropriate error message.
Description
Configure hide NAT behavior on an existing internet connection. It is possible to disable hide-NAT from a specific internet connection.
Syntax
set internet-connection
<name> disable-nat
<disable-nat>
Parameters
Parameter |
Description |
---|---|
disable-nat |
Disable NAT(Network Address Translation) for traffic going through this Internet connection Type: Boolean (true/false) |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
Example
set internet-connection My connection disable-nat true
Output
Failure shows an appropriate error message.
Description
Configures multiple ISP settings for an existing internet connection.
Syntax
set internet-connection
<name> ha-priority
<ha-priority> load-balancing-weight
<load-balancing-weight>
Parameters
Parameter |
Description |
---|---|
ha-priority |
Priority of the connection in HA Type: A number with no fractional part (integer) |
load-balancing-weight |
Internet connection weight for load balancing configuration Type: A number with no fractional part (integer) |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
Example
set internet-connection My connection ha-priority 2 load-balancing-weight 15
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for an existing internet connection. It is possible to remove a configured internet connection from being used as a default route, making it available for traffic through manual/dynamic routing rules.
Syntax
set internet-connection
<name> route-traffic-through-default-gateway
<route-traffic-through-default-gateway>
Parameters
Parameter |
Description |
---|---|
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
route-traffic-through- default-gateway |
In order to route traffic through this connection you need to add specific routes through it Type: Boolean (true/false) |
Example
set internet-connection My connection route-traffic-through-default-gateway true
Output
Failure shows an appropriate error message.
Description
Configures settings for an existing internet connection.
Syntax
set internet-connection
<name> type { dhcp | pptp username
<username> {
password
<password> | password-hash
<password-hash> } [ local-ipv4-address
<local-ipv4-address> ] [ is-unnumbered-pppoe
<is-unnumbered-pppoe> ] server
<server> [ local-ipv4-address
<local-ipv4-address> ] [ wan-ipv4-address
<wan-ipv4-address> { wan-subnet-mask
<wan-subnet-mask> | wan-mask-length
<wan-mask-length> } default-gw
<default-gw> ] | static ipv4-address
<ipv4-address> { subnet-mask
<subnet-mask> | mask-length
<mask-length>
} default-gw
<default-gw> [ dns-primary
<dns-primary> ] [ dns-secondary
<dns-secondary> ] [ dns-tertiary
<dns-tertiary> ] | l2tp username
<username>
{ password
<password> | password-hash
<password-hash> } [ local-ipv4-address
<local-ipv4-address> ] [ is-unnumbered-pppoe
<is-unnumbered-pppoe> ] server
<server> [ local-ipv4-address
<local-ipv4-address> ] [ wan-ipv4-address
<wan-ipv4-address> { wan-subnet-mask
<wan-subnet-mask> | wan-mask-length
<wan-mask-length> } default-gw
<default-gw> ] }
Parameters
Parameter |
Description |
---|---|
default-gw |
Default gateway Type: IP address |
dns-primary |
First DNS server IP address Type: IP address |
dns-secondary |
Second DNS server IP address Type: IP address |
dns-tertiary |
Third DNS server IP address Type: IP address |
ipv4-address |
IP address field (for static IP and bridge settings) Type: IP address |
is-unnumbered-pppoe |
Unnumbered PPoE lets you manage a range of IP addresses and dial only once. Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or ’auto’ |
mask-length |
Subnet mask length Type: A string that contains numbers only |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
server |
Server IP address Type: IP address |
subnet-mask |
Subnet mask Type: A subnet mask, or 255.255.255.255 |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
wan-ipv4-address |
Wan IP address wrapper Type: An IP address, or ’auto’ |
wan-mask-length |
WAN subnet mask length Type: A string that contains numbers only |
wan-subnet-mask |
WAN subnet mask (in the advanced section) Type: Subnet mask |
Example
set internet-connection My connection type dhcp
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for an existing internet connection.
Syntax
set internet-connection
<name> type { pppoa username
<username> {
password
<password> | password-hash
<password-hash> } [ local-ipv4-address
<local-ipv4-address> ] [ is-unnumbered-pppoe
<is-unnumbered-pppoe> ] [ vpi
<vpi> ] [ vci
<vci> ] [ encapsulation
<encapsulation> ] | eoa }
Parameters
Parameter |
Description |
---|---|
encapsulation |
Encapsulation type for the ADSL connection Options: llc, vcmux |
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once. Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or ’auto’ |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password. Type: passwordHash |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quotelike characters. Usually <username>@<ISP> |
vci |
VCI value for the ADSL connection Type: A number between 0 and 65535 |
vpi |
VPI value for the ADSL connection Type: A number between 0 and 255 |
Example
set internet-connection My connection type pppoe username MyUsername@MyISP
password internetPassword local-ipv4-address auto is-unnumbered-pppoe true vpi
42 vci 42 encapsulation llc
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for an existing internet connection. This command is available only for hardware that contains a DSL port.
Syntax
set internet-connection
<name> type { pppoa [ method
<method> ] [ idle-time
<idle-time> ] [ standard
<standard> ] | eoa [ vpi
<vpi> ] [ vci
<vci> ] [
encapsulation
<encapsulation> ] [ wan-ipv4-address
<wan-ipv4-address> {
wan-subnet-mask
<wan-subnet-mask> | wan-mask-length
<wan-mask-length> }
default-gw
<default-gw> ] [ standard
<standard> ] }
Parameters
Parameter |
Description |
---|---|
default-gw |
WAN default gateway (in the advanced section of PPTP and l2TP) Type: IP address |
encapsulation |
Encapsulation for the ADSL connection Options: llc, vcmux |
idle-time |
Disconnect idle time Type: A number with no fractional part (integer) |
method |
Authentication method Options: auto, pap, chap |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
standard |
The ADSL standard to use Options: multimode, t1413, glite, gdmt, adsl2, adsl2+ |
type |
Connection type Type: Press TAB to see available options |
vci |
VCI value for the ADSL connection Type: A number between 0 and 65535 |
vpi |
VPI value for the ADSL connection Type: A number between 0 and 255 |
wan-ipv4-address |
Wan IP address wrapper Type: An IP address, or ’auto’ |
wan-mask-length |
WAN subnet mask length Type: A string that contains numbers only |
wan-subnet-mask |
WAN subnet mask (in the advanced section) Type: Subnet mask |
Example
set internet-connection My connection type pppoa method auto idle-time
-1000000 standard multimode
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for an existing internet connection. This command is available only for hardware that contains a DSL port.
Syntax
set internet-connection
<name> type { pppoe [ username
<username>
] [ { password
<password> | password-hash
<password-hash> } ] [ [ {
use-connection-as-vlan } vlan-id
<vlan-id> ] ] [ local-ipv4-address
<local-ipv4-address> ] [ is-unnumbered-pppoe
<is-unnumbered-pppoe> ] [ vpi
<vpi> ] [ vci
<vci> ] [ encapsulation
<encapsulation> ] [ method
<method>
] [ idle-time
<idle-time> ] [ standard
<standard> ] | ipoe-dynamic [ {
use-connection-as-vlan } vlan-id
<vlan-id> ] [ vpi
<vpi> ] [ vci
<vci> ] [
encapsulation
<encapsulation> ] | ipoe-static ipv4-address
<ipv4-address>
{ subnet-mask
<subnet-mask> | mask-length
<mask-length> } default-gw
<default-gw> [ dns-primary
<dns-primary> ] [ dns-secondary
<dns-secondary> ]
[ dns-tertiary
<dns-tertiary> ] [ { use-connection-as-vlan } vlan-id
<vlan-id>
] [ vpi
<vpi> ] [ vci
<vci> ] [ encapsulation
<encapsulation> ] }
Parameters
Parameter |
Description |
---|---|
default-gw |
Default gateway Type: IP address |
dns-primary |
First DNS server IP address Type: IP address |
dns-secondary |
Second DNS server IP address Type: IP address |
dns-tertiary |
Third DNS server IP address Type: IP address |
encapsulation |
Encapsulation type for the ADSL connection Options: llc, vcmux |
idle-time |
Disconnect idle time Type: A number with no fractional part (integer) |
ipv4-address |
IP address field (for static IP and bridge settings) Type: IP address |
is-unnumbered-pppoe |
Unnumbered PPPoE lets you manage a range of IP addresses and dial only once Type: Boolean (true/false) |
isVlan |
isVlan Type: Boolean (true/false) |
local-ipv4-address |
Local tunnel IP address or Auto for automatic Type: An IP address, or 'auto' |
mask-length |
Subnet mask length Type: A string that contains numbers only |
method |
Authentication method Options: auto, pap, chap |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
standard |
The ADSL standard to use Options: multimode, t1413, glite, gdmt, adsl2, adsl2+ |
subnet-mask |
Subnet mask Type: A subnet mask, or 255.255.255.255 |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quotelike characters. Usually <username>@<ISP> |
vci |
VCI value for the ADSL connection Type: A number between 0 and 65535 |
vlan-id |
VLAN ID Type: A number with no fractional part (integer) |
vpi |
VPI value for the ADSL connection Type: A number between 0 and 255 |
Example
set internet-connection My connection type pppoe username MyUsername@MyISP
password internetPassword true vlan-id -1000000 local-ipv4-address auto
is-unnumbered-pppoe true vpi 42 vci 42 encapsulation llc method auto idle-time
-1000000 standard multimode
Output
Failure shows an appropriate error message.
Description
Configures settings for an existing internet connection.
Syntax
set internet-connection
<name> type { cellular number
<number> [ username
<username> { password
<password> | password-hash
<password-hash> } ] [ apn
<apn> ] }
Parameters
Parameter |
Description |
---|---|
apn |
APN (cellular modem settings) Type: A string that contains [a-z], [0-9], ’-’ and ’.’ characters |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
number |
Dialed number of the cellular modem settings Type: A sequence of numbers and #,* characters |
password |
Password for PPP connection or cellular modem settings Type: internetPassword |
password-hash |
The hash of the user password Type: passwordHash |
type |
Connection type Type: Press TAB to see available options |
username |
User name for PPP connection or cellular modem settings Type: A string that contains all printable characters but a single or double quote- like characters. Usually <username>@<ISP> |
Example
set internet-connection My connection type cellular number 758996 username MyUsername@MyISP password internetPassword apn my-apn
Output
Failure shows an appropriate error message.
Description
Configures health monitoring settings for an existing internet connection.
Syntax
set internet-connection
<name> probe-next-hop
<probe-next-hop> [ probe-servers
<probe-servers> ][ probing-method
<probing-method> ]
Parameters
Parameter |
Description |
---|---|
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
probe-next-hop |
Automatically detect loss of connectivity to the default gateway Type: Boolean (true/false) |
probe-servers |
Monitor connection state by sending probe packets to one or more servers on the Internet Type: Boolean (true/false) |
probing-method |
Connection probing method Options: icmp, dns |
Example
set internet-connection My connection probe-next-hop true probe-servers true probing-method icmp
Output
Failure shows an appropriate error message.
Description
Configures health monitoring settings for an existing internet connection.
Syntax
set internet-connection <
name> { probe-icmp-servers } first
<first> [ second
<second> ] [ third
<third> ]
Parameters
Parameter |
Description |
---|---|
first |
First IP address for the probing method (when using connection monitoring) Type: An IP address or host name |
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
probing-method |
Connection probing method Options: icmp, dns |
second |
Second IP address for the probing method (when using connection monitoring) Type: An IP address or host name |
third |
Third IP address for the probing method (when using connection monitoring) Type: An IP address or host name |
Example
set internet-connection My connection icmp first myHost.com second
myHost.com third myHost.com
Output
Failure shows an appropriate error message.
Shows configuration and details of defined internet connections.
Description
Shows configuration and details of a defined internet connection.
Syntax
show internet-connection
<name>
Parameters
Parameter |
Description |
---|---|
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
Example
show internet-connection My connection
Output
Failure shows an appropriate error message.
Description
Shows configured ping servers for health monitoring of defined internet connection.
Syntax
show internet-connection
<name> icmp-servers
Parameters
Parameter |
Description |
---|---|
name |
Connection name Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’ and space characters |
Example
show internet-connection My connection icmp-servers
Output
Failure shows an appropriate error message.
Description
Shows details and configuration of all internet connections.
Syntax
show internet-connections
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show internet-connections
Output
Failure shows an appropriate error message.
Description
Shows details and configuration of all internet connections in a table.
Syntax
show internet-connections table
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show internet-connections table
Output
Failure shows an appropriate error message.
Description
Configures multiple ISP internet connections behavior. Determines whether traffic will be distributed automatically across the defined active Internet connections according to the configured load balancing weights or use the default High Availability behavior based on priorities of each internet connection.
Syntax
set internet mode { load-balancing | high-availability }
Parameters
Parameter |
Description |
---|---|
lb-mode |
The load balancing mode Options: on, off |
Example
set internet mode on
Output
Failure shows an appropriate error message.
Description
Shows multiple internet connections mode (High Availability or Load Sharing.
Syntax
show internet mode
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show internet mode
Output
Failure shows an appropriate error message.
Configures how the appliance handles IP fragments.
Description
Configures how the appliance handles IP fragments.
Syntax
set ip-fragments-params advanced-settings minsize
<minsize>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set ip-fragments-params advanced-settings minsize 150
Output
Failure shows an appropriate error message.
Description
Configures how the appliance handles IP fragments.
Syntax
set ip-fragments-params advanced-settings config [ track
<track> ] [ limit
<limit> ] [ advanced-state
<advanced-state> ] [ timeout
<timeout> ] [ pkt-cap
<pkt-cap> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set ip-fragments-params advanced-settings config track none limit 150 advanced-state forbid timeout 15 pkt-cap true
Output
Failure shows an appropriate error message.
Description
Shows configuration of IP fragments handling.
Syntax
show ip-fragments-params advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ip-fragments-params advanced-settings
Output
Failure shows an appropriate error message.
Description
Enable the IPv6 mode of the appliance.
Syntax
set ipv6-state
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set ipv6-state
Output
Failure shows an appropriate error message.
Description
Show if the IPv6 mode of the appliance is enabled or disabled.
Syntax
show ipv6-state
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ipv6-state
Output
Failure shows an appropriate error message.
Description
Fetches a license from one of these locations:
Syntax
fetch license {local [file
<file_name>]|usercenter|usb [file
<file_name>]
Parameters
Parameter |
Description |
---|---|
|
Name of the file that contains the license |
Return Value
0 on success, 1 on failure
Example
fetch license usb file LicenseFile.xml
Output
Success shows OK
. Failure shows an appropriate error message.
Description
Shows current license state.
Syntax
show license
Parameters
Parameter |
Description |
---|---|
|
|
Example
show license
Output
Current license state
Description
Adds a new group for user objects.
Syntax
add local-group name
<name> [ comments
<comments> ] [ remote-access-on
<remote-access-on> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
name |
Local group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
remote-access-on |
Indicates if the users group have remote access permissions Type: Boolean (true/false) |
Example
add local-group name myObject_17 comments “This is a comment.” remote-access-on true
Output
Failure shows an appropriate error message.
Deletes an existing group object for user objects.
Description
Deletes an existing group object for user objects by group object name.
Syntax
delete local-group name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Local group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
delete local-group name myObject_17
Output
Failure shows an appropriate error message.
Description
Deletes all existing group objects for user objects.
Syntax
delete local-group all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete local-group all
Output
Failure shows an appropriate error message.
Configures an existing user group object.
Description
Configures an existing user group object.
Syntax
set local-group name
<name> [ new-name
<new-name> ] [ comments
<comments> ] [ remote-access-on
<remote-access-on> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
name |
Local group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
new-name |
Local group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
remote-access-on |
Indicates if the users group have remote access permissions Type: Boolean (true/false) |
Example
set local-group name myObject_17 new-name myObject_17 comments “This is a comment.” remote-access-on true
Output
Failure shows an appropriate error message.
Description
Adds a bookmark to be shown in the SNX landing page to an existing user group object. This is relevant only if users in this group have VPN remote access privileges.
Syntax
set local-group name
<name> add bookmark label
<bookmark label>
Parameters
Parameter |
Description |
---|---|
bookmark label |
Text for the bookmark in the SSL Network Extender portal |
name |
Local group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set local-group name myObject_17 add bookmark label myLabel
Output
Failure shows an appropriate error message.
Description
Removes a bookmark from being shown in the SNX landing page to an existing user group object. This is relevant only if users in this group have VPN remote access privileges.
Syntax
set local-group name
<name> remove bookmark label
<bookmark label>
Parameters
Parameter |
Description |
---|---|
bookmark label |
Text for the bookmark in the SSL Network Extender portal |
name |
Local group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set local-group name myObject_17 remove bookmark label myLabel
Output
Failure shows an appropriate error message.
Description
Shows the content of a user group object.
Syntax
show local-group name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Local group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
show local-group name myObject_17
Output
Failure shows an appropriate error message.
Description
Shows the content of all user group objects.
Syntax
show local-groups
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show local-groups
Output
Failure shows an appropriate error message.
Configures an existing user group object.
Description
Adds a user to an existing user group object.
Syntax
set local-group users name
<name> add user-name
<user-name>
Parameters
Parameter |
Description |
---|---|
name |
Local group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
user-name |
User’s name in the local database |
Example
set local-group users name myObject_17 add user-name admin
Output
Failure shows an appropriate error message.
Description
Removes a user from an existing user group object.
Syntax
set local-group users name
<name> remove user-name
<user-name>
Parameters
Parameter |
Description |
---|---|
name |
Local group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
user-name |
User’s name in the local database |
Example
set local-group users name myObject_17 remove user-name admin
Output
Failure shows an appropriate error message.
Description
Adds a new locally defined user object and configure its VPN remote access permissions.
Syntax
add local-user name
<name> { password-hash
<password-hash> | password
<password> } [ comments
<comments> ] [ remote-access-always-on
<remote-access-always-on> ] [ is-temp-user { true expiration-date
<expiration-date> [ expiration-time
<expiration-time> ] | false } ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
expiration-date |
Expiration date for a temporary user in format yyyy-mm-dd Type: A date format yyyy-mm-dd |
expiration-time |
Expiration time for a temporary user in format HH:MM Type: A time format hh:mm |
is-temp-user |
Indicates if the user entry is temporary Type: Boolean (true/false) |
name |
User’s name in the local database Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
password |
User’s password in the local database Type: A string that contains alphanumeric and special characters |
password-hash |
User’s hashed password (used for importing database) Type: An encrypted password |
remote-access-always-on |
Always enable remote access permission for user Type: Boolean (true/false) |
Example
add local-user name admin password-hash TZXPLs20bN0RA comments “This is a comment.” remote-access-always-on true is-temp-user true expiration-date
2000-01-01 expiration-time 23:20
Output
Failure shows an appropriate error message.
Deletes an existing locally defined user object.
Description
Deletes an existing locally defined user object by user name.
Syntax
delete local-user name
<name>
Parameters
Parameter |
Description |
---|---|
name |
User’s name in the local database Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
delete local-user name admin
Output
Failure shows an appropriate error message.
Description
Deletes all existing locally defined user objects by user name.
Syntax
delete local-user all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete local-user all
Output
Failure shows an appropriate error message.
Configures an existing user object.
Description
Configures an existing user object.
Syntax
set local-user name
<name> [ new-name
<new-name> ] [ { password-hash
<password-hash> | password
<password> } ] [ comments <
comments> ] [ remote-access-always-on
<remote-access-always-on> ] [ is-temp-user { true expiration-date
<expiration-date> [ expiration-time
<expiration-time> ] | false } ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
expiration-date |
Expiration date for a temporary user in format yyyy-mm-dd Type: A date format yyyy-mm-dd |
expiration-time |
Expiration time for a temporary user in format HH:MM Type: A time format hh:mm |
is-temp-user |
Indicates if the user entry is temporary Type: Boolean (true/false) |
name |
User’s name in the local database Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
new-name |
User’s name in the local database Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
password |
User’s password in the local database Type: A string that contains alphanumeric and special characters |
password-hash |
User’s hashed password (used for importing database) Type: An encrypted password |
remote-access-always-on |
Always enable remote access permission for user Type: Boolean (true/false) |
Example
set local-user name admin new-name admin password-hash TZXPLs20bN0RA comments “This is a comment.” remote-access-always-on true is-temp-user true expiration-date 2000-01-01 expiration-time 23:20
Output
Failure shows an appropriate error message.
Description
Adds a bookmark to be shown in the SNX landing page to an existing user. This is relevant only if the user has VPN remote access privileges.
Syntax
set local-user name
<name> add bookmark label
<bookmark label>
Parameters
Parameter |
Description |
---|---|
bookmark label |
Text for the bookmark in the SSL Network Extender portal |
name |
User’s name in the local database Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
set local-user name admin add bookmark label myLabel
Output
Failure shows an appropriate error message.
Description
Removes a bookmark from being shown in the SNX landing page to an existing user. This is relevant only if the user has VPN remote access privileges.
Syntax
set local-user name
<name> remove bookmark label
<bookmark label>
Parameters
Parameter |
Description |
---|---|
bookmark label |
Text for the bookmark in the SSL Network Extender portal |
name |
User’s name in the local database Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
set local-user name admin remove bookmark label myLabel
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a locally defined user.
Syntax
show local-user name
<name>
Parameters
Parameter |
Description |
---|---|
name |
User’s name in the local database Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
show local-user name admin
Output
Failure shows an appropriate error message.
Description
Shows all locally defined users.
Syntax
show local-users
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show local-users
Output
Failure shows an appropriate error message.
Description
Deletes all expired locally defined user objects from the database.
Syntax
delete local-users expired
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete local-users expired
Output
Failure shows an appropriate error message.
Description
Shows all expired locally defined users.
Syntax
show local-users expired
Parameters
Parameter |
Description |
---|---|
n.a |
|
Example
show local-users expired
Output
Failure shows an appropriate error message.
Description
Shows system, kernel, and traffic logs.
Syntax
show logs {system|kernel|traffic}
Parameters
Parameter |
Description |
---|---|
|
|
Example
show logs kernel
Output
Success shows log file. Failure shows an appropriate error message.
Description
Configures external log servers for a locally managed device.
Syntax
set log-servers-configuration mgmt-server-ip-addr
<mgmt-server-ip-addr> [ log-server-ip-addr <
log-server-ip-addr> ] sic-name
<sic-name>
one-time-password
<one-time-password> [ external-log-server-enable
<external-log-server-enable> ]
Parameters
Parameter |
Description |
---|---|
external-log-server- enable |
Determine if an external log server is active Type: Boolean (true/false) |
log-server-ip-addr |
This IP address is used if the log server is not located on the Security Management Server. Type: IP address |
mgmt-server-ip-addr |
This IP address is used for establishing trusted communication between the Check Point Appliance and the log server. Type: IP address |
one-time-password |
SIC one time password Type: A string that contains alphanumeric and special characters |
sic-name |
Enter the SIC name of the log server object that was defined in SmartDashboard Type: A SIC name |
Example
set log-servers-configuration mgmt-server-ip-addr 192.168.1.1
log-server-ip-addr 192.168.1.1 sic-name QWEDFRGH4 one-time-password a(&7Ba external-log-server-enable true
Output
Failure shows an appropriate error message.
Description
Shows external log server configuration.
Syntax
show log-servers-configuration
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show log-servers-configuration
Output
Failure shows an appropriate error message.
Description
Add a MAC address to the list of addresses allowed to access LAN/DMZ networks.
Syntax
add mac-filtering-list mac
<mac>
Parameters
Parameter |
Description |
---|---|
mac |
MAC address to allow Type: MAC address |
Example
add mac-filtering-list mac 00:1C:7F:21:05:BE
Output
Failure shows an appropriate error message.
Description
Delete a MAC address from the list of addresses allowed to access LAN/DMZ networks.
Syntax
delete mac-filtering-list mac
<mac>
Parameters
Parameter |
Description |
---|---|
mac |
MAC address to allow Type: MAC address |
Example
delete mac-filtering-list mac 00:1C:7F:21:05:BE
Output
Failure shows an appropriate error message.
Description
Show the MAC addresses that are allowed to access LAN/DMZ networks.
Syntax
show mac-filtering-list
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show mac-filtering-list
Output
Failure shows an appropriate error message.
Configure the settings for MAC filtering.
Description
Configure the settings for MAC filtering.
Syntax
set mac-filtering-settings state
<state>
Parameters
Parameter |
Description |
---|---|
state |
MAC filtering state Options: on, off |
Example
set mac-filtering-settings state on
Output
Failure shows an appropriate error message.
Description
Configure the settings for MAC filtering.
Syntax
set mac-filtering-settings advanced-settings log-activation
<log-activation>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set mac-filtering-settings advanced-settings log-activation on
Output
Failure shows an appropriate error message.
Description
Configure the settings for MAC filtering.
Syntax
set mac-filtering-settings advanced-settings log-interval
<log-interval>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set mac-filtering-settings advanced-settings log-interval -1000000
Output
Failure shows an appropriate error message.
Show the settings for MAC filtering.
Description
Show the settings for MAC filtering.
Syntax
show mac-filtering-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show mac-filtering-settings
Output
Failure shows an appropriate error message.
Description
Show the advanced settings for MAC filtering.
Syntax
show mac-filtering-settings advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show mac-filtering-settings advanced-settings
Output
Failure shows an appropriate error message.
Description
Configuring “Monitor mode” over interfaces requires a mechanism to determine which are the local networks within the real topology. One of the options is a manual configuration of this topology using this command.
Syntax
add monitor-mode-network ipv4-address
<ipv4-address> subnet-mask
<subnet-mask>
Parameters
Parameter |
Description |
---|---|
ipv4-address |
Indicates a network IP address that will be recognized as Internal Type: IP address |
subnet-mask |
Network subnet mask Type: A subnet mask, or 255.255.255.255 |
Example
add monitor-mode-network ipv4-address 192.168.1.1 subnet-mask 255.255.255.0
Output
Failure shows an appropriate error message.
Description
Deletes manually configured IP addresses that determine the local networks in monitor mode when not working in automatic detection mode.
Syntax
delete monitor-mode-network ipv4-address
<ipv4-address>
Parameters
Parameter |
Description |
---|---|
ipv4-address |
Indicates a network IP address that will be recognized as Internal Type: IP address |
Example
delete monitor-mode-network ipv4-address 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures IP addresses of networks that are manually recognized as local in the non-automatic mode of monitor mode interface inspection.
Syntax
set monitor-mode-network ipv4-address
<ipv4-address> [ ipv4-address
<ipv4-address> ] [ subnet-mask
<subnet-mask> ]
Parameters
Parameter |
Description |
---|---|
ipv4-address |
Indicates a network IP address that will be recognized as Internal Type: IP address |
subnet-mask |
Network subnet mask Type: A subnet mask, or 255.255.255.255 |
Example
set monitor-mode-network ipv4-address 192.168.1.1 ipv4-address 192.168.1.1 subnet-mask 255.255.255.0
Output
Failure shows an appropriate error message.
Description
Shows manually defined local networks for monitor mode configuration.
Syntax
show monitor-mode-networks
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show monitor-mode-networks
Output
Failure shows an appropriate error message.
Description
Configures mode of work for monitor mode interface inspection. Determines if locally managed networks will be automatically detected or manually configured.
Syntax
set monitor-mode-configuration [ use-defined-networks
<use-defined-networks>]
Parameters
Parameter |
Description |
---|---|
use-defined-networks |
Indicates if user-defined internal networks are used for Monitor mode Type: Boolean (true/false) |
Example
set monitor-mode-configuration use-defined-networks true
Output
Failure shows an appropriate error message.
Description
Shows monitor mode configuration for interfaces.
Syntax
show monitor-mode-configuration
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show monitor-mode-configuration
Output
Failure shows an appropriate error message.
Description
Configures a banner message for the SSH administrator login
Syntax
set message
<type> { on | off } [ line ] [ msgvalue
<msgvalue> ]
Parameters
Parameter |
Description |
---|---|
msgvalue |
Indicates the banner messages text Type: virtual |
status |
Indicates if a banner message for SSH login will appear Type: Boolean (true/false) |
type |
Indicates the type of the message (only banner supported) Options: motd, banner, caption |
Example
set message motd true line msgvalue “My Banner message”
Output
Failure shows an appropriate error message.
Shows banner message for the ssh login.
Description
Shows banner message for the ssh login.
Syntax
show message
<type>
Parameters
Parameter |
Description |
---|---|
type |
Indicates the type of the message (only banner supported) Options: motd, banner, caption |
Example
show message motd
Output
Failure shows an appropriate error message.
Description
Shows the amount of memory that is being used.
Syntax
show memory-usage
Parameters
Parameter |
Description |
---|---|
|
|
Example
show memory-usage
Output
Success shows used memory. Failure shows an appropriate error message.
Configures general NAT policy settings.
Description
Configures if local networks will be hidden by default behind the external IP addresses of the gateway.
Syntax
set nat [ hide-internal-networks
<hide-internal-networks> ]
Parameters
Parameter |
Description |
---|---|
hide-internal-networks |
Hide internal networks behind the Gateway’s external IP address Type: Boolean (true/false) |
Example
set nat hide-internal-networks true
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings nat-destination-client-side
<nat-destination-client-side>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings nat-destination-client-side true
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings arp-proxy-merge <arp-proxy-merge>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings arp-proxy-merge true
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings address-trans
<address-trans>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings address-trans true
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings nat-automatic-arp
<nat-automatic-arp>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings nat-automatic-arp true
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings nat-destination-client-side-manual
<nat-destination-client-side-manual>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings nat-destination-client-side-manual true
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings nat-hash-size
<nat-hash-size>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings nat-hash-size 1024
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings nat-cache-num-entries
<nat-cache-num-entries>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings nat-cache-num-entries 100
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings nat-limit
<nat-limit>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings nat-limit 100
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings increase-hide-capacity
<increase-hide-capacity>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings increase-hide-capacity true
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings nat-cache-expiration
<nat-cache-expiration>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings nat-cache-expiration 100
Output
Failure shows an appropriate error message.
Description
Configures advanced NAT policy settings.
Syntax
set nat advanced-settings perform-cluster-hide-fold
<perform-cluster-hide-fold>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings perform-cluster-hide-fold true
Output
Failure shows an appropriate error message.
Description
Configures advanced IP-Pool NAT policy settings.
Syntax
set nat advanced-settings ip-pool-nat [ ip-pool-securemote
<ip-pool-securemote> ] [ ip-pool-log
<ip-pool-log> ] [ ip-pool-per-interface
<ip-pool-per-interface> ] [ ip-pool-override-hide
<ip-pool-override-hide>
] [ ip-pool-gw2Gw
<ip-pool-gw2Gw> ] [ ip-pool-unused-return-interval
<ip-pool-unused-return-interval> ] [ log-ip-pool-allocation
<log-ip-pool-allocation> ] [ ip-pool-mode
<ip-pool-mode> ] [
ip-pool-alloc-per-destination
<ip-pool-alloc-per-destination> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set nat advanced-settings ip-pool-nat ip-pool-securemote true ip-pool-log none ip-pool-per-interface true ip-pool-override-hide true ip-pool-gw2Gw true ip-pool-unused-return-interval 100 log-ip-pool-allocation none
ip-pool-mode do-not-use-IP-pool-NAT ip-pool-alloc-per-destination true
Output
Failure shows an appropriate error message.
Shows NAT policy.
Description
Shows NAT policy.
Syntax
show nat
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show nat
Output
Failure shows an appropriate error message.
Description
Shows advanced settings for NAT policy.
Syntax
show nat advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show nat advanced-settings
Output
Failure shows an appropriate error message.
Description
Adds a new manual NAT (translation of source/destination/service) rule to the NAT Rule Base.
Syntax
add nat-rule [ original-source
<original-source> ] [ original-destination
<original-destination> ] [ original-service
<original-service> ] [ translated-source
<translated-source> ] [ translated-destination
<translated-destination> ] [ translated-service
<translated-service> ] [ comment
<comment> ] [ hide-sources
<hide-sources> ] [ enable-arp-proxy
<enable-arp-proxy> ] [ { position
<position> | position-above
<position-above>
| position-below
<position-below> } ] [ name
<name> ]
Parameters
Parameter |
Description |
---|---|
comment |
Comment for manual NAT rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
enable-arp-proxy |
The gateway will reply to ARP requests sent to the original destination’s IP address (Does not apply to IP ranges/networks) Type: Boolean (true/false) |
hide-sources |
Hide multiple sources behind the translated source addresses Type: Boolean (true/false) |
name |
name Type: A string of alphanumeric characters without space between them |
original-destination |
Original destination of rule |
original-service |
Original service of rule |
original-source |
Original source of rule |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
translated-destination |
Translated destination of rule |
translated-service |
Translated service of rule |
translated-source |
Translated source of rule |
Example
add nat-rule original-source TEXT original-destination TEXT
original-service TEXT translated-source TEXT translated-destination TEXT translated-service TEXT comment “This is a comment.” hide-sources true enable-arp-proxy true position 2 name word
Output
Failure shows an appropriate error message.
Description
Deletes a manually configured NAT rule by name.
Syntax
delete nat-rule name
<name>
Parameters
Parameter |
Description |
---|---|
name |
name Type: A string of alphanumeric characters without space between them |
Example
delete nat-rule name word
Output
Failure shows an appropriate error message.
Description
Configures an existing manual NAT rule by name.
Syntax
set nat-rule name
<name> [ original-source
<original-source> ] [ original-destination
<original-destination> ] [ original-service
<original-service> ] [ translated-source
<translated-source> ] [ translated-destination
<translated-destination> ] [ translated-service
<translated-service> ] [ comment
<comment> ] [ hide-sources
<hide-sources> ] [ enable-arp-proxy
<enable-arp-proxy> ] [ { position
<position> | position-above
<position-above> | position-below
<position-below> } ] [ name
<name> ] [ disabled
<disabled> ]
Parameters
Parameter |
Description |
---|---|
comment |
Comment for manual NAT rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
disabled |
Indicates if rule is disabled Type: Boolean (true/false) |
enable-arp-proxy |
The gateway will reply to ARP requests sent to the original destination’s IP address (Does not apply to IP ranges/networks) Type: Boolean (true/false) |
hide-sources |
Hide multiple sources behind the translated source addresses Type: Boolean (true/false) |
name |
name Type: A string of alphanumeric characters without space between them |
original-destination |
Original destination of rule |
original-service |
Original service of rule |
original-source |
Original source of rule |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
translated-destination |
Translated destination of rule |
translated-service |
Translated service of rule |
translated-source |
Translated source of rule |
Example
set nat-rule name word original-source TEXT original-destination TEXT original-service TEXT translated-source TEXT translated-destination TEXT translated-service TEXT comment “This is a comment.” hide-sources true enable-arp-proxy true position 2 name word disabled true
Output
Failure shows an appropriate error message.
Description
Shows configuration of a specific manually defined NAT rule by name.
Syntax
show nat-rule name
<name>
Parameters
Parameter |
Description |
---|---|
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
Example
show nat-rule name word
Output
Failure shows an appropriate error message.
Description
Shows configuration of a specific manually defined NAT rule by position.
Syntax
show nat-rules position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
Example
show nat-rules position 2
Output
Failure shows an appropriate error message.
Description
Deletes a manually configured NAT rule by position.
Syntax
delete nat-rule position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
Example
delete nat-rule position 2
Output
Failure shows an appropriate error message.
Description
Configures an existing manual NAT rule by position
Syntax
set nat-rule position
<position> [ original-source
<original-source>
] [ original-destination
<original-destination> ] [ original-service
<original-service> ] [ translated-source
<translated-source> ] [ translated-destination
<translated-destination> ] [ translated-service
<translated-service> ] [ comment
<comment> ] [ hide-sources
<hide-sources> ] [ enable-arp-proxy
<enable-arp-proxy> ] [ { position
<position> | position-above
<position-above> | position-below
<position-below> } ] [ name
<name> ] [ disabled
<disabled> ]
Parameters
Parameter |
Description |
---|---|
comment |
Comment for manual NAT rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . -: () @ |
disabled |
Indicates if rule is disabled Type: Boolean (true/false) |
enable-arp-proxy |
The gateway will reply to ARP requests sent to the original destination’s IP address (Does not apply to IP ranges/networks) Type: Boolean (true/false) |
hide-sources |
Hide multiple sources behind the translated source addresses Type: Boolean (true/false) |
name |
name Type: A string of alphanumeric characters without space between them |
original-destination |
Original destination of rule |
original-service |
Original service of rule |
original-source |
Original source of rule |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
translated-destination |
Translated destination of rule |
translated-service |
Translated service of rule |
translated-source |
Translated source of rule |
Example
set nat-rule position 2 original-source TEXT original-destination TEXT original-service TEXT translated-source TEXT translated-destination TEXT translated-service TEXT comment “This is a comment.” hide-sources true
enable-arp-proxy true position 2 name word disabled true
Output
Failure shows an appropriate error message.
Description
Adds a new Netflow collector object (you can configure up to three). A collector uses a network protocol developed by Cisco for collecting network traffic patterns and volume. The Netflow records will be exported to each defined collector.
Syntax
add netflow collector ip
<ip> port
<port> export-format
<export-format> [ srcaddr
<srcaddr> ] is-enabled
<is-enabled>
Parameters
Parameter |
Description |
---|---|
export-format |
Export format Options: Netflow_V9, Netflow_V5 |
ip |
IP address Type: IP address |
is-enabled |
Indicates if netflow is enabled Type: Boolean (true/false) |
port |
UDP port Type: Port number |
srcaddr |
Source IP address Type: IP address |
Example
add netflow collector ip 192.168.1.1 port 8080 export-format Netflow_V9 srcaddr 192.168.1.1 is-enabled true
Output
Failure shows an appropriate error message.
Description
Deletes an existing Netflow collector object by IP address and port.
Syntax
delete netflow collector ip
<ip> port
<port>
Parameters
Parameter |
Description |
---|---|
ip |
IP address Type: IP address |
port |
UDP port Type: Port number |
Example
delete netflow collector ip 192.168.1.1 port 8080
Output
Failure shows an appropriate error message.
Description
Configures an existing network collector for Netflow protocol.
Syntax
set netflow collector for-ip
<for-ip> for-port
<for-port> [ ip
<ip> ] [ port
<port> ] [ export-format
<export-format> ] [ srcaddr
<srcaddr> ] [ is-enabled
<is-enabled> ]
Parameters
Parameter |
Description |
---|---|
export-format |
Export format Options: Netflow_V9, Netflow_V5 |
for-ip |
IP address Type: IP address |
for-port |
UDP port Type: Port number |
ip |
IP address Type: IP address |
is-enabled |
Indicates if netflow is enabled Type: Boolean (true/false) |
port |
UDP port Type: Port number
|
srcaddr |
Source IP address Type:IP address |
Example
set netflow collector for-ip 192.168.1.1 for-port 8080 ip 192.168.1.1 port 8080 export-format Netflow_V9 srcaddr 192.168.1.1 is-enabled true
Output
Failure shows an appropriate error message.
Description
Shows configuration of a specific NetFlow collector.
Syntax
show netflow collector ip
<ip> port
<port>
Parameters
Parameter |
Description |
---|---|
ip |
IP address Type: IP address |
port |
UDP port Type: Port number |
Example
show netflow collector ip 192.168.1.1 port 8080
Output
Failure shows an appropriate error message.
Description
Shows configuration of all NetFlow collectors.
Syntax
show netflow collectors
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show netflow collectors
Output
Failure shows an appropriate error message.
Description
Adds a new network address range object (a network and a subnet mask).
Syntax
add network name
<name> network-ipv4-address
<network-ipv4-address> { subnet-mask
<subnet-mask> | mask-length
<mask-length> }
Parameters
Parameter |
Description |
---|---|
mask-length |
Mask length |
name |
Network Object name Type: String |
network-ipv4-address |
Network address |
subnet-mask |
IP mask used in the related network |
Example
add network name TEXT network-ipv4-address 172.16.10.0 subnet-mask 255.255.255.0
Output
Failure shows an appropriate error message.
Description
Deletes an existing network address range object (a network and a subnet mask) by object name.
Syntax
delete network
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name Type: String |
Example
text
delete network TEXT
Output
Failure shows an appropriate error message.
Description
Configures an existing network with subnet.
Syntax
set network
<name> [ name
<name> ] [ network-ipv4-address
<network-ipv4-address> ] { [ subnet-mask
<subnet-mask> ] | [ mask-length
<mask-length> ] }
Parameters
Parameter |
Description |
---|---|
mask-length |
Mask length |
name |
Network Object name Type: String |
network-ipv4-address |
Network address |
subnet-mask |
IP mask used in the related network |
Example
set network TEXT name TEXT network-ipv4-address 172.16.10.0 subnet-mask 255.255.255.0
Output
Failure shows an appropriate error message.
Description
Shows configuration of a specific IP address network object.
Syntax
show network
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name Type: String |
Example
text
show network TEXT
Output
Failure shows an appropriate error message.
Description
Shows configuration of all IP address network objects.
Syntax
show networks
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show networks
Output
Failure shows an appropriate error message.
Configures NTP settings.
Description
Configures NTP settings.
Syntax
set ntp [ local-time-zone
<local-time-zone> ] [ auto-adjust-daylight-saving
<auto-adjust-daylight-saving> ]
Parameters
Parameter |
Description |
---|---|
auto-adjust-daylight- saving |
Auto daylight Options: on, off |
local-time-zone |
Region on earth that has a uniform standard time |
Example
set ntp local-time-zone GMT-11:00(Midway-Island) auto-adjust-daylight-saving on
Output
Failure shows an appropriate error message.
Description
Enables/Disables NTP functionality.
Syntax
set ntp active
<active>
Parameters
Parameter |
Description |
---|---|
active |
Region on earth that has a uniform standard time Options: on, off |
Example
set ntp active on
Output
Failure shows an appropriate error message.
Description
Configures NTP settings.
Syntax
set ntp interval
<interval>
Parameters
Parameter |
Description |
---|---|
interval |
Time interval (minutes) to update date and time settings from the NTP server Type: A number with no fractional part (integer) |
Example
set ntp interval 15
Output
Failure shows an appropriate error message.
Description
Configures NTP settings.
Syntax
set ntp auth { on secret-id
<secret-id> secret
<secret> | off }
Parameters
Parameter |
Description |
---|---|
auth |
Authentication with NTP servers flag Type: Press TAB to see available options |
secret |
Key string for authentication with the NTP servers Type: A string that contains alphanumeric and special characters |
secret-id |
Authentication key identifier Type: A number with no fractional part. Values are between 4,503,599,627,370,495 to 4,503,599,627,370,495 |
Example
set ntp auth on secret-id 455397 secret a(&7Ba
Output
Failure shows an appropriate error message.
Description
Shows NTP configuration.
Syntax
show ntp
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ntp
Output
Failure shows an appropriate error message.
Description
Shows NTP activation status.
Syntax
show ntp active
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ntp active
Output
Failure shows an appropriate error message.
Configures NTP server settings.
Description
Configures primary NTP server’s IP address.
Syntax
set ntp server primary
<primary>
Parameters
Parameter |
Description |
---|---|
primary |
Primary NTP server Type: An IP address or host name |
Example
set ntp server primary myHost.com
Output
Failure shows an appropriate error message.
Description
Configures secondary NTP server’s IP address.
Syntax
set ntp server secondary <secondary>
Parameters
Parameter |
Description |
---|---|
secondary |
Secondary NTP server Type: An IP address or host name |
Example
set ntp server secondary myHost.com
Output
Failure shows an appropriate error message.
Description
Shows all defined NTP servers.
Syntax
show ntp servers
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ntp servers
Output
Failure shows an appropriate error message.
Description
Help Check Point improve its products by sending data.
Syntax
set privacy-settings advanced-settings customer-consent {true | false }
Parameters
Parameter |
Description |
---|---|
enable |
Boolean: true/false |
Example
set privacy-settings advanced-settings customer-consent true
Output
Failure shows an appropriate error message.
Description
Configures periodic backup to a remote FTP server.
Syntax
set periodic-backup [ mode
<mode> ] [ server-address
<server-address> ] [ server-username
<server-username> ] [ server-password
<server-password> ] [ file-encryption { true [ encryption-password
<encryption-password> ] | false }
] [ schedule { monthly [ day-of-month
<day-of-month> ] | weekly [ day-of-week
<day-of-week> ] | daily } ] [ hour
<hour> ]
Parameters
Parameter |
Description |
---|---|
day-of-month |
Day of the month to backup Type: A number with no fractional part (integer) |
day-of-week |
Day of the week to backup Options: sunday, monday, tuesday, wednesday, thursday, friday, saturday |
encryption-password |
Encryption password Type: A string that contains alphanumeric and special characters |
file-encryption |
Choose whether to encrypt the backup data Type: Boolean (true/false) |
hour |
Scheduled backup hour. The backup will be performed during this hour Type: A number with no fractional part (integer) |
mode |
Is periodic backup enabled Type: Boolean (true/false) |
schedule |
Schedule the frequency of the periodic backup Type: Press TAB to see available options |
server-address |
Backup server name or IPv4 address (FTP) Type: backupUrl |
server-password |
Backup server password Type: A string that contains alphanumeric and special characters |
server-username |
Backup server username Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
set periodic-backup mode true server-address backupUrl server-username admin server-password a(&7Ba file-encryption true encryption-password a(&7Ba schedule monthly day-of-month 2 hour 2
Output
Failure shows an appropriate error message.
Description
Shows periodic backup configuration.
Syntax
show periodic-backup
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show periodic-backup
Output
Failure shows an appropriate error message.
Description
Disables or enables first time configuration (from the USB autoplay configuration or the WebUI).
Syntax
set property {USB_auto_configuration {always|once|off} | first-time-wizard {always|once}}
Parameters
Parameter |
Description |
---|---|
|
|
Example
set property USB_auto_configuration off
set property first-time-wizard off
Output
Failure shows an appropriate error message.
Description
Deletes configured proxy settings for the appliance.
Syntax
delete proxy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete proxy
Output
Failure shows an appropriate error message.
Configures proxy settings for connecting with Check Point update and license servers.
Description
Configures proxy settings for connecting with Check Point update and license servers, when the device is located behind a proxy server.
Syntax
set proxy server
<server> port
<port>
Parameters
Parameter |
Description |
---|---|
port |
The proxy port Type: Port number |
server |
The proxy Host name or IP address Type: An IP address or host name |
Example
set proxy server myHost.com port 8080
Output
Failure shows an appropriate error message.
Description
Enable/Disable proxy configuration for the device.
Syntax
set proxy { enable | disable }
Parameters
Parameter |
Description |
---|---|
use-proxy |
A proxy server between the appliance and the Internet. This proxy server will be used when the applianceŠs internal processes must reach a Check Point server. Type: Boolean (true/false) |
Example
set proxy true
Output
Failure shows an appropriate error message.
Description
Shows proxy configuration.
Syntax
show proxy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show proxy
Output
Failure shows an appropriate error message.
Configures QoS policy.
Description
Enables/Disables the QoS
Syntax
set qos mode
<mode>
Parameters
Parameter |
Description |
---|---|
mode |
Indicates if QoS blade is enabled Type: Boolean (true/false) |
Example
set qos mode true
Output
Failure shows an appropriate error message.
Description
Configures the default QoS policy.
Syntax
set qos default-policy [ limit-bandwidth-consuming-applications { true [ limit-upload-traffic
<limit-upload-traffic> ] [ upload-limit
<upload-limit>
] [ limit-download-traffic
<limit-download-traffic> ] [ download-limit
<download-limit> ] | false } ] [ guarantee-bandwidth-to-configured-traffic
<guarantee-bandwidth-to-configured-traffic> [ guarantee-bandwidth-percentage
<guarantee-bandwidth-percentage> ] [ guarantee-bandwidth-traffic
<guarantee-bandwidth-traffic> ] [ guarantee-bandwidth-on-services
<guarantee-bandwidth-on-services> ] ] [ ensure-low-latency-for-delay-sensitive-services
<ensure-low-latency-for-delay-sensitive-services> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set qos default-policy limit-bandwidth-consuming-applications true limit-upload-traffic true upload-limit 5 limit-download-traffic true download-limit 100 guarantee-bandwidth-to-configured-traffic on guarantee-bandwidth-percentage 80 guarantee-bandwidth-traffic vpn
guarantee-bandwidth-on-services all ensure-low-latency-for-delay-sensitive-services on
Output
Failure shows an appropriate error message.
Description
Configures advanced QoS settings.
Syntax
set qos low-latency-traffic maximum-percentage-of-bandwidth
<maximum-percentage-of-bandwidth>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set qos low-latency-traffic maximum-percentage-of-bandwidth 80
Output
Failure shows an appropriate error message.
Description
Configures advanced QoS settings.
Syntax
set qos advanced-settings qos-logging
<qos-logging>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set qos advanced-settings qos-logging true
Output
Failure shows an appropriate error message.
Shows the policy of the QoS blade.
Description
Shows the policy of the QoS blade.
Syntax
show qos
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show qos
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of the QoS blade.
Syntax
show qos advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show qos advanced-settings
Output
Failure shows an appropriate error message.
Configures a default used group of services that are delay sensitive.
Description
Adds an existing service object to the default group of services that are delay sensitive.
Syntax
set qos delay-sensitive-service add service
<service>
Parameters
Parameter |
Description |
---|---|
service |
Service name |
Example
set qos delay-sensitive-service add service TEXT
Output
Failure shows an appropriate error message.
Description
Removes an existing service object from the default group of services that are delay sensitive.
Syntax
set qos delay-sensitive-service remove service
<service>
Parameters
Parameter |
Description |
---|---|
service |
Service name |
Example
set qos delay-sensitive-service remove service TEXT
Output
Failure shows an appropriate error message.
Description
Shows the group of services that are considered delay sensitive.
Syntax
show qos delay-sensitive-services
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show qos delay-sensitive-services
Output
Failure shows an appropriate error message.
Configures a default used group of services that will be guaranteed bandwidth according to QoS default policy.
Description
Adds an existing service object to the default used group of services that will be guaranteed bandwidth according to QoS default policy.
Syntax
set qos guarantee-bandwidth-selected-services add service
<service>
Parameters
Parameter |
Description |
---|---|
service |
Service name |
Example
set qos guarantee-bandwidth-selected-services add service TEXT
Output
Failure shows an appropriate error message.
Description
Removes an existing service object from the default used group of services that will be guaranteed bandwidth according to QoS default policy.
Syntax
set qos guarantee-bandwidth-selected-services remove service
<service>
Parameters
Parameter |
Description |
---|---|
service |
Service name |
Example
set qos guarantee-bandwidth-selected-services remove service TEXT
Output
Failure shows an appropriate error message.
Description
Shows the group of services that can be guaranteed bandwidth in the QoS default policy.
Syntax
show qos guarantee-bandwidth-selected-services
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show qos guarantee-bandwidth-selected-services
Output
Failure shows an appropriate error message.
Description
Adds a new bandwidth/latency control rule to the QoS Rule Base.
Syntax
add qos-rule [ source
<source> ] [ destination
<destination> ] [ service
<service> ] [ { [ low-latency-rule { normal [ limit-bandwidth
<limit-bandwidth> [ limit-percentage
<limit-percentage> ] ] [ guarantee-bandwidth
<guarantee-bandwidth> [ guarantee-percentage
<guarantee-percentage> ] ] | low } ] | [ limit-bandwidth
<limit-bandwidth> [ limit-percentage
<limit-percentage> ] ] [ guarantee-bandwidth
<guarantee-bandwidth> [ guarantee-percentage
<guarantee-percentage> ] ] }
] [ weight
<weight> ] [ log
<log> ] [ comment
<comment> ] [ vpn
<vpn> ] [ hours-range-enabled { true hours-range-from
<hours-range-from> hours-range-to
<hours-range-to> | false } ] [ diffserv-mark { true diffserv-mark-val
<diffserv-mark-val> | false } ] [ name
<name> ] [ { position
<position> | position-above
<position-above> | position-below
<position-below> } ]
Parameters
Parameter |
Description |
---|---|
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
diffserv-mark |
DiffServ Mark is a way to mark connections so a third party will handle it. To use this option, your ISP or private WAN must support DiffServ Type: Boolean (true/false) |
diffserv-mark-val |
To mark packets that will be given priority on the public network according to their DSCP, select DiffServ Mark (1-63) and select a value. You can get the DSCP value from your ISP or private WAN administrator Type: A number with no fractional part (integer) |
guarantee-bandwidth |
If true, traffic guarantee is defined Type: Boolean (true/false) |
guarantee-percentage |
Traffic guarantee percentage Type: A number with no fractional part (integer) |
hours-range-enabled |
If true, time is configured Type: Boolean (true/false) |
hours-range-from |
Time in the format HH:MM Type: A time format hh:mm |
hours-range-to |
Time in the format HH:MM Type: A time format hh:mm |
limit-bandwidth |
If true, traffic limit is defined Type: Boolean (true/false) |
limit-percentage |
Traffic limit percentage Type: A number with no fractional part (integer) |
log |
Defines which logging method to use: None - do not log, Log - Create log Options: none, log |
low-latency-rule |
The latency of the rule (low or normal) Type: Press TAB to see available options |
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
service |
The network service object that the rule should match to |
source |
Network object or user group that initiates the connection |
vpn |
Indicates if traffic is matched on encrypted traffic only or all traffic Type: Boolean (true/false) |
weight |
Traffic weight, relative to the weights defined for other rules Type: A number with no fractional part (integer) |
Example
add qos-rule source TEXT destination TEXT service TEXT low-latency-rule normal limit-bandwidth true limit-percentage 15 guarantee-bandwidth true guarantee-percentage 30 weight 30 log none comment “This is a comment.” vpn true hours-range-enabled true hours-range-from 23:20
hours-range-to 23:20 diffserv-mark true diffserv-mark-val 5 name word position 2
Output
Failure shows an appropriate error message.
Deletes an existing bandwidth/latency control rule in the QoS Rule Base.
Description
Deletes an existing bandwidth/latency control rule in the QoS Rule Base by idx.
Syntax
delete qos-rule idx
<idx>
Parameters
Parameter |
Description |
---|---|
idx |
The order of the rule in comparison to other manual rules Type: Decimal number |
Example
delete qos-rule idx 3.141
Output
Failure shows an appropriate error message.
Description
Deletes an existing bandwidth/latency control rule in the QoS Rule Base by name.
Syntax
delete qos-rule name
<name>
Parameters
Parameter |
Description |
---|---|
name |
name Type: A string of alphanumeric characters without space between them |
Example
delete qos-rule name word
Output
Failure shows an appropriate error message.
Configures an existing bandwidth/latency control rule within the QoS blade policy.
Description
Configures an existing bandwidth/latency control rule within the QoS blade policy by idx.
Syntax
set qos-rule idx
<idx> [ source
<source> ] [ destination
<destination>
] [ service
<service> ] [ { [ low-latency-rule { normal [ limit-bandwidth
<limit-bandwidth> [ limit-percentage
<limit-percentage> ] ] [ guarantee-bandwidth
<guarantee-bandwidth> [ guarantee-percentage
<guarantee-percentage> ] ] | low } ] | [ limit-bandwidth
<limit-bandwidth> [ limit-percentage
<limit-percentage> ] ] [ guarantee-bandwidth
<guarantee-bandwidth> [ guarantee-percentage
<guarantee-percentage> ] ] }
] [ weight
<weight> ] [ log
<log> ] [ comment
<comment> ] [ vpn
<vpn> ] [ hours-range-enabled { true hours-range-from
<hours-range-from> hours-range-to
<hours-range-to> | false } ] [ diffserv-mark { true diffserv-mark-val
<diffserv-mark-val> | false } ] [ name
<name> ] [ { position
<position> | position-above
<position-above> | position-below
<position-below> } ] [ disabled
<disabled> ]
Parameters
Parameter |
Description |
---|---|
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
diffserv-mark |
DiffServ Mark is a way to mark connections so a third party will handle it. To use this option, your ISP or private WAN must support DiffServ Type: Boolean (true/false) |
diffserv-mark-val |
To mark packets that will be given priority on the public network according to their DSCP, select DiffServ Mark (1-63) and select a value. You can get the DSCP value from your ISP or private WAN administrator Type: A number with no fractional part (integer) |
disabled |
Indicates if rule is disabled Type: Boolean (true/false) |
guarantee-bandwidth |
If true, traffic guarantee is defined Type: Boolean (true/false) |
guarantee-percentage |
Traffic guarantee percentage Type: A number with no fractional part (integer) |
hours-range-enabled |
If true, time is configured Type: Boolean (true/false) |
hours-range-from |
Time in the format HH:MM Type: A time format hh:mm |
hours-range-to |
Time in the format HH:MM Type: A time format hh:mm |
idx |
The order of the rule in comparison to other manual rules Type: Decimal number |
limit-bandwidth |
If true, traffic limit is defined Type: Boolean (true/false) |
limit-percentage |
Traffic limit percentage Type: A number with no fractional part (integer) |
log |
Defines which logging method to use: None - do not log, Log - Create log Options: none, log |
low-latency-rule |
The latency of the rule (low or normal) Type: Press TAB to see available options |
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
service |
The network service object that the rule should match to |
source |
Network object or user group that initiates the connection |
vpn |
Indicates if traffic is matched on encrypted traffic only or all traffic Type: Boolean (true/false) |
weight |
Traffic weight, relative to the weights defined for other rules Type: A number with no fractional part (integer) |
Example
set qos-rule idx 3.141 source TEXT destination TEXT service TEXT low-latency-rule normal limit-bandwidth true limit-percentage 80 guarantee-bandwidth true guarantee-percentage 80 weight 15 log none comment “This is a comment.” vpn true hours-range-enabled
true hours-range-from 23:20 hours-range-to 23:20 diffserv-mark true diffserv-mark-val 5 name word position 2 disabled true
Output
Failure shows an appropriate error message.
Description
Configures an existing bandwidth/latency control rule within the QoS blade policy by name.
Syntax
set qos-rule name
<name> [ source
<source> ] [ destination
<destination>
] [ service
<service> ] [ { [ low-latency-rule { normal [ limit-bandwidth
<limit-bandwidth> [ limit-percentage
<limit-percentage> ] ] [ guarantee-bandwidth
<guarantee-bandwidth> [ guarantee-percentage
<guarantee-percentage> ] ] | low } ] | [ limit-bandwidth
<limit-bandwidth> [ limit-percentage
<limit-percentage> ] ] [ guarantee-bandwidth
<guarantee-bandwidth> [ guarantee-percentage
<guarantee-percentage> ] ] }
] [ weight
<weight> ] [ log
<log> ] [ comment
<comment> ] [ vpn
<vpn> ] [ hours-range-enabled { true hours-range-from
<hours-range-from> hours-range-to
<hours-range-to> | false } ] [ diffserv-mark { true diffserv-mark-val
<diffserv-mark-val> | false } ] [ name
<name> ] [ { position
<position> | position-above
<position-above> | position-below
<position-below> } ] [ disabled
<disabled> ]
Parameters
Parameter |
Description |
---|---|
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
diffserv-mark |
DiffServ Mark is a way to mark connections so a third party will handle it. To use this option, your ISP or private WAN must support DiffServ Type: Boolean (true/false) |
diffserv-mark-val |
To mark packets that will be given priority on the public network according to their DSCP, select DiffServ Mark (1-63) and select a value. You can get the DSCP value from your ISP or private WAN administrator Type: A number with no fractional part (integer) |
disabled |
Indicates if rule is disabled Type: Boolean (true/false) |
guarantee-bandwidth |
If true, traffic guarantee is defined Type: Boolean (true/false) |
guarantee-percentage |
Traffic guarantee percentage Type: A number with no fractional part (integer) |
hours-range-enabled |
If true, time is configured Type: Boolean (true/false) |
hours-range-from |
Time in the format HH:MM Type: A time format hh:mm |
hours-range-to |
Time in the format HH:MM Type: A time format hh:mm |
limit-bandwidth |
If true, traffic limit is defined Type: Boolean (true/false) |
limit-percentage |
Traffic limit percentage Type: A number with no fractional part (integer) |
log |
Defines which logging method to use: None - do not log, Log - Create log Options: none, log |
low-latency-rule |
The latency of the rule (low or normal) Type: Press TAB to see available options |
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-above |
The order of the rule in comparison to other manual rules Type: Decimal number |
position-below |
The order of the rule in comparison to other manual rules Type: Decimal number |
service |
The network service object that the rule should match to |
source |
Network object or user group that initiates the connection |
vpn |
Indicates if traffic is matched on encrypted traffic only or all traffic Type: Boolean (true/false) |
weight |
Traffic weight, relative to the weights defined for other rules Type: A number with no fractional part (integer) |
Example
set qos-rule name word source TEXT destination TEXT service TEXT low-latency-rule normal limit-bandwidth true limit-percentage 80 guarantee-bandwidth true guarantee-percentage 80 weight 15 log none comment “This is a comment.” vpn true hours-range-enabled
true hours-range-from 23:20 hours-range-to 23:20 diffserv-mark true diffserv-mark-val 5 name word position 2 disabled true
Output
Failure shows an appropriate error message.
Shows configuration of QoS (bandwidth/latency control) rules.
Description
Shows configuration of a QoS rule by ID.
Syntax
show qos-rule idx
<idx>
Parameters
Parameter |
Description |
---|---|
idx |
The order of the rule in comparison to other manual rules Type: Decimal number |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
Example
show qos-rule idx 3.141 position 2
Output
Failure shows an appropriate error message.
Description
Shows configuration of a QoS rule by name.
Syntax
show qos-rule name
<name>
Parameters
Parameter |
Description |
---|---|
name |
name Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other manual rules Type: Decimal number |
Example
show qos-rule name word position 2
Output
Failure shows an appropriate error message.
Description
Shows configuration of a QoS rule by position.
Syntax
show qos-rules position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of the generated rules in the QoS Rule Base Type: A number with no fractional part (integer) |
Example
show qos-rules position 2
Output
Failure shows an appropriate error message.
Description
Deletes an existing configured RADIUS server.
Syntax
delete radius-server priority
<priority>
Parameters
Parameter |
Description |
---|---|
priority |
Priority of the choose tab, can be primary or secondary Type: A number with no fractional part (integer) |
Example
delete radius-server priority 1
Output
Failure shows an appropriate error message.
Description
Configures RADIUS servers.
Syntax
set radius-server priority
<priority> [ ipv4-address
<ipv4-address> ] [ udp-port
<udp-port> ] [ shared-secret
<shared-secret> ] [ timeout
<timeout>
]
Parameters
Parameter |
Description |
---|---|
ipv4-address |
The IP address of the RADIUS server Type: IP address |
priority |
Priority of the choose tab, can be primary or secondary Type: A number with no fractional part (integer) |
shared-secret |
Pre-shared secret between the RADIUS server and the Appliance Type: A string that contains alphanumeric and special characters |
timeout |
A timeout value in seconds for communication with the RADIUS server Type: A number with no fractional part (integer) |
udp-port |
The port number through which the RADIUS server communicates with clients. The default is 1812 Type: A number with no fractional part (integer) |
Example
set radius-server priority 2 ipv4-address 192.168.1.1 udp-port
1812 shared-secret a(&7Ba timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a RADIUS server.
Syntax
show radius-server priority
<priority>
Parameters
Parameter |
Description |
---|---|
priority |
Priority of the choose tab, can be primary or secondary Type: A number with no fractional part (integer) |
Example
show radius-server priority 1
Output
Failure shows an appropriate error message.
Description
Shows the configuration of all RADIUS servers.
Syntax
show radius-servers
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show radius-servers
Output
Failure shows an appropriate error message.
Configures the “Reach my device” service, which enables connecting to the device’s management portal even when the device is behind NAT.
Description
Configures the “Reach my device” service, which enables connecting to the device’s management portal even when the device is behind NAT.
Syntax
set reach-my-device [ mode
<mode> ] [ host-name
<host-name> ] [ existing-host-name { true validation-token
<validation-token> | false } ]
Parameters
Parameter |
Description |
---|---|
existing-host-name |
Register with an existing host name Type: Boolean (true/false) |
host-name |
Gateway Host name (DNS Prefix) Type: A string of alphanumeric characters without space between them |
mode |
Reach my device mode (on/off) Type: Boolean (true/false) |
validation-token |
Gateway validation token Type: A string of alphanumeric characters without space between them |
Example
set reach-my-device mode true host-name word existing-host-name true validation-token word
Output
Failure shows an appropriate error message.
Description
Configures advanced settings of the “Reach my device” service, which enables connecting to the device’s management portal even when the device is behind NAT.
Syntax
set reach-my-device advanced-settings ignore-ssl-cert
<ignore-ssl-cert>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set reach-my-device advanced-settings ignore-ssl-cert true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings of the “Reach my device” service, which enables connecting to the device’s management portal even when the device is behind NAT.
Syntax
set reach-my-device advanced-settings reach-my-device-server-addr
<reach-my-device-server-addr>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set reach-my-device advanced-settings reach-my-device-server-addr http://www.checkpoint.com/
Output
Failure shows an appropriate error message.
Shows the configuration of "Reach My Device" cloud service.
Description
Shows the configuration of “Reach My Device” cloud service.
Syntax
show reach-my-device
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show reach-my-device
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of “Reach My Device” cloud service.
Syntax
show reach-my-device advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show reach-my-device advanced-settings
Output
Failure shows an appropriate error message.
Description
Configures VPN remote access privileges to users defined in configured RADIUS servers.
Syntax
set remote-access users radius-auth { true [ use-radius-groups { true radius-groups
<radius-groups> | false } ] | false }
Parameters
Parameter |
Description |
---|---|
radius-auth |
Remote users RADIUS authentication Type: Boolean (true/false) |
radius-groups |
RADIUS groups for authentication. Example: RADIUS-group1, RADIUS-class2 Type: A string that contains [A-Z], [0-9], ’-’, ’@’, ’.’, ’_’, ’,’ and space characters |
use-radius-groups |
Use RADIUS groups for authentication Type: Boolean (true/false) |
Example
set remote-access users radius-auth true use-radius-groups true radius-groups My group
Output
Failure shows an appropriate error message.
Description
Shows RADIUS-based users VPN remote access configuration.
Syntax
show remote-access users radius-auth
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show remote-access users radius-auth
Output
Failure shows an appropriate error message.
Description
Reboots the system.
Syntax
reboot
Parameters
Parameter |
Description |
---|---|
|
|
Return Value
None
Example
reboot
Output
None
Description
Restores the appliance settings from a backup file. The backup file can be located on a USB device or on a TFTP server.
Syntax
restore settings from {usb|tftp server
<serverIP>} filename
<file_name>
Parameters
Parameter |
Description |
---|---|
|
Name of the backup file. |
|
IPv4 address of the TFTP server. |
Example
restore settings from tftp server 1.1.1.1 filename sg80
Output
n/a
Comments
The appliance automatically reboots after the settings are restored.
Description
Shows the log file of previous restore settings to default operations. You can display these restore settings log files:
restore-settings-log
- Log file for restoring saved settings.restore-default-settings-log
- Log file for restoring the default settings.Syntax
show {restore-settings-log|restore-default-settings-log}
Parameters
Parameter |
Description |
---|---|
|
|
Example
show restore-settings-log
Output
Success shows the restore settings
log file. Failure shows an appropriate error message.
Description
Shows the log file of previous revert operations.
Syntax
show revert-log
Parameters
Parameter |
Description |
---|---|
|
|
Example
show revert-log
Output
Success shows the revert log file. Failure shows an appropriate error message.
Description
Revert the appliance to the original factory defaults. This command deletes all data and software images from the appliance.
Syntax
revert to factory-defaults
Parameters
Parameter |
Description |
---|---|
|
|
Example
revert to factory-defaults
Output
Success shows a warning message. Enter yes
to continue.
Failure shows an appropriate error message.
Description
Reverts the appliance to the previous software image.
Syntax
revert to previous-image
Parameters
Parameter |
Description |
---|---|
|
|
Example
revert to previous-image
Output
Success shows OK
. Failure shows an appropriate error message.
Configure local reports settings.
Description
Configure advanced local reports settings.
Syntax
set report-settings advanced-settings centrally-max-period
<centrally-max-period>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set report-settings advanced-settings centrally-max-period report-period-hour
Output
Failure shows an appropriate error message.
Description
Configure advanced local reports settings.
Syntax
set report-settings advanced-settings locally-max-period
<locally-max-period>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set report-settings advanced-settings locally-max-period report-period-hour
Output
Failure shows an appropriate error message.
Description
Shows report scheduling and creation configuration.
Syntax
show report-settings advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show report-settings advanced-settings
Output
Failure shows an appropriate error message.
Description
Shows the top firewall policy rule hits.
Syntax
show rule-hits [top
<rule>]
Parameters
Parameter |
Description |
---|---|
|
Number of rules in the security policy that are displayed. Minimum value is 1 . |
Return Value
0
on success, 1 on failureExample
show rule-hits top 3
Output
Success shows number of hits per rule. Failure shows an appropriate error message.
Description
Shows information about the saved backup image.
Syntax
show saved-image
Parameters
Parameter |
Description |
---|---|
|
|
Example
show saved-image
Output
Success shows information about the image. Failure shows an appropriate error message.
Description
Manually update Software Blades.
Syntax
update security-blades [ all ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
update security-blades all
Output
Failure shows an appropriate error message.
Description
Configure first connection to the Security Management Server.
Syntax
connect security-management mgmt-addr
<mgmt-addr> use-one-time-password
<use-one-time-password> local-override-mgmt-addr { true send-logs-to { local-override-log-server-addr addr
<addr> | local-override-mgmt-addr } | false }
Parameters
Parameter |
Description |
---|---|
addr |
The logs are sent to this address Type: An IP address or host name |
local-override-mgmt-addr |
Indicates if the management address used in the next manual fetch command will be saved and continuously used instead of the address downloaded in the policy Type: Boolean (true/false) |
mgmt-addr |
The IP address or hostname of the Security Management Server Type: An IP address or host name |
send-logs-to |
Indicates from where the address of the log server is taken Type: Press TAB to see available options |
use-one-time-password |
Indicates whether to connect to the Security Management Server using a one time password Type: Boolean (true/false) |
Example
connect security-management mgmt-addr myHost.com use-one-time-password true local-override-mgmt-addr true send-logs-to local-override-log-server-addr addr myHost.com
Output
Failure shows an appropriate error message.
Configures settings to connect to a remote Security Management Server and log server.
Description
Configures a local override to the IP addresses of the Security Management Server and log server. This is relevant when centrally managed.
Syntax
set security-management local-override-mgmt-addr { true mgmt-address
<mgmt-address> send-logs-to { local-override-log-server-addr addr
<addr> | local-override-mgmt-addr } | false }
Parameters
Parameter |
Description |
---|---|
addr |
The logs are sent to this address Type: An IP address or host name |
local-override-mgmt- addr |
Indicates if the management address used in the next manual fetch command will be saved and continuously used instead of the address downloaded in the policy Type: Boolean (true/false) |
mgmt-address |
IP address or hostname of the Security Management Server Type: An IP address or host name |
send-logs-to |
Indicates from where the address of the log server is taken Type: Press TAB to see available options |
Example
set security-management local-override-mgmt-addr true mgmt-address myHost.com send-logs-to local-override-log-server-addr addr myHost.com
Output
Failure shows an appropriate error message.
Description
Configures if the device is managed centrally or locally. In centrally managed appliances only the networking configurations are available and the security policy comes from the remote Security Management Server.
Syntax
set security-management mode
<mode>
Parameters
Parameter |
Description |
---|---|
mode |
Indicates whether the appliance is managed locally or centrally using a Check Point Security Management Server. Options: locally-managed, centrally-managed |
Example
set security-management mode locally-managed
Output
Failure shows an appropriate error message.
Description
Shows settings of the Security Management Server.
Syntax
show security-management
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show security-management
Output
Failure shows an appropriate error message.
Configures the physical serial port settings.
Description
Configures the physical serial port data flow settings.
Syntax
set serial-port [ port-speed
<port-speed> ] [ flow-control
<flow-control> ] [ disabled
<disabled> ] [ mode
<mode> ]
Parameters
Parameter |
Description |
---|---|
disabled |
Indicates if the serial port is disabled |
flow-control |
Indicates the method of data flow control to and from the serial port |
mode |
Indicates if the serial port is used to connect to the appliance’s console, a remote telnet server or allow a remote telnet connection to the device connected to the serial port. |
port-speed |
Indicates the port speed (Baud Rate) of the serial connection |
Example
set serial-port port-speed 9600 flow-control rts-cts disabled on mode console
Output
Failure shows an appropriate error message.
Description
Configures the physical serial port as a relay to which incoming TELNET traffic on a configured port will be redirected.
Syntax
set serial-port passive-mode [ tcp-port
<tcp-port> ] [ allow-implicitly
<allow-implicitly> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set serial-port passive-mode tcp-port 8080 allow-implicitly true
Output
Failure shows an appropriate error message.
Description
Configures the physical serial port as a relay to outgoing connection to a remote TELNET server.
Syntax
set serial-port active-mode [ tcp-port
<tcp-port> ] [ primary-server-address
<primary-server-address> ] [ secondary-server-address
<secondary-server-address>
]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set serial-port active-mode tcp-port 8080 primary-server-address myHost.com secondary-server-address myHost.com
Output
Failure shows an appropriate error message.
Description
Shows configuration for the serial port.
Syntax
show serial-port
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show serial-port
Output
Failure shows an appropriate error message.
Description
Adds a new server object. Server object are a way to define a network host object with its access and NAT configuration, instead of creating manual rules for it.
Syntax
add server name
<name> ipv4-address
<ipv4-address> [ dhcp-exclude-ip-addr
{ on [ dhcp-reserve-ip-addr-to-mac { on mac-addr
<mac-addr> | off } ] | off } ] [ comments
<comments> ] [ dns-resolving
<dns-resolving> ] type
{ web-server | ftp-server | citrix-server | pptp-server | mail-server |
dns-server | custom-server [ tcpProtocol
<tcpProtocol> [ tcp-ports
<tcp-ports>
] udpProtocol
<udpProtocol> [ udp-ports
<udp-ports> ] ] }
Parameters
Parameter |
Description |
---|---|
comments |
Comments Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
dhcp-exclude-ip-addr |
Indicates if the internal DHCP service will not distribute the configured IP address of this server/network object to anyone Type: Press TAB to see available options |
dhcp-reserve-ip-addr-to-mac |
Indicates if the internal DHCP service will distribute the configured IP address only to this server/network object according to its MAC address Type: Press TAB to see available options |
dns-resolving |
Indicates if the name of the server/network object will be used as a hostname for internal DNS service Type: Boolean (true/false) |
ipv4-address |
The beginning of the IP range |
mac-addr |
MAC address of the server Type: MAC address |
name |
Server object name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
tcp-ports |
TCP ports for server of type ’other’ Type: Port range |
tcpProtocol |
tcpProtocol Type: Boolean (true/false) |
udp-ports |
UDP ports for server of type ’other’ Type: Port range |
udpProtocol |
udpProtocol Type: Boolean (true/false) |
Example
add server name myObject_17 ipv4-address 192.168.1.1 dhcp-exclude-ip-addr on dhcp-reserve-ip-addr-to-mac on mac-addr 00:1C:7F:21:05:BE comments “This is a comment.” dns-resolving true type web-server
Output
Failure shows an appropriate error message.
Description
Deletes an existing server object.
Syntax
delete server
<name>
Parameters
Parameter |
Description |
---|---|
name |
Server object name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
delete server myObject_17
Output
Failure shows an appropriate error message.
Description
Shows configuration of an existing server object.
Syntax
show server
<name>
Parameters
Parameter |
Description |
---|---|
name |
Server object name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
show server myObject_17
Output
Failure shows an appropriate error message.
Description
Shows the configuration of all server objects.
Syntax
show servers
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show servers
Output
Failure shows an appropriate error message.
@@
Description
Configures the device’s details.
Syntax
set device-details [ hostname
<hostname> ] [ country
<country> ]
Parameters
Parameter |
Description |
---|---|
country |
The country where you are located. The country configured for the WLAN Options: country |
hostname |
The appliance name used to identify the gateway. Type: A string that contains [A-Z], [0-9] and ’-’ characters |
Example
set device-details hostname My-appliance country albania
Output
Failure shows an appropriate error message.
Description
Shows configuration of basic device details.
Syntax
show device-details
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show device-details
Output
Failure shows an appropriate error message.
Description
Adds a new group for service objects.
Syntax
add service-group name
<name> [ comments
<comments> ] [ member
<member> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments and explanation about the Service Group Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
member |
An association field for the contained services |
name |
Service Group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
add service-group name myObject_17 comments “This is a comment.” member TEXT
Output
Failure shows an appropriate error message.
Description
Deletes an existing group object for service objects by object name.
Syntax
delete service-group
<name>
Parameters
Parameter |
Description |
---|---|
name |
Service Group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
delete service-group myObject_17
Output
Failure shows an appropriate error message.
Configures an existing service objects group.
Description
Configures an existing service objects group.
Syntax
set service-group
<name> [ new-name
<new-name> ] [ comments
<comments> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments and explanation about the Service Group Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
name |
Service Group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
new-name |
Service Group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set service-group myObject_17 new-name myObject_17 comments “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Removes all service objects from an existing service objects group.
Syntax
set service-group
<name> remove-all members
Parameters
Parameter |
Description |
---|---|
name |
Service Group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set service-group myObject_17 remove-all members
Output
Failure shows an appropriate error message.
Description
Adds an existing service object to an existing service objects group.
Syntax
set service-group
<name> add member
<member>
Parameters
Parameter |
Description |
---|---|
member |
Service name |
name |
Service Group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set service-group myObject_17 add member TEXT
Output
Failure shows an appropriate error message.
Description
Removes an existing service object from an existing service objects group.
Syntax
set service-group
<name> remove member
<member>
Parameters
Parameter |
Description |
---|---|
member |
Service name |
name |
Service Group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set service-group myObject_17 remove member TEXT
Output
Failure shows an appropriate error message.
Description
Shows the content of a service object group.
Syntax
show service-group
<name>
Parameters
Parameter |
Description |
---|---|
name |
Service Group name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
show service-group myObject_17
Output
Failure shows an appropriate error message.
Description
Shows the content of all service object groups.
Syntax
show service-groups
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-groups
Output
Failure shows an appropriate error message.
Description
Adds a new ICMP-type service object.
Syntax
add service-icmp name
<name> icmp-code
<icmp-code> icmp-type
<icmp-type> [ comments
<comments> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments and explanation about the service Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
icmp-code |
ICMP code Type: A number with no fractional part (integer) |
icmp-type |
ICMP message type Type: A number with no fractional part (integer) |
name |
Service name Type: String |
Example
add service-icmp name TEXT icmp-code 2 icmp-type 5 comments
"This is a comment.”
Output
Failure shows an appropriate error message.
Description
Deletes an existing ICMP-type service object by name.
Syntax
delete service-icmp
<name>
Parameters
Parameter |
Description |
---|---|
name |
Service name Type: String |
Example
delete service-icmp TEXT
Output
Failure shows an appropriate error message.
Description
Configures an existing ICMP-type service object.
Syntax
set service-icmp
<name> [ name
<name> ] [ icmp-code
<icmp-code> ] [ icmp-type
<icmp-type> ] [ comments
<comments> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments and explanation about the service Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
icmp-code |
ICMP code Type: A number with no fractional part (integer) |
icmp-type |
ICMP message type Type: A number with no fractional part (integer) |
name |
Service name Type: String |
Example
set service-icmp TEXT name TEXT icmp-code 2 icmp-type 5 comments “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a specific ICMP-type service object.
Syntax
show service-icmp
<name>
Parameters
Parameter |
Description |
---|---|
name |
Service name Type: String |
Example
show service-icmp TEXT
Output
Failure shows an appropriate error message.
Description
Adds a new non-TCP/UDP service object (a different IP protocol than 6 or 17).
Syntax
add service-protocol name
<name> ip-protocol
<ip-protocol> [ comments
<comments> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments and explanation about the service Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
ip-protocol |
IP Protocol number Type: A number with no fractional part (integer) |
name |
Service name Type: String |
Example
add service-protocol name TEXT ip-protocol 50 comments “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Deletes a non-TCP/UDP service object by name.
Syntax
delete service-protocol
<name>
Parameters
Parameter |
Description |
---|---|
name |
Service name Type: String |
Example
delete service-protocol TEXT
Output
Failure shows an appropriate error message.
Description
Configures an existing non-TCP/UDP service object.
Syntax
set service-protocol
<name> [ name
<name> ] [ ip-protocol
<ip-protocol> ] [ comments
<comments> ] [ session-timeout
<session-timeout> ] [ accept-replies
<accept-replies> ] [ sync-connections-on-cluster
<sync-connections-on-cluster>
] [ match
<match> ] [ aggressive-aging-enable
<aggressive-aging-enable> ] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted |
aggressive-aging- enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
comments |
Comments and explanation about the service Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
ip-protocol |
IP Protocol number Type: A number with no fractional part (integer) |
match |
INSPECT expression that searches for a pattern in a packet, only relevant for services of type ’other’ |
name |
Service name Type: String |
session-timeout |
Time (in seconds) before the session times out |
sync-connections-on- cluster |
Enables state-synchronized High Availability or Load Sharingon a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
Example
set service-protocol TEXT name TEXT ip-protocol 50 comments “This is a comment.” session-timeout 15 accept-replies true
sync-connections-on-cluster true match TEXT aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a specific non-TCP/UDP service object.
Syntax
show service-protocol
<name>
Parameters
Parameter |
Description |
---|---|
name |
Service name Type: String |
Example
show service-protocol TEXT
Output
Failure shows an appropriate error message.
Description
Shows the configuration of all non-TCP/UDP service objects.
Syntax
show services-protocol
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show services-protocol
Output
Failure shows an appropriate error message.
Description
Configures an existing server object. A server object is a network object with predefined access and NAT configurations.
Syntax
set server server-access
<name> [ access-zones { blocked [ trusted-zone-lan
<trusted-zone-lan> ] [ trusted-zone-vpn-users
<trusted-zone-vpn-users> ] [ trusted-zone-trusted-wireless-networks
<trusted-zone-trusted-wireless-networks> ] [ trusted-zone-dmz
<trusted-zone-dmz> ] [ trusted-zone-vpn-sites
<trusted-zone-vpn-sites>
] | allowed } ] [ allow-ping-to-server
<allow-ping-to-server> ] [
log-blocked-connections
<log-blocked-connections> ] [ log-accepted-connections
<log-accepted-connections> ]
Parameters
Parameter |
Description |
---|---|
access-zones |
Zones the server is accessible from by default (accept all by default, accept only from configured zones, or define no server-specific default access policy). Manual policy rules will override this policy. Type: Press TAB to see available options |
allow-ping-to-server |
Indicates if default access policy will work on ICMP traffic as well as defined ports. This option will not work on multiple ports hidden behind the gateway. Type: Boolean (true/false) |
log-accepted- connections |
Indicates if connections that are accepted by the default access policy to the server are logged Options: none, log |
log-blocked- connections |
Indicates if connections that are blocked by the default access policy to the server are logged Options: none, log |
name |
Server object name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
trusted-zone-dmz |
Indicates if traffic from the DMZ network to the server is allowed or blocked by default Options: blocked, allowed |
trusted-zone-lan |
Indicates if traffic from Physical internal networks (LAN ports) to the server is allowed or blocked by default Options: blocked, allowed |
trusted-zone-trusted- wireless-networks |
Indicates if traffic from trusted wireless networks to the server is allowed or blocked by default Options: blocked, allowed |
trusted-zone-vpn-sites |
Indicates if encrypted traffic from remote VPN sites to the server is allowed or blocked by default Options: blocked, allowed |
trusted-zone-vpn- users |
Indicates if encrypted traffic from VPN remote access users to the server is allowed or blocked by default Options: blocked, allowed |
Example
set server server-access myObject_17 access-zones blocked trusted-zone-lan blocked trusted-zone-vpn-users blocked trusted-zone-trusted-wireless-networks blocked trusted-zone-dmz blocked trusted-zone-vpn-sites blocked
allow-ping-to-server true log-blocked-connections none log-accepted-connections none
Output
Failure shows an appropriate error message.
Description
Configures NAT settings on an existing server object.
Syntax
set server server-nat-settings
<name> [ nat-settings { static-nat [
static-nat-ipv4-address
<static-nat-ipv4-address> ] [ static-nat-for-outgoing-traffic
<static-nat-for-outgoing-traffic> ] | port-forwarding } ] [
port-address-translation
<port-address-translation> ] [ port-address-translation-external
<port-address-translation-external-port> ] [ force-source-hide-nat
<force-source-hide-nat > ]
Parameters
Parameter |
Description |
---|---|
force-source-hide-nat |
Allow access from internal networks to the external IP address of the server via local switch Type: Boolean (true/false) |
name |
Server object name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
nat-settings |
Indicates the general NAT settings configured (no NAT, hide behind the gateway’s external IP address or use a different external IP address) Type: Press TAB to see available options |
port-address- translation |
For servers with a single port, indicates if the external port is not the same as the internal port. Type: Boolean (true/false) |
port-address- translation-external- port |
For servers with a single port, indicates the external port that is used to forward traffic to the server Type: Port number |
static-nat-for- outgoing-traffic |
indicates if outgoing traffic from the server using static NAT will be hidden behind the configured external IP address without a port change Type: Boolean (true/false) |
static-nat-ipv4- address |
For servers using static NAT, the external IP address used to forward traffic to the server Type: IP address |
Example
set server server-nat-settings myObject_17 nat-settings static-nat static-nat-ipv4-address 192.168.1.1 static-nat-for-outgoing-traffic true port-address-translation true port-address-translation-external-port 8080 force-source-hide-nat true
Output
Failure shows an appropriate error message.
Description
Configures network settings on an existing server object.
Syntax
set server server-network-settings
<name> [ name
<name> ] [
dhcp-exclude-ip-addr { on [ dhcp-reserve-ip-addr-to-mac { on mac-addr
<mac-addr> | off } ] | off } ] [ comments
<comments> ] [ dns-resolving
<dns-resolving> ] [ ipv4-address
<ipv4-address> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
dhcp-exclude-ip-addr |
Indicates if the internal DHCP service will not distribute the configured IP address of this server/network object to anyone Type: Press TAB to see available options |
dhcp-reserve-ip-addr- to-mac |
Indicates if the internal DHCP service will distribute the configured IP address only to this server/network object according to its MAC address Type: Press TAB to see available options |
dns-resolving |
Indicates if the name of the server/network object will be used as a hostname for internal DNS service Type: Boolean (true/false) |
ipv4-address |
The beginning of the IP range |
mac-addr |
MAC address of the server Type: MAC address |
name |
Server object name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
Example
set server server-network-settings myObject_17 name myObject_17 dhcp-exclude-ip-addr on dhcp-reserve-ip-addr-to-mac on mac-addr
00:1C:7F:21:05:BE comments “This is a comment.” dns-resolving true ipv4-address 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Configures an existing server object.
Syntax
set server server-ports
<name> [ web-server { true service-http { true [ service-http-ports
<service-http-ports> ] | false } service-https { true [ service-https-ports
<service-https-ports> ] | false } | false
} ] [ mail-server { true service-smtp { true [ service-smtp-ports
<service-smtp-ports> ] | false } service-pop3 { true [ service-pop3-ports
<service-pop3-ports> ] | false } service-imap { true [ service-imap-ports
<service-imap-ports> ] | false } | false } ] [ dns-server { true service-dns
{ true [ service-dns-ports
<service-dns-ports> ] | false } | false } ] [
ftp-server { true service-ftp { true [ service-ftp-ports
<service-ftp-ports>
] | false } | false } ] [ citrix-server { true service-citrix { true [ service-citrix-ports
<service-citrix-ports> ] | false } | false } ] [ pptp-server { true service-pptp-selected { true [ service-pptp-ports
<service-pptp-ports> ] | false } | false } ] [ custom-server { true [ tcpProtocol
<tcpProtocol> [ tcp-ports
<tcp-ports> ] udpProtocol
<udpProtocol> [ udp-ports
<udp-ports> ] ] | false } ]
Parameters
Parameter |
Description |
---|---|
citrix-server |
Indicates a Citrix server (for each type we provide default but configurable ports) |
custom-server |
Server type custom |
dns-server |
Indicates a DNS server (for each type we provide default but configurable ports |
ftp-server |
Indicates a FTP server (for each type we provide default but configurable ports) |
mail-server |
Indicates a mail server (for each type we provide default but configurable ports) |
name |
Server object name Type: A string that begins with a letter and contain up to 32 alphanumeric (0-9, a-z, _ - .) characters without spaces |
pptp-server |
Indicates a PPTP server (for each type we provide default but configurable ports) |
service-citrix |
Indicates if ports are defined for Citrix (for a Citrix server) |
service-citrix-ports |
Configured ports for Citrix (for a Citrix server) |
service-dns |
Indicates if ports are defined for DNS (for a DNS server) |
service-dns-ports |
Configured ports for DNS (for a DNS server) |
service-ftp |
Indicates if ports are defined for FTP (for a FTP server) |
service-ftp-ports |
Configured ports for FTP (for a FTP server) |
service-http |
Indicates if ports are defined for HTTP (for a web server) |
service-http-ports |
Configured ports for HTTP (for a web server) |
service-https |
Indicates if ports are defined for HTTPS (for a web server) |
service-https-ports |
Configured ports for HTTPS (for a web server) |
service-imap |
Indicates if ports are defined for IMAP (for a mail server) |
service-imap-ports |
Configured ports for IMAP (for a web server) |
service-pop3 |
Indicates if ports are defined for POP3 (for a mail server) |
service-pop3-ports |
Configured ports for POP3 (for a web server) |
service-pptp-ports |
Configured ports for PPTP (for a PPTP server) |
service-pptp-selected |
Indicates if ports are defined for PPTP (for a PPTP server) |
service-smtp |
Indicates if ports are defined for SMTP (for a mail server) |
service-smtp-ports |
Configured ports for SMTP (for a web server) |
tcp-ports |
TCP ports for server of type ’other’ Type: Port range |
tcpProtocol |
tcpProtocol Type: Boolean (true/false) |
udp-ports |
UDP ports for server of type ’other’ Type: Port range |
udpProtocol |
udpProtocol Type: Boolean (true/false) |
web-server |
Indicates a web server (for each type we provide default but configurable ports) |
Example
set server server-ports myObject_17 web-server true service-http true service-http-ports 8080-8090 service-https true service-https-ports 8080-8090 mail-server true service-smtp true service-smtp-ports 8080-8090 service-pop3 true service-pop3-ports 8080-8090 service-imap true service-imap-ports
8080-8090 dns-server true service-dns true service-dns-ports 8080-8090
ftp-server true service-ftp true service-ftp-ports 8080-8090 citrix-server true service-citrix true service-citrix-ports 8080-8090 pptp-server true service-pptp-selected true service-pptp-ports 8080-8090 custom-server true tcpProtocol true tcp-ports 8080-8090 udpProtocol true udp-ports 8080-8090
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in Any_TCP service object.
Syntax
set service-system-default Any_TCP [ port
<port> ] [ session-timeout
<session-timeout> ] [ use-source-port { false | true [ source-port
<source-port> ] } ] [ keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation> ] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable> ] [ aggressive-aging-timeout
<aggressive-aging-timeout>]
Parameters
Parameter |
Description |
---|---|
aggressive-aging- enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on- cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule BaseRule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
sync-delay-enable |
True to delay connections synchronization. |
use-source-port |
Use source port |
Example
set service-system-default Any_TCP port 8080-8090 session-timeout 15
use-source-port false source-port 8080 keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true
delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout
15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in Any_TCP service object.
Syntax
show service-system-default Any_TCP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default Any_TCP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in Any_UDP service object.
Syntax
set service-system-default Any_UDP [ port
<port> ] [ session-timeout
<session-timeout> ] [ use-source-port { false | true [ source-port
<source-port> ] } ] [ keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation> ] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ] [ accept-replies
<accept-replies> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted |
aggressive-aging- enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on- cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
use-source-port |
Use source port. |
Example
set service-system-default Any_UDP port 8080-8090 session-timeout 15
use-source-port false source-port 8080 keep-connections-open-after-policy-installation true sync-connections-on-cluster true aggressive-aging-enable true
aggressive-aging-timeout 15 accept-replies true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in Any_UDP service object.
Syntax
show service-system-default Any_UDP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default Any_UDP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in CIFS service object.
Syntax
set service-system-default CIFS [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy-installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
sync-delay-enable |
True to delay connections synchronization. |
use-source-port |
Use source port. |
Example
set service-system-default CIFS port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in CIFS service object.
Syntax
show service-system-default CIFS
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default CIFS
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in Citrix service object.
Syntax
set service-system-default Citrix [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
sync-delay-enable |
True to delay connections synchronization. |
use-source-port |
Use source port. |
Example
set service-system-default Citrix port 8080-8090 disable-inspection
true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in Citrix service object.
Syntax
show service-system-default Citrix
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default Citrix
Output
Failure shows an appropriate error message.
Description
Configures firewall inspection settings of the built-in Citrix service object.
Syntax
set service-system-default Citrix firewall-settings [ protocol-support
<protocol-support> ]
Parameters
Parameter |
Description |
---|---|
protocol-support |
Which protocol to support on the configured ports. The default port 1494 is commonly used by two different protocols - Winframe or Citrix ICA Options: PROTO_TYPE.WIN_FRAME, PROTO_TYPE.CITRIX_ICA |
Example
set service-system-default Citrix firewall-settings protocol-support PROTO_TYPE.WIN_FRAME
Output
Failure shows an appropriate error message.
Description
Shows the inspection settings of the built-in Citrix service object.
Syntax
show service-system-default Citrix firewall-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default Citrix firewall-settings
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in DHCP service object.
Syntax
set service-system-default DHCP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [ use-source-port
{ false | true [ source-port
<source-port> ] } ] [ accept-replies
<accept-replies> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
use-source-port |
Use source port |
Example
set service-system-default DHCP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080 accept-replies true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in DHCP service object.
Syntax
show service-system-default DHCP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default DHCP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in DNS_TCP service object.
Syntax
set service-system-default DNS_TCP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
sync-delay-enable |
True to delay connections synchronization. |
use-source-port |
Use source port. |
Example
set service-system-default DNS_TCP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in DNS_TCP service object.
Syntax
show service-system-default DNS_TCP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default DNS_TCP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in DNS_UDP service object.
Syntax
set service-system-default DNS_UDP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [ use-source-port
{ false | true [ source-port
<source-port> ] } ] [ accept-replies
<accept-replies> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted. |
disable-inspection |
Disable deep inspection of traffic matching this service. Type: Boolean (true/false) |
port |
Destination ports (a comma separated list of ports/ranges). Type: Port range |
session-timeout |
Time (in seconds) before the session times out. |
source-port |
Source port. |
use-source-port |
Use source port. |
Example
set service-system-default DNS_UDP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080 accept-replies true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in DNS_UDP service object.
Syntax
show service-system-default DNS_UDP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default DNS_UDP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in FTP service object.
Syntax
set service-system-default FTP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability. |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out. |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections. |
disable-inspection |
Disable deep inspection of traffic matching this service. Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy. |
port |
Destination ports (a comma separated list of ports/ranges). Type: Port range |
session-timeout |
Time (in seconds) before the session times out. |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
sync-delay-enable |
True to delay connections synchronization. |
use-source-port |
Use source port. |
Example
set service-system-default FTP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in FTP service object.
Syntax
show service-system-default FTP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default FTP
Output
Failure shows an appropriate error message.
Description
Configures firewall inspection settings of the built-in FTP service object.
Syntax
set service-system-default FTP firewall-settings [ mode
<mode> ]
Parameters
Parameter |
Description |
---|---|
mode |
FTP connection mode (allowed values are ’Any’, ’Active’ or ’Passive’). Options: any, active, passive |
Example
set service-system-default FTP firewall-settings mode any
Output
Failure shows an appropriate error message.
Description
Shows the inspection settings of the built-in FTP service object.
Syntax
show service-system-default FTP firewall-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default FTP firewall-settings
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in GRE service object.
Syntax
set service-system-default GRE [ ip-protocol
<ip-protocol> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [ accept-replies
<accept-replies> ] [ match
<match> ] [ keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation> ] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted. |
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability. |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out. |
disable-inspection |
Disable deep inspection of traffic matching this service. Type: Boolean (true/false) |
ip-protocol |
IP Protocol number. Type: A number with no fractional part (integer) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy. |
match |
INSPECT expression that searches for a pattern in a packet, only relevant for services of type ’other’. |
session-timeout |
Time (in seconds) before the session times out |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
Example
set service-system-default GRE ip-protocol 15 disable-inspection true session-timeout 15 accept-replies true match TEXT
keep-connections-open-after-policy-installation true sync-connections-on-cluster true aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in GRE service object.
Syntax
show service-system-default GRE
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default GRE
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in H323 service object.
Syntax
set service-system-default H323 [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ]
Parameters
Parameter |
Description |
---|---|
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections. |
disable-inspection |
Disable deep inspection of traffic matching this service. Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy. |
port |
Destination ports (a comma separated list of ports/ranges). Type: Port range |
session-timeout |
Time (in seconds) before the session times out. |
source-port |
Source port. |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
sync-delay-enable |
True to delay connections synchronization. |
use-source-port |
Use source port. |
Example
set service-system-default H323 port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in H323 service object.
Syntax
show service-system-default H323
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default H323
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in H323_RAS service object.
Syntax
set service-system-default H323_RAS [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [ use-source-port
{ false | true [ source-port
<source-port> ] } ] [ accept-replies
<accept-replies> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted. |
disable-inspection |
Disable deep inspection of traffic matching this service. Type: Boolean (true/false) |
port |
Destination ports (a comma separated list of ports/ranges). Type: Port range |
session-timeout |
Time (in seconds) before the session times out. |
source-port |
Source port. |
use-source-port |
Use source port. |
Example
set service-system-default H323_RAS port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080 accept-replies true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in H323_RAS service object.
Syntax
show service-system-default H323_RAS
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default H323_RAS
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in HTTP service object.
Syntax
set service-system-default HTTP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster <sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability. |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out. |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections. |
disable-inspection |
Disable deep inspection of traffic matching this service. Type: Boolean (true/false) |
keep-connections- open-after-policy-installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy. |
port |
Destination ports (a comma separated list of ports/ranges). Type: Port range |
session-timeout |
Time (in seconds) before the session times out. |
source-port |
Source port. |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
sync-delay-enable |
True to delay connections synchronization. |
use-source-port |
Use source port. |
Example
set service-system-default HTTP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in HTTP service object.
Syntax
show service-system-default HTTP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default HTTP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in HTTPS service object.
Syntax
set service-system-default HTTPS [ port <port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability. |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out. |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections. |
disable-inspection |
Disable deep inspection of traffic matching this service. Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy. |
port |
Destination ports (a comma separated list of ports/ranges). Type: Port range |
session-timeout |
Time (in seconds) before the session times out. |
source-port |
Source port. |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
sync-delay-enable |
True to delay connections synchronization. |
use-source-port |
Use source port. |
Example
set service-system-default HTTPS port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in HTTPS service object.
Syntax
show service-system-default HTTPS
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default HTTPS
Output
Failure shows an appropriate error message.
Description
Configures IPS settings of the built-in HTTP service object.
Syntax
set service-system-default HTTP ips-settings [ non-standard-ports-action
<non-standard-ports-action> ] [ non-standard-ports-track
<non-standard-ports-track>
] [ parser-failure-action
<parser-failure-action> ] [ parser-failure-track
<parser-failure-track> ] [ strict-request
<strict-request> ] [ strict-response
<strict-response> ] [ split-url
<split-url> ] [ no-colon
<no-colon>
] [ tab-as-seperator
<tab-as-seperator> ] [ duplicate-content-length
<duplicate-content-length> ] [ duplicate-host
<duplicate-host> ] [ responses
<responses> ] [ invalid-chunk
<invalid-chunk> ] [ empty-value
<empty-value>
] [ post
<post> ] [ recursive-url
<recursive-url> ] [ trailing-whitespaces
<trailing-whitespaces> ]
Parameters
Parameter |
Description |
---|---|
duplicate-content-length |
True to block duplicate Content-Length’ header with same value. Type: Boolean (true/false) |
duplicate-host |
True to block duplicate ’Host’ header with same value. Type: Boolean (true/false) |
empty-value |
True to block HTTP header with empty value. Type: Boolean (true/false) |
invalid-chunk |
True if invalid chunk. Type: Boolean (true/false) |
no-colon |
True to block HTTP header with no colon. Type: Boolean (true/false) |
non-standard-ports-action |
Select action for connection over non standard ports (allowed values are ’Accept’ and ’Block’). Options: block, accept |
non-standard-ports-track |
Select track option for connection over non standard ports (allowed values are ’log’, ’alert’ and ’don’t log’) . Options: none, log, alert |
parser-failure-action |
Select action for when the parser fails (allowed values are ’Accept’ and ’Block’). Options: block, accept |
parser-failure-track |
Select track option for when the parser fails (allowed values are ’log’, ’alert’ and ’don’t log’). Options: none, log, alert |
post |
True to block requests with ’POST’ method and without ’Content-Type’ header. Type: Boolean (true/false) |
recursive-url |
True to block HTTP requests with recursive URL encoding. Type: Boolean (true/false) |
responses |
True to block responses with both ’Content-Length’ and ’Transfer-Encoding’headers. Type: Boolean (true/false) |
split-url |
True to split the URL between the query and fragment sections instructs the HTTP protections to inspect the query and fragment sections separately. Type: Boolean (true/false) |
strict-request |
True to enforce strict HTTP request parsing. Type: Boolean (true/false) |
strict-response |
True to enforce strict HTTP response parsing. Type: Boolean (true/false) |
tab-as-seperator |
True to block HTTP traffic with ’tab’ character as a separator. Type: Boolean (true/false) |
trailing-whitespaces |
True to block request header names with trailing whitespaces. Type: Boolean (true/false) |
Example
set service-system-default HTTP ips-settings non-standard-ports-action block non-standard-ports-track none parser-failure-action block
parser-failure-track none strict-request true strict-response true split-url true no-colon true tab-as-seperator true duplicate-content-length true duplicate-host true responses true invalid-chunk true empty-value true post true recursive-url true trailing-whitespaces true
Output
Failure shows an appropriate error message.
Description
Shows the inspection settings of the built-in HTTP service object.
Syntax
show service-system-default HTTP ips-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default HTTP ips-settings
Output
Failure shows an appropriate error message.
Description
Configures URL filtering over HTTPS. Enables categorization over HTTPS even without full SSL inspection.
Syntax
set service-system-default HTTPS url-filtering-settings [ categorize-https-sites
<categorize-https-sites> ]
Parameters
Parameter |
Description |
---|---|
categorize-https-sites |
Categorize HTTPS sites by their certificate CN. Type: Boolean (true/false) |
Example
set service-system-default HTTPS url-filtering-settings categorize-https-sites true
Output
Failure shows an appropriate error message.
Description
Shows the configuration of URL filtering categorization option over HTTPS.
Syntax
show service-system-default HTTPS url-filtering-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default HTTPS url-filtering-settings
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in IIOP service object.
Syntax
set service-system-default IIOP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability. |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out. |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections. |
disable-inspection |
Disable deep inspection of traffic matching this service. Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy. |
port |
Destination ports (a comma separated list of ports/ranges). Type: Port range |
session-timeout |
Time (in seconds) before the session times out. |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster. |
sync-delay-enable |
True to delay connections synchronization. |
use-source-port |
Use source port. |
Example
set service-system-default IIOP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in IIOP service object.
Syntax
show service-system-default IIOP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default IIOP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in IMAP service object.
Syntax
set service-system-default IMAP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability. |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out. |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections. |
disable-inspection |
Disable deep inspection of traffic matching this service. Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy. |
port |
Destination ports (a comma separated list of ports/ranges). Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
Example set service-system-default IMAP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in IMAP service object.
Syntax
show service-system-default IMAP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default IMAP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in LDAP service object.
Syntax
set service-system-default LDAP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default LDAP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in LDAP service object.
Syntax
show service-system-default LDAP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default LDAP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in MGCP service object.
Syntax
set service-system-default MGCP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [ use-source-port
{ false | true [ source-port
<source-port> ] } ] [ accept-replies
<accept-replies> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
use-source-port |
Use source port |
Example
set service-system-default MGCP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080 accept-replies true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in MGCP service object.
Syntax
show service-system-default MGCP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default MGCP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in NetBiosDatagram service object.
Syntax
set service-system-default NetBIOSDatagram [ port
<port> ] [
disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout>
] [ use-source-port { false | true [ source-port
<source-port> ] } ] [ accept-replies
<accept-replies> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
use-source-port |
Use source port |
Example
set service-system-default NetBIOSDatagram port 8080-8090
disable-inspection true session-timeout 15 use-source-port false source-port 8080 accept-replies true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in NetBiosDatagram service object.
Syntax
show service-system-default NetBIOSDatagram
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default NetBIOSDatagram
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in NetBiosName service object.
Syntax
set service-system-default NetBIOSName [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [ use-source-port
{ false | true [ source-port
<source-port> ] } ] [ accept-replies
<accept-replies> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
use-source-port |
Use source port |
Example
set service-system-default NetBIOSName port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
accept-replies true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in NetBiosName service object.
Syntax
show service-system-default NetBIOSName
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default NetBIOSName
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in NetShow service object.
Syntax
set service-system-default NetShow [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default NetShow port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in NetShow service object.
Syntax
show service-system-default NetShow
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default NetShow
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in NNTP service object.
Syntax
set service-system-default NNTP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ]
[ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default NNTP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in NNTP service object.
Syntax
show service-system-default NNTP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default NNTP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in POP3 service object.
Syntax
set service-system-default POP3 [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default POP3 port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in POP3 service object.
Syntax
show service-system-default POP3
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default POP3
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in PPTP_TCP service object.
Syntax
set service-system-default PPTP_TCP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default PPTP_TCP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in PPTP_TCP service object.
Syntax
show service-system-default PPTP_TCP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default PPTP_TCP
Output
Failure shows an appropriate error message.
Description
Configures additional inspection settings of the built-in PPTP_TCP service object.
Syntax
set service-system-default PPTP_TCP ips-settings [ action
<action> ] [ track
<track> ] [ strict
<strict> ]
Parameters
Parameter |
Description |
---|---|
action |
Select action for PPTP connections (allowed values are ’Accept’ and ’Block’) Options: block, accept |
strict |
True to enforce strict PPTP parsing Type: Boolean (true/false) |
track |
Select track option for PPTP connections (allowed values are ’log’, ’alert’ and ’don’t log’) Options: none, log, alert |
Example
set service-system-default PPTP_TCP ips-settings action block track none strict true
Output
Failure shows an appropriate error message.
Description
Shows the inspection settings of the built-in Any_TCP service object.
Syntax
show service-system-default PPTP_TCP ips-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default PPTP_TCP ips-settings
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in RealAudio service object.
Syntax
set service-system-default RealAudio [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default RealAudio port 8080-8090 disable-inspection
true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in RealAudio service object.
Syntax
show service-system-default RealAudio
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default RealAudio
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in RSH service object.
Syntax
set service-system-default RSH [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default RSH port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in RSH service object.
Syntax
show service-system-default RSH
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default RSH
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in RTSP service object.
Syntax
set service-system-default RTSP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default RTSP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in RTSP service object.
Syntax
show service-system-default RTSP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default RTSP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in SCCP service object.
Syntax
set service-system-default SCCP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default SCCP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in SCCP service object.
Syntax
show service-system-default SCCP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default SCCP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in SCCPS service object.
Syntax
set service-system-default SCCPS [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default SCCPS port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in SCCPS service object.
Syntax
show service-system-default SCCPS
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default SCCPS
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in SIP_TCP service object.
Syntax
set service-system-default SIP_TCP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ]
[ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default SIP_TCP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in SIP_TCP service object.
Syntax
show service-system-default SIP_TCP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default SIP_TCP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in SIP_UDP service object.
Syntax
set service-system-default SIP_UDP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [ use-source-port
{ false | true [ source-port
<source-port> ] } ] [ accept-replies
<accept-replies> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
use-source-port |
Use source port |
Example
set service-system-default SIP_UDP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080 accept-replies true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in SIP_UDP service object.
Syntax
show service-system-default SIP_UDP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default SIP_UDP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in SMTP service object.
Syntax
set service-system-default SMTP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default SMTP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in SMTP service object.
Syntax
show service-system-default SMTP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default SMTP
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in SNMP service object.
Syntax
set service-system-default SNMP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [ use-source-port
{ false | true [ source-port
<source-port> ] } ] [ accept-replies
<accept-replies> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
use-source-port |
Use source port |
Example
set service-system-default SNMP port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080 accept-replies true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in SNMP service object.
Syntax
show service-system-default SNMP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default SNMP
Output
Failure shows an appropriate error message.
Description
Additional configuration for SNMP service
Syntax
set service-system-default SNMP firewall-settings [ read-only <read-only> ]
Parameters
Parameter |
Description |
---|---|
read-only |
True to enforce read-only mode Type: Boolean (true/false) |
Example
set service-system-default SNMP firewall-settings read-only true
Output
Failure shows an appropriate error message.
Description
Shows the inspection settings of the built-in SNMP service object.
Syntax
show service-system-default SNMP firewall-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default SNMP firewall-settings
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in SQLNet service object.
Syntax
set service-system-default SQLNet [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy- installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default SQLNet port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in SQLNet service object.
Syntax
show service-system-default SQLNet
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default SQLNet
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in SSH service object.
Syntax
set service-system-default SSH [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy-installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default SSH port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in SSH service object.
Syntax
show service-system-default SSH
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default SSH
Output
Failure shows an appropriate error message.
Description
Configures additional inspection settings of the built-in SSH service object.
Syntax
set service-system-default SSH ips-settings [ block-version
<block-version>
Parameters
Parameter |
Description |
---|---|
block-version |
True to enforce blocking of version 1.x Type: Boolean (true/false) |
Example
set service-system-default SSH ips-settings block-version true
Output
Failure shows an appropriate error message.
Description
Shows the inspection settings of the built-in SSH service object.
Syntax
show service-system-default SSH ips-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default SSH ips-settings
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in TELNET service object.
Syntax
set service-system-default TELNET [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ session-timeout
<session-timeout> ] [
use-source-port { false | true [ source-port
<source-port> ] } ] [
keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy-installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-system-default TELNET port 8080-8090 disable-inspection true session-timeout 15 use-source-port false source-port 8080
keep-connections-open-after-policy-installation true sync-connections-on-cluster true sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in TELNET service object.
Syntax
show service-system-default TELNET
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default TELNET
Output
Failure shows an appropriate error message.
Description
Configures settings of the built-in TFTP service object.
Syntax
set service-system-default TFTP [ port
<port> ] [ disable-inspection
<disable-inspection> ] [ accept-replies
<accept-replies> ] [ session-timeout
<session-timeout> ] [ use-source-port { false | true [ source-port
<source-port> ] } ] [ keep-connections-open-after-policy-installation
<keep-connections-open-after-policy-installation> ] [ sync-connections-on-cluster
<sync-connections-on-cluster> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted |
disable-inspection |
Disable deep inspection of traffic matching this service Type: Boolean (true/false) |
keep-connections- open-after-policy-installation |
True to keep connections open after policy has been installed, even if they are not allowed under the new policy |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
use-source-port |
Use source port |
Example
set service-system-default TFTP port 8080-8090 disable-inspection true accept-replies true session-timeout 15 use-source-port false source-port 8080 keep-connections-open-after-policy-installation true sync-connections-on-cluster true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the built-in TFTP service object.
Syntax
show service-system-default TFTP
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show service-system-default TFTP
Output
Failure shows an appropriate error message.
Description
Adds a new TCP service object with configurable ports.
Syntax
add service-tcp name
<name> port
<port> [ comments
<comments> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments and explanation about the service Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
name |
Service name Type: String |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
Example
add service-tcp name TEXT port 8080-8090 comments “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Configures an existing TCP service object.
Syntax
set service-tcp
<name> [ name
<name> ] [ port
<port> ] [ comments
<comments> ] [ session-timeout
<session-timeout> ] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [ sync-delay-enable
<sync-delay-enable> ] [ delay-sync-interval
<delay-sync-interval> ] [ aggressive-aging-enable
<aggressive-aging-enable>
] [ aggressive-aging-timeout
<aggressive-aging-timeout> ] [ use-source-port { false | true source-port
<source-port> } ]
Parameters
Parameter |
Description |
---|---|
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
comments |
Comments and explanation about the service Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
delay-sync-interval |
Time (in seconds) after connection initiation to start synchronizing connections |
name |
Service name Type: String |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
source-port |
Source port |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
sync-delay-enable |
True to delay connections synchronization |
use-source-port |
Use source port |
Example
set service-tcp TEXT name TEXT port 8080-8090 comments “This is a comment.” session-timeout 15 sync-connections-on-cluster true
sync-delay-enable true delay-sync-interval 15 aggressive-aging-enable true aggressive-aging-timeout 15 use-source-port false source-port 8080
Output
Failure shows an appropriate error message.
Description
Deletes a TCP service object by name.
Syntax
delete service-tcp
<name>
Parameters
Parameter |
Description |
---|---|
name |
Service name Type: String |
Example
delete service-tcp TEXT
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a specific TCP service object.
Syntax
show service-tcp
<name>
Parameters
Parameter |
Description |
---|---|
name |
Service name Type: String |
Example
show service-tcp TEXT
Output
Failure shows an appropriate error message.
Description
Shows the configuration of all TCP service objects.
Syntax
show services-tcp
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show services-tcp
Output
Failure shows an appropriate error message.
Description
Adds a new UDP service object with configurable ports.
Syntax
add service-udp name
<name> port
<port> [ comments
<comments> ]
Parameters
Parameter |
Description |
---|---|
comments |
Comments and explanation about the service Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
name |
Service name Type: String |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
Example
add service-udp name TEXT port 8080-8090 comments “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Deletes a UDP service object by name.
Syntax
delete service-udp
<name>
Parameters
Parameter |
Description |
---|---|
name |
Service name Type: String |
Example
delete service-udp TEXT
Output
Failure shows an appropriate error message.
Description
Configures an existing UDP service object
Syntax
set service-udp
<name> [ name
<name> ] [ port
<port> ] [ comments
<comments>
] [ session-timeout
<session-timeout> ] [ accept-replies
<accept-replies>
] [ sync-connections-on-cluster
<sync-connections-on-cluster> ] [
aggressive-aging-enable <aggressive-aging-
enable> ] [ aggressive-aging-timeout
<aggressive-aging-timeout> ]
Parameters
Parameter |
Description |
---|---|
accept-replies |
Specifies if service replies are to be accepted |
aggressive-aging-enable |
Enable to manage the connections table capacity and memory consumption of the firewall to increase durability and stability |
aggressive-aging-timeout |
Time (in seconds) before the aggressive aging times out |
comments |
Comments and explanation about the service Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
name |
Service name Type: String |
port |
Destination ports (a comma separated list of ports/ranges) Type: Port range |
session-timeout |
Time (in seconds) before the session times out |
sync-connections-on-cluster |
Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster. Of the services allowed by the Rule Base, only those with synchronize connections on cluster will be synchronized as they pass through the cluster |
Example
set service-udp TEXT name TEXT port 8080-8090 comments “This is a comment.” session-timeout 15 accept-replies true sync-connections-on-cluster true aggressive-aging-enable true aggressive-aging-timeout 15
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a specific UDP service object
Syntax
show service-udp
<name>
Parameters
Parameter |
Description |
---|---|
name |
Service name Type: String |
Example
show service-udp TEXT
Output
Failure shows an appropriate error message.
Description
Shows the configuration of all UDP service objects.
Syntax
show services-udp
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show services-udp
Output
Failure shows an appropriate error message.
Description
Shows the configuration of all ICMP-type service objects.
Syntax
show services-icmp
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show services-icmp
Output
Failure shows an appropriate error message.
The shell
and expert
commands switch between the shell and expert modes.
Description
Changes to expert mode.
Syntax
shell
expert
Parameters
Parameter |
Description |
---|---|
|
|
Return Value
None
Example
shell
Output
None
Comments
Use the cpshell command to start cpshell.
Description
SecureXL Implementation Module commands
Parameters
Parameter |
Description |
---|---|
|
get the version |
|
get the interface list |
|
print the table content (-s for summary) |
|
print the range content |
|
print only templates in drop state |
|
set the sim debug flags |
|
get/set affinity options |
|
set or clear interface(s) as not accelerated |
|
enable/disable features |
|
configure template quota feature |
|
configure Heavy-Load CPU QOS feature |
Adds SNMP trap receiver and SNMP users to the SNMP configuration.
Description
Adds a new SNMP trap receiver IP address to be used by the SNMP agent.
Syntax
add snmp traps-receiver
<traps-receiver> version { v2 community
<community>
| v3 user
<user> }
Parameters
Parameter |
Description |
---|---|
community |
Community name of the receivers trap, public is default for version2 users Type: A string of alphanumeric characters without space between them |
traps-receiver |
Receivers IP address that the trap associated with Type: IP address |
user |
SNMP version3 Defined user |
version |
SNMP Version, options are: v2 or v3 Type: Press TAB to see available options |
Example
add snmp traps-receiver 192.168.1.1 version v2 community word
Output
Failure shows an appropriate error message.
Description
Adds a new user to be used by SNMPv3 protocol.
Syntax
add snmp user
<user> security-level { true auth-pass-type
<auth-pass-type> auth-pass-phrase
<auth-pass-phrase> privacy-pass-type
<privacy-pass-type> privacy-pass-phrase
<privacy-pass-phrase> | false auth-pass-type
<auth-pass-type> auth-pass-phrase
<auth-pass-phrase> }
Parameters
Parameter |
Description |
---|---|
auth-pass-phrase |
Authentication password for the SNMP version3 user Type: A string that contains alphanumeric and special characters |
auth-pass-type |
Authentication protocol type for the version3 user, options are: MD5 or SHA1 Options: MD5, SHA1 |
privacy-pass-phrase |
Privacy password chosen by the version3 user in case privacy is set Type: A string that contains alphanumeric and special characters |
privacy-pass-type |
Privacy protocol type for the version3 user, options are: AES or DES Options: AES, DES |
security-level |
Does Privacy protocol for this version3 user was set in the security level Type: Boolean (true/false) |
user |
version3 user name Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
add snmp user admin security-level true auth-pass-type MD5 auth-pass-phrase a(&7Ba privacy-pass-type AES privacy-pass-phrase a(&7Ba
Output
Failure shows an appropriate error message.
Deletes SNMP trap receivers and SNMP users.
Description
Deletes an existing SNMP trap receiver by IP address.
Syntax
delete snmp traps-receiver
<traps-receiver>
Parameters
Parameter |
Description |
---|---|
traps-receiver |
Receivers IP address that the trap associated with Type: IP address |
Example
delete snmp traps-receiver 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Deletes a configured SNMP contact.
Syntax
delete snmp contact
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete snmp contact
Output
Failure shows an appropriate error message.
Description
Deletes a configured SNMP location.
Syntax
delete snmp location
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete snmp location
Output
Failure shows an appropriate error message.
Configures SNMP settings.
escription
Configures SNMP agent settings.
Syntax
set snmp agent
<agent> [ agent-version
<agent-version> ] [ community
<community> ] [ contact
<contact> ] [ location
<location> ]
Parameters
Parameter |
Description |
---|---|
agent |
Is SNMP option enabled or disabled, disabled is the default Type: Boolean (true/false) |
agent-version |
Is the defined SNMP version is version3 only Type: Boolean (true/false) |
community |
Community name of the SNMP, public is the default Type: A string of alphanumeric characters without space between them |
contact |
System contact name, maximum length is 128 Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
location |
System location name Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
set snmp agent true agent-version true community word contact myContact location myLocation
Output
Failure shows an appropriate error message.
Description
Configures SNMP agent settings.
Syntax
set snmp agent-version
<agent-version> [ agent
<agent> ] [ community
<community> ] [ contact
<contact> ] [ location
<location> ]
Parameters
Parameter |
Description |
---|---|
agent |
Is SNMP option enabled or disabled, disabled is the default Type: Boolean (true/false) |
agent-version |
Is the defined SNMP version is version3 only Type: Boolean (true/false) |
community |
Community name of the SNMP, public is the default Type: A string of alphanumeric characters without space between them |
contact |
System contact name, maximum length is 128 Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
location |
System location name Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
set snmp agent-version true agent true community word contact myContact location myLocation
Output
Failure shows an appropriate error message.
Description
Configures SNMP community settings.
Syntax
set snmp community
<community> [ agent
<agent> ] [ agent-version
<agent-version> ] [ contact
<contact> ] [ location
<location> ]
Parameters
Parameter |
Description |
---|---|
agent |
Is SNMP option enabled or disabled, disabled is the default Type: Boolean (true/false) |
agent-version |
Is the defined SNMP version is version3 only Type: Boolean (true/false) |
community |
Community name of the SNMP, public is the default Type: A string of alphanumeric characters without space between them |
contact |
System contact name, maximum length is 128 Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
location |
System location name Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
set snmp community word agent true agent-version true contact myContact location myLocation
Output
Failure shows an appropriate error message.
Description
Configures SNMP contact settings.
Syntax
set snmp contact
<contact> [ agent
<agent> ] [ agent-version
<agent-version>
] [ community
<community> ] [ location
<location> ]
Parameters
Parameter |
Description |
---|---|
agent |
Is SNMP option enabled or disabled, disabled is the default Type: Boolean (true/false) |
agent-version |
Is the defined SNMP version is version3 only Type: Boolean (true/false) |
community |
Community name of the SNMP, public is the default Type: A string of alphanumeric characters without space between them |
contact |
System contact name, maximum length is 128 Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
location |
System location name Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
set snmp contact myContact agent true agent-version true community word location myLocation
Output
Failure shows an appropriate error message.
Description
Configures SNMP location settings.
Syntax
set snmp location
<location> [ agent
<agent> ] [ agent-version
<agent-version> ] [ community
<community> ] [ contact
<contact> ]
Parameters
Parameter |
Description |
---|---|
agent |
Is SNMP option enabled or disabled, disabled is the default Type: Boolean (true/false) |
agent-version |
Is the defined SNMP version is version3 only Type: Boolean (true/false) |
community |
Community name of the SNMP, public is the default Type: A string of alphanumeric characters without space between them |
contact |
System contact name, maximum length is 128 Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
location |
System location name Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
set snmp location myLocation agent true agent-version true community word contact myContact
Output
Failure shows an appropriate error message.
Shows SNMP configuration.
Description
Shows SNMP agent configuration.
Syntax
show snmp agent
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show snmp agent
Output
Failure shows an appropriate error message.
Description
Shows SNMP agent version configuration.
Syntax
show snmp agent-version
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show snmp agent-version
Output
Failure shows an appropriate error message.
Description
Shows SNMP community configuration.
Syntax
show snmp community
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show snmp community
Output
Failure shows an appropriate error message.
Description
Shows SNMP contact configuration.
Syntax
show snmp contact
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show snmp contact
Output
Failure shows an appropriate error message.
Description
Shows SNMP location configuration.
Syntax
show snmp location
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show snmp location
Output
Failure shows an appropriate error message.
Description
Shows SNMP configuration.
Syntax
show snmp-general-all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show snmp-general-all
Output
Failure shows an appropriate error message.
Configures, enables or disables traps from the list, the enabled traps are sent to the trap receivers.
Description
Enable/Disable SNMP traps functionality.
Syntax
set snmp traps { enable | disable }
Parameters
Parameter |
Description |
---|---|
snmpTrapsEnable |
snmpTrapsEnable Type: Boolean (true/false) |
Example
set snmp traps true
Output
Failure shows an appropriate error message.
Description
Configures an existing SNMP trap.
Syntax
set snmp traps trap-name
<trap-name> [ enable
<enable> ] [ severity
<severity> ] [ repetitions
<repetitions> ] [ repetitions-delay
<repetitions-delay> ] [ threshold
<threshold> ]
Parameters
Parameter |
Description |
---|---|
enable |
Enable or disable whether a trap is sent for the specific event Type: Boolean (true/false) |
repetitions |
Repetitions on trap sending times between 0 - 10, optional field Type: A number with no fractional part (integer) |
repetitions-delay |
Wait time (in seconds) between sending each trap, optional field Type: A number with no fractional part (integer) |
severity |
Trap hazardous level, optional field, severity of the trap between 1 - 4 Type: A number with no fractional part (integer) |
threshold |
The mathematical value associated with the thresholds Type: A number with no fractional part (integer) |
trap-name |
Trap event name Options: trap-name |
Example
set snmp traps trap-name interface-disconnected enable true severity
15 repetitions 15 repetitions-delay 15 threshold 15
Output
Failure shows an appropriate error message.
Description
Configures an existing SNMP trap receiver.
Syntax
set snmp traps receiver <receiver> version { v2 [ community <community> ] | v3 [ user <user> ] }
Parameters
Parameter |
Description |
---|---|
community |
Community name of the receivers trap, public is default for version2 users Type: A string of alphanumeric characters without space between them |
receiver |
Receivers IP address that the trap associated with Type: IP address |
user |
SNMP version3 Defined user |
version |
SNMP Version, options are: v2 or v3 Type: Press TAB to see available options |
Example
set snmp traps receiver 192.168.1.1 version v2 community word
Output
Failure shows an appropriate error message.
Description
Shows SNMP traps status.
Syntax
show snmp traps status
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show snmp traps status
Output
Failure shows an appropriate error message.
Description
Deletes all configured SNMP trap receivers.
Syntax
delete snmp traps-receivers all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete snmp traps-receivers all
Output
Failure shows an appropriate error message.
Description
Shows all SNMP trap receivers.
Syntax
show snmp traps receivers
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show snmp traps receivers
Output
Failure shows an appropriate error message.
Description
Shows all SNMP traps.
Syntax
show snmp traps enabled-traps
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show snmp traps enabled-traps
Output
Failure shows an appropriate error message.
Description
Deletes a configured SNMP user by name.
Syntax
delete snmp user
<user-name>
Parameters
Parameter |
Description |
---|---|
user-name |
version3 user name Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
delete snmp user admin
Output
Failure shows an appropriate error message.
Description
Configures an existing SNMP user.
Syntax
set snmp user
<user-name> security-level { true [ auth-pass-type
<auth-pass-type> ] [ auth-pass-phrase
<auth-pass-phrase> ] [ privacy-pass-type
<privacy-pass-type> ] [ privacy-pass-phrase
<privacy-pass-phrase> ] | false [ auth-pass-type
<auth-pass-type> ] [ auth-pass-phrase
<auth-pass-phrase> ] }
Parameters
Parameter |
Description |
---|---|
auth-pass-phrase |
Authentication password for the SNMP version3 user Type: A string that contains alphanumeric and special characters |
auth-pass-type |
Authentication protocol type for the version3 user, options are: MD5 or SHA1 Options: MD5, SHA1 |
privacy-pass-phrase |
Privacy password chosen by the version3 user in case privacy is set Type: A string that contains alphanumeric and special characters |
privacy-pass-type |
Privacy protocol type for the version3 user, options are: AES or DES Options: AES, DES |
security-level |
Does Privacy protocol for this version3 user was set in the security level Type: Boolean (true/false) |
user-name |
version3 user name Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
set snmp user admin security-level true auth-pass-type MD5 auth-pass-phrase a(&7Ba privacy-pass-type AES privacy-pass-phrase a(&7Ba
Output
Failure shows an appropriate error message.
Description
Shows the configuration of SNMP user.
Syntax
show snmp user
<user-name>
Parameters
Parameter |
Description |
---|---|
user-name |
version3 user name Type: A string that contains (0-9, a-z, - . @) up to 64 characters without spaces |
Example
show snmp user admin
Output
Failure shows an appropriate error message.
Description
Shows the configuration of all SNMP users.
Syntax
show snmp users
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show snmp users
Output
Failure shows an appropriate error message.
Description
Deletes all configured SNMP users.
Syntax
delete snmp users all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete snmp users all
Output
Failure shows an appropriate error message.
Description
Shows the version of the current software.
Syntax
show software-version | ver
Parameters
Parameter |
Description |
---|---|
|
|
Example
show software-version
Output
Success shows the software version of the appliance. Failure shows an appropriate error message.
Description
Configure advanced settings for SSL Inspection.
Syntax
set ssl-inspection advanced-settings [ bypass-well-known-update-services
<bypass-well-known-update-services> ] [ validate-crl
<validate-crl>
] [ validate-cert-expiration
<validate-cert-expiration> ] [
validate-unreachable-crl
<validate-unreachable-crl> ] [ track-validation-errors
<track-validation-errors> ] [ retrieve-intermediate-ca-certificate
<retrieve-intermediate-ca-certificate> ] [ log-empty-ssl-connections
<log-empty-ssl-connections> ] [ additional-https-ports
<additional-https-ports>
] [ validate-untrusted-certificates
<validate-untrusted-certificates> ]
Parameters
Parameter |
Description |
---|---|
additional-https-ports |
Additional HTTPS ports for ssl inspection (a comma separated list ofports/ranges) Type: Port range |
bypass-well-known-update-services |
Bypass HTTPS Inspection of traffic to well known software update services Type: Boolean (true/false) |
log-empty-ssl-connections |
Log connections that were terminated by the client before data was sent - might indicate the client did not install CA certificate Type: Boolean (true/false) |
retrieve-intermediate-ca-certificate |
Indicates if the SSL inspection mechanism will perform it’s validations on all intermidate CA certificates in the certificate chain Type: Boolean (true/false) |
track-validation-errors |
Choose if the SSL Inspection validations are tracked Options: none, log, alert |
validate-cert-expiration |
Indicates if the SSL inspection mechanism will drop connections that present an expired certificate Type: Boolean (true/false) |
validate-crl |
Indicates if the SSL inspection mechanism will drop connections that present a revoked certificate Type: Boolean (true/false) |
validate-unreachable-crl |
Indicates if the SSL inspection mechanism will drop connections that present a certificate with an unreachable CRL Type: Boolean (true/false) |
validate-untrusted-certificates |
Indicates if the SSL inspection mechanism will drop connections that present an untrusted server certificate Type: Boolean (true/false) |
Example
set ssl-inspection advanced-settings bypass-well-known-update-services
true validate-crl true validate-cert-expiration true validate-unreachable-crl
true track-validation-errors none retrieve-intermediate-ca-certificate
true log-empty-ssl-connections true additional-https-ports 8080-8090
validate-untrusted-certificates true
Output
Failure shows an appropriate error message.
Description
Show advanced settings for SSL Inspection.
Syntax
show ssl-inspection advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ssl-inspection advanced-settings
Output
Failure shows an appropriate error message.
Description
Add a new exception to bypass SSL Inspection policy for specific traffic.
Syntax
add ssl-inspection exception [ source
<source> ] [ source-negate
<source-negate> ] [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [ service-negate
<service-negate>
] [ { [ category-name
<category-name> ] | [ category-id
<category-id> ] } ] [
category-negate
<category-negate> ] [ comment
<comment> ] [ track
<track> ] [
disabled
<disabled> ]
Parameters
Parameter |
Description |
---|---|
category-id |
Application or custom application name |
category-name |
Application or custom application name |
category-negate |
If true, the category is all traffic except what is defined in the category field Type: Boolean (true/false) |
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
disabled |
Indicates if the exception is disabled Type: Boolean (true/false) |
service |
The network service object that the exception should match to |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the source is all traffic except what is defined in the source field Type: Boolean (true/false) |
track |
The action taken when there is a match on the rule Options: none, log, alert |
Example
add ssl-inspection exception source TEXT source-negate true destination
TEXT destination-negate true service TEXT service-negate true category-name
TEXT category-negate true comment This is a comment. track none disabled true
Output
Failure shows an appropriate error message.
Delete an existing SSL Inspection policy exception.
Description
Delete an existing SSL Inspection policy exception.
Syntax
delete ssl-inspection exception position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The index of exception Type: Decimal number |
Example
delete ssl-inspection exception position 2
Output
Failure shows an appropriate error message.
Description
Delete an existing SSL Inspection policy exception.
Syntax
delete ssl-inspection exception all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete ssl-inspection exception all
Output
Failure shows an appropriate error message.
Description
Configure an existing SSL Inspection policy exception.
Syntax
set ssl-inspection exception position
<position> [ source
<source>
] [ source-negate
<source-negate> ] [ destination
<destination> ] [
destination-negate
<destination-negate> ] [ service
<service> ] [
service-negate
<service-negate> ] [ { [ category-name
<category-name> ] |
[ category-id
<category-id> ] } ] [ category-negate
<category-negate> ] [
comment
<comment> ] [ track
<track> ] [ disabled
<disabled> ]
Parameters
Parameter |
Description |
---|---|
category-id |
Application or custom application name |
category-name |
Application or custom application name |
category-negate |
If true, the category is all traffic except what is defined in the category field Type: Boolean (true/false) |
comment |
Description of the rule Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
disabled |
Indicates if the exception is disabled Type: Boolean (true/false) |
position |
The index of exception Type: Decimal number |
service |
The network service object that the exception should match to |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the source is all traffic except what is defined in the source field Type: Boolean (true/false) |
track |
The action taken when there is a match on the rule Options: none, log, alert |
Example
set ssl-inspection exception position 2 source TEXT source-negate true
destination TEXT destination-negate true service TEXT service-negate true
category-name TEXT category-negate true comment This is a comment. track none
disabled true
Output
Failure shows an appropriate error message.
Description
Show the configuration of a specific SSL Inspection policy exception.
Syntax
show ssl-inspection exception position
<position> position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The index of exception Type: Decimal number |
Example
show ssl-inspection exception position 2 position 2
Output
Failure shows an appropriate error message.
Description
Show all configured SSL Inspection policy exceptions.
Syntax
show ssl-inspection exceptions position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The index of exception Type: Decimal number |
Example
show ssl-inspection exceptions position 2
Output
Failure shows an appropriate error message.
Description
Configure SSL Inspection policy.
Syntax
set ssl-inspection policy [ mode
<mode> ] [ log-policy-bypass-traffic
<log-policy-bypass-traffic> ] [ log-inspected-traffic
<log-inspected-traffic>
] [ bypass-health-category-traffic
<bypass-health-category-traffic> ] [
bypass-government-and-military-category-traffic
<bypass-government-and-military-category-] [ bypass-banking-category-traffic <bypass-banking-category-traffic> ]
[ bypass-other-categories-traffic
<bypass-other-categories-traffic> ] [
bypass-streaming-category-traffic
<bypass-streaming-category-traffic> ] [
bypass-trusted-wireless-ssl-inspection
<bypass-trusted-wireless-ssl-inspection>
] [ bypass-untrusted-wireless-ssl-inspection
<bypass-untrusted-wireless-ssl-inspection>
] [ bypass-well-known-update-services
<bypass-well-known-update-services> ]
Parameters
Parameter |
Description |
---|---|
bypass-banking-category-traffic |
Bypass banking category traffic Type: Boolean (true/false) |
bypass-government-and-military-category-traffic |
Bypass government category traffic Type: Boolean (true/false) |
bypass-health-category-traffic |
Bypass health category traffic Type: Boolean (true/false) |
bypass-other-categories-traffic |
Bypass other categories traffic Type: Boolean (true/false) |
bypass-streaming-category-traffic |
Bypass streaming category traffic Type: Boolean (true/false) |
bypass-trusted-wireless-ssl-inspection |
Bypass SSL inspection on trusted wireless networks Type: Boolean (true/false) |
bypass-untrusted-wireless-ssl-inspection |
Bypass SSL inspection on untrusted wireless networks Type: Boolean (true/false) |
bypass-well-known-update-services |
Bypass HTTPS Inspection of traffic to well known software update services Type: Boolean (true/false) |
log-inspected-traffic |
Generates an SSL inspection log. You can see the logs of the security policy that is enforced on SSL traffic without enabling this feature. Type: Boolean (true/false) |
log-policy-bypass-traffic |
Generate an SSL bypass log for SSL traffic that was not inspected by SSL inspection Type: Boolean (true/false) |
mode |
Indicates if SSL inspection feature is active Type: Boolean (true/false) |
Example
set ssl-inspection policy mode true log-policy-bypass-traffic
true log-inspected-traffic true bypass-health-category-traffic true
bypass-government-and-military-category-traffic true bypass-banking-category-traffic
true bypass-other-categories-traffic true bypass-streaming-category-traffic
true bypass-trusted-wireless-ssl-inspection true bypass-untrusted-wireless-ssl-inspection
true bypass-well-known-update-services true
Output
Failure shows an appropriate error message.
Description
Show SSL Inspection policy.
Syntax
show ssl-inspection policy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ssl-inspection policy
Output
Failure shows an appropriate error message.
Description
Allow URL filtering for HTTPS sites and applications based on server's certificate without activating SSL traffic inspection.
Syntax
set ssl-inspection policy https-categorization-only-mode { on }
Parameters
Parameter |
Description |
---|---|
https-categorization-only-mode |
HTTPS categorization only cane be enabled via HTTPS service Type: Boolean (true/false) |
Example
set ssl-inspection policy https-categorization-only-mode true
Output
Failure shows an appropriate error message.
Description
Forces a manual deletion of the SSL network extender, thus forcing the gateway to re-download the latest version of the extender from the cloud.
Syntax
delete ssl-network-extender
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete ssl-network-extender
Output
Failure shows an appropriate error message.
Description
Adds a new manually configured routing rule.
Syntax
add static-route [ source
<source> ] [ service
<service> ] [ destination
<destination> ] [ nexthop gateway { logical
<logical> | ipv4-address
<ipv4-address> } ] [ metric
<metric> ]
Parameters
Parameter |
Description |
---|---|
destination |
IP address and subnet length of the destination of the packet in the format IP/subnet. e.g. 192.168.0.0/16 Type: An IP address with a mask length |
metric |
Metric Type: A number with no fractional part (integer) |
service |
Route service name Type: String |
source |
IP address and subnet length of the source of the packet in the format IP/subnet. e.g. 192.168.1.0/24 Type: An IP address with a mask length |
Example
add static-route source 172.15.47.0/24 service TEXT destination 172.15.47.0/24 nexthop gateway logical My_Network metric 10
Output
Failure shows an appropriate error message.
Description
Configures an existing manually configured route rule.
Syntax
set static-route
<id> [ source
<source> ] [ service
<service> ] [ destination
<destination> ] [ nexthop gateway { logical
<logical> |
ipv4-address
<ipv4-address> } ] [ metric
<metric> ] [ disabled
<disabled> ]
Parameters
Parameter |
Description |
---|---|
destination |
IP address and subnet length of the destination of the packet in the format IP/subnet. e.g. 192.168.0.0/16 Type: An IP address with a mask length |
disabled |
Is rule disabled Type: Boolean (true/false) |
id |
id Type: A number with no fractional part (integer) |
metric |
Metric Type: A number with no fractional part (integer) |
service |
Route service name Type: String |
source |
IP address and subnet length of the source of the packet in the format IP/subnet. e.g. 192.168.1.0/24 Type: An IP address with a mask length |
Example
set static-route 15 source 172.15.47.0/24 service TEXT destination 172.15.47.0/24 nexthop gateway logical My_Network metric 15 disabled true
Output
Failure shows an appropriate error message.
Description
Deletes a manually defined routing rule.
Syntax
delete static-route
<id>
Parameters
Parameter |
Description |
---|---|
id |
The rule order as shown in “show static-routes” Type: A number with no fractional part (integer) |
Example
delete static-route 3
Output
Failure shows an appropriate error message.
Description
Deletes all manually defined static routing rules.
Syntax
delete static-routes
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete static-routes
Output
Failure shows an appropriate error message.
Description
Shows all static routes.
Syntax
show static-routes
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show static-routes
Output
Failure shows an appropriate error message.
Configures the streaming engine settings.
Description
Configures the streaming engine settings.
Syntax
set streaming-engine-settings [ tcp-block-out-of-win-mon-only
<tcp-block-out-of-win-mon-only> ] [ tcp-block-out-of-win-track
<tcp-block-out-of-win-track> ] [ tcp-block-retrans-err-mon-only
<tcp-block-retrans-err-mon-only> ] [ tcp-block-retrans-err-track
<tcp-block-retrans-err-track> ] [ tcp-block-syn-retrans-mon-only
<tcp-block-syn-retrans-mon-only> ] [ tcp-block-syn-retrans-track
<tcp-block-syn-retrans-track> ] [ tcp-block-urg-bit-mon-only
<tcp-block-urg-bit-mon-only> ] [ tcp-block-urg-bit-track
<tcp-block-urg-bit-track>
] [ tcp-hold-timeout-mon-only
<tcp-hold-timeout-mon-only> ] [
tcp-hold-timeout-track
<tcp-hold-timeout-track> ] [ tcp-invalid-checksum-mon-only
<tcp-invalid-checksum-mon-only> ] [ tcp-invalid-checksum-track
<tcp-invalid-checksum-track> ] [ tcp-segment-limit-mon-only
<tcp-segment-limit-mon-only> ] [ tcp-segment-limit-track
<tcp-segment-limit-track>
Parameters
Parameter |
Description |
---|---|
tcp-block-out-of-win-mon-only |
TCP Out of Sequence activation mode Options: prevent, detect |
tcp-block-out-of-win-track |
TCP Out of Sequence tracking Options: none, log, alert |
tcp-block-retrans-err-mon-only |
TCP Invalid Retransmission activation mode Options: prevent, detect |
tcp-block-retrans-err-track |
TCP Invalid Retransmission tracking Options: none, log, alert |
tcp-block-syn-retrans-mon- only |
TCP SYN Modified Retransmission activation mode Options: prevent, detect |
tcp-block-syn-retrans-track |
TCP SYN Modified Retransmission tracking Options: none, log, alert |
tcp-block-urg-bit-mon-only |
TCP Urgent Data Enforcement activation mode Options: prevent, detect |
tcp-block-urg-bit-track |
TCP Urgent Data Enforcement tracking Options: none, log, alert |
tcp-hold-timeout-mon-only |
Stream Inspection Timeout activation mode Options: prevent, detect |
tcp-hold-timeout-track |
Stream Inspection Timeout tracking Options: none, log, alert |
tcp-invalid-checksum- mon-only |
TCP Invalid Checksum activation mode Options: prevent, detect |
tcp-invalid-checksum-track |
TCP Invalid Checksum tracking Options: none, log, alert |
tcp-segment-limit-mon-only |
TCP Segment Limit Enforcement activation mode Options: prevent, detect |
tcp-segment-limit-track |
TCP Segment Limit Enforcement tracking Options: none, log, alert |
Example
set streaming-engine-settings tcp-block-out-of-win-mon-only prevent
tcp-block-out-of-win-track none tcp-block-retrans-err-mon-only prevent tcp-block-retrans-err-track none tcp-block-syn-retrans-mon-only prevent tcp-block-syn-retrans-track none tcp-block-urg-bit-mon-only prevent tcp-block-urg-bit-track none tcp-hold-timeout-mon-only prevent tcp-hold-timeout-track none tcp-invalid-checksum-mon-only prevent
tcp-invalid-checksum-track none tcp-segment-limit-mon-only prevent tcp-segment-limit-track none
Output
Failure shows an appropriate error message.
Description
Configures the streaming engine settings.
Syntax
set streaming-engine-settings advanced-settings tcp-streaming-engine-setting-form [ tcp-block-urg-bit-track
<tcp-block-urg-bit-track> ] [ tcp-block-retrans-err-track
<tcp-block-retrans-err-track> ] [ tcp-block-syn-retrans-track
<tcp-block-syn-retrans-track> ] [ tcp-invalid-checksum-track
<tcp-invalid-checksum-track> ] [ tcp-block-out-of-win-mon-only
<tcp-block-out-of-win-mon-only> ] [ tcp-block-out-of-win-track
<tcp-block-out-of-win-track> ] [ tcp-block-retrans-err-mon-only
<tcp-block-retrans-err-mon-only> ] [ tcp-block-syn-retrans-mon-only
<tcp-block-syn-retrans-mon-only> ] [ tcp-invalid-checksum-mon-only
<tcp-invalid-checksum-mon-only> ] [ tcp-segment-limit-track
<tcp-segment-limit-track> ] [ tcp-block-urg-bit-mon-only
<tcp-block-urg-bit-mon-only>
] [ tcp-segment-limit-mon-only
<tcp-segment-limit-mon-only> ] [ tcp-hold-timeout-mon-only
<tcp-hold-timeout-mon-only> ] [ tcp-hold-timeout-track
<tcp-hold-timeout-track> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set streaming-engine-settings advanced-settings tcp-streaming-engine-setting-form tcp-block-urg-bit-track none tcp-block-retrans-err-track none
tcp-block-syn-retrans-track none tcp-invalid-checksum-track none
tcp-block-out-of-win-mon-only prevent tcp-block-out-of-win-track none tcp-block-retrans-err-mon-only prevent tcp-block-syn-retrans-mon-only prevent tcp-invalid-checksum-mon-only prevent tcp-segment-limit-track
none tcp-block-urg-bit-mon-only prevent tcp-segment-limit-mon-only prevent tcp-hold-timeout-mon-only prevent tcp-hold-timeout-track none
Output
Failure shows an appropriate error message.
Shows streaming engine settings.
Description
Shows streaming engine settings.
Syntax
show streaming-engine-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show streaming-engine-settings
Output
Failure shows an appropriate error message.
Description
Shows streaming engine advanced settings.
Syntax
show streaming-engine-settings advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show streaming-engine-settings advanced-settings
Output
Failure shows an appropriate error message.
Description
Adds a new Port-based VLAN switch object. The physical LAN ports can take part in a “switch” object which passes traffic between those ports in the hardware level (traffic doesn’t undergo inspection as it is not routed between those ports). In essence the “switch” combines physical LAN ports into a single network.
Syntax
add switch name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Name Type: A switch name should be LAN[1-8]_Switch |
Example
add switch name LAN2_Switch
Output
Failure shows an appropriate error message.
Description
Deletes a defined port-based VLAN switch object by name.
Syntax
delete switch
<name>
Parameters
Parameter |
Description |
---|---|
name |
Name Type: A switch name should be LAN[1-8]_Switch |
Example
delete switch LAN2_Switch
Output
Failure shows an appropriate error message.
Configures an existing port-based VLAN (switch).
Description
Add a physical port to an existing port-based VLAN (switch).
Syntax
set switch
<name> add port
<port>
Parameters
Parameter |
Description |
---|---|
name |
Name Type: A switch name should be LAN[1-8]_Switch |
port |
Name |
Example
set switch LAN2_Switch add port LAN4
Output
Failure shows an appropriate error message.
Description
Removes a physical port from an existing port-based VLAN (switch).
Syntax
set switch
<name> remove port
<port>
Parameters
Parameter |
Description |
---|---|
name |
Name Type: A switch name should be LAN[1-8]_Switch |
port |
Name |
Example
set switch LAN2_Switch remove port LAN4
Output
Failure shows an appropriate error message.
Shows port-based VLAN (switch) configuration.
Description
Shows port-based VLAN (switch) configuration.
Syntax
show switch
<name>
Parameters
Parameter |
Description |
---|---|
name |
Name Type: A switch name should be LAN[1-8]_Switch |
Example
show switch LAN2_Switch
Output
Failure shows an appropriate error message.
Description
Shows ports within a configured port-based VLAN (switch) configuration.
Syntax
show switch
<name> ports
Parameters
Parameter |
Description |
---|---|
name |
Name Type: A switch name should be LAN[1-8]_Switch |
Example
show switch LAN2_Switch ports
Output
Failure shows an appropriate error message.
Description
Shows all port-based VLANs (switches).
Syntax
show switches
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show switches
Output
Failure shows an appropriate error message.
Description
Adds a new external syslog server. The appliance can send its syslog information to multiple syslog servers and can also be configured to relay its security logs to external syslog servers.
Syntax
add syslog-server ipv4-address
<ipv4-address> [ port
<port> ] [ enabled
<enabled> ] name
<name> [ sent-logs
<sent-logs> ]
Parameters
Parameter |
Description |
---|---|
enabled |
Determine if an external System Log Server is active Type: Boolean (true/false) |
ipv4-address |
The desired external System Log Server IP address Type: IP address |
name |
System Log Server name Type: A string of alphanumeric characters with space between them |
port |
Port in the external System Log Server that receives the logs (default is 514) Type: Port number |
sent-logs |
Determine which logs types will be sent to the System Log Server Options: system-logs, security-logs, system-and-security-logs |
Example
add syslog-server ipv4-address 192.168.1.1 port 8080 enabled true name several words sent-logs system-logs
Output
Failure shows an appropriate error message.
Deletes a configured external syslog server.
Description
Deletes a configured external syslog server by IP address.
Syntax
delete syslog-server ipv4-address
<ipv4-address>
Parameters
Parameter |
Description |
---|---|
ipv4-address |
The desired external System Log Server IP address Type: IP address |
Example
delete syslog-server ipv4-address 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Deletes a configured external syslog server by name.
Syntax
delete syslog-server name
<name>
Parameters
Parameter |
Description |
---|---|
name |
System Log Server name Type: A string of alphanumeric characters with space between them |
Example
delete syslog-server name syslog_server_name
Output
Failure shows an appropriate error message.
Configure an existing syslog server's settings.
Description
Configure an existing syslog server’s settings by IP address.
Syntax
set syslog-server ipv4-address
<ipv4-address> [ ipv4-address
<ipv4-address>
] [ enabled
<enabled> ] [ name
<name> ] [ port
<port> ] [ sent-logs
<sent-logs> ]
Parameters
Parameter |
Description |
---|---|
enabled |
Determine if an external System Log Server is active Type: Boolean (true/false) |
ipv4-address |
The desired external System Log Server IP address Type: IP address |
name |
System Log Server name Type: A string of alphanumeric characters with space between them |
port |
Port in the external System Log Server that receives the logs (default is 514) Type: Port number |
sent-logs |
Determine which logs types will be sent to the System Log Server Options: system-logs, security-logs, system-and-security-logs |
Example
set syslog-server ipv4-address 192.168.1.1 ipv4-address 192.168.1.1 enabled
true name several words port 8080 sent-logs system-logs
Output
Failure shows an appropriate error message.
Description
Configure an existing syslog server’s settings by name.
Syntax
set syslog-server name
<name> [ ipv4-address
<ipv4-address> ] [ enabled
<enabled> ] [ name
<name> ] [ port
<port> ] [ sent-logs
<sent-logs> ]
Parameters
Parameter |
Description |
---|---|
enabled |
Determine if an external System Log Server is active Type: Boolean (true/false) |
ipv4-address |
The desired external System Log Server IP address Type: IP address |
name |
System Log Server name Type: A string of alphanumeric characters with space between them |
port |
Port in the external System Log Server that receives the logs (default is 514) Type: Port number |
sent-logs |
Determine which logs types will be sent to the System Log Server Options: system-logs, security-logs, system-and-security-logs |
Example
set syslog-server name several words ipv4-address 192.168.1.1 enabled true name several words port 8080 sent-logs system-logs
Output
Failure shows an appropriate error message.
Shows configuration of external syslog servers.
Description
Shows configuration of an external syslog server by IP address.
Syntax
show syslog-server ipv4-address
<ipv4-address>
Parameters
Parameter |
Description |
---|---|
ipv4-address |
The desired external System Log Server IP address Type: IP address |
Example
show syslog-server ipv4-address 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Shows configuration of an external syslog server by name.
Syntax
show syslog-server name
<name>
Parameters
Parameter |
Description |
---|---|
name |
System Log Server name Type: A string of alphanumeric characters with space between them |
Example
show syslog-server name several words
Output
Failure shows an appropriate error message.
Description
Shows configuration of all external syslog servers.
Syntax
show syslog-server all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show syslog-server all
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for Threat Prevention blades.
Syntax
set threat-prevention-advanced advanced-settings file-inspection-size-kb
<file-inspection-size-kb>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention-advanced advanced-settings file-inspection-size-kb
15000
Output
Failure shows an appropriate error message.
Description
Shows advanced settings for the Threat Prevention blades.
Syntax
show threat-prevention-advanced advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention-advanced advanced-settings
Output
Failure shows an appropriate error message.
Description
Configures the engine settings of the <tp_bot> blade.
Syntax
set threat-prevention anti-bot engine [ malicious-activity
<malicious-activity> ] [ reputation-domains
<reputation-domains> ] [ reputation-ips
<reputation-ips> ] [ reputation-urls
<reputation-urls> ] [ unusual-activity
<unusual-activity> ]
Parameters
Parameter |
Description |
---|---|
malicious-activity |
Indicates if the action upon detecting malicious activity will be according to the policy settings or a manually configured specific action Options: ask, prevent, detect, inactive, policy-action |
reputation-domains |
Indicates if the action upon detecting attempted access to domains with a bad reputation will be according to the policy or a manually configured specific action Options: ask, prevent, detect, inactive, policy-action |
reputation-ips |
Indicates if the action upon detecting attempted access to IP addresses with a bad reputation will be according to the policy or a manually configured specific action Options: ask, prevent, detect, inactive, policy-action |
reputation-urls |
Indicates if the action upon detecting attempted access to URLs with a bad reputation will be according to the policy or a manually configured specific action Options: ask, prevent, detect, inactive, policy-action |
unusual-activity |
Indicates if the action upon detecting unusual activity will be according to the policy or a manually configured specific action Options: ask, prevent, detect, inactive, policy-action |
Example
set threat-prevention anti-bot engine malicious-activity ask
reputation-domains ask reputation-ips ask reputation-urls ask unusual-activity ask
Output
Failure shows an appropriate error message.
Description
Shows the engine settings of the Anti-Bot blade.
Syntax
show threat-prevention anti-bot engine
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-bot engine
Output
Failure shows an appropriate error message.
Configures the policy of the Anti-Bot blade.
Description
Configures the policy of the Anti-Bot blade.
Syntax
set threat-prevention anti-bot policy [ mode
<mode> ] [ detect-mode
<detect-mode> ]
Parameters
Parameter |
Description |
---|---|
detect-mode |
Indicates if the Anti-Bot blade is set to ’Detect Only’ mode Type: Boolean (true/false) |
mode |
Indicates if the Anti-Bot blade is active Type: Boolean (true/false) |
Example
set threat-prevention anti-bot policy mode true detect-mode true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings of the Anti-Bot blade.
Syntax
set threat-prevention anti-bot policy advanced-settings res-class-mode
<res-class-mode>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention anti-bot policy advanced-settings res-class-mode rs-hold
Output
Failure shows an appropriate error message.
Shows the policy of the Anti-Bot blade.
Description
Shows the policy of the Anti-Bot blade.
Syntax
show threat-prevention anti-bot policy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-bot policy
Output
Failure shows an appropriate error message.
Description
Shows the advanced settings of the Anti-Bot blade.
Syntax
show threat-prevention anti-bot policy advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-bot policy advanced-settings
Output
Failure shows an appropriate error message.
Description
Configures a customizable “ask” message shown to users upon match on browser based traffic.
Syntax
set threat-prevention anti-bot user-check ask [ body
<body> ] [ activity-text
<activity-text> ] [ fallback-action
<fallback-action> ] [ frequency
<frequency> ] [ subject
<subject> ] [ title
<title> ] [ reason-displayed
<reason-displayed> ]
Parameters
Parameter |
Description |
---|---|
activity-text |
This text appears next to the ’ignore warning’ checkbox of an Anti-Bot ’Ask’ user message Type: A string that contains only printable characters |
body |
The informative text that appears in the Anti-Bot ’Ask’ user message Type: A string that contains only printable characters |
fallback-action |
Indicates the action to take when an ’Ask’ user message cannot be displayed Options: block, accept |
frequency |
Indicates how often is the Anti-Bot ’Ask’ user message is being presented to the same user Options: day, week, month |
reason-displayed |
Indicates if the user must enter a reason for ignoring this message in a designated text dialog Type: Boolean (true/false) |
subject |
The subject of an Anti-Bot ’Ask’ user message Type: A string that contains only printable characters |
title |
The title of an Anti-Bot ’Ask’ user message Type: A string that contains only printable characters |
Example
set threat-prevention anti-bot user-check ask body My Network activity-text My Network fallback-action block frequency day subject My Network title My Network reason-displayed true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the customizable “ask” message shown to users upon match on browser based traffic.
Syntax
show threat-prevention anti-bot user-check ask
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-bot user-check ask
Output
Failure shows an appropriate error message.
Description
Configures a customizable “block” message shown to users upon match on browser based traffic.
Syntax
set threat-prevention anti-bot user-check block [ body
<body> ] [ redirect-url
<redirect-url> ] [ subject
<subject> ] [ title
<title> ] [ redirect-to-url
<redirect-to-url> ]
Parameters
Parameter |
Description |
---|---|
body |
The informative text that appears in the Anti-Bot ’Block’ user message Type: A string that contains only printable characters |
redirect-to-url |
Indicates if the user will be redirected to a custom URL in case of a ’Block’ action Type: Boolean (true/false) |
redirect-url |
Indicates the URL to redirect the user in case of a ’Block’ action if configured to do so. The URL to redirect the user in case of a ’Block’ action. Redirection happens only if this functionality is turned on Type: urlWithHttp |
subject |
The subject of an Anti-Bot ’Block’ user message Type: A string that contains only printable characters |
title |
The title of an Anti-Bot ’Block’ user message Type: A string that contains only printable characters |
Example
set threat-prevention anti-bot user-check block body My Network
redirect-url urlWithHttp subject My Network title My Network redirect-to-url true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the customizable “block” message shown to users upon Anti-Bot match on browser based traffic.
Syntax
show threat-prevention anti-bot user-check block
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-bot user-check block
Output
Failure shows an appropriate error message.
Description
Configures the engine settings of the Anti-Virus blade
Syntax
set threat-prevention anti-virus engine [ urls-with-malware
<urls-with-malware> ] [ viruses
<viruses> ]
Parameters
Parameter |
Description |
---|---|
urls-with-malware |
Indicates if the action upon detecting access to and from URLs with a bad reputation will be according to the policy or a manually configured specific action Options: ask, prevent, detect, inactive, policy-action |
viruses |
Indicates if the action upon detecting viruses will be according to the policy or a manually configured specific action Options: ask, prevent, detect, inactive, policy-action |
Example
set threat-prevention anti-virus engine urls-with-malware ask viruses ask
Output
Failure shows an appropriate error message.
Description
Shows the engine settings of the Anti-Virus blade.
Syntax
show threat-prevention anti-virus engine
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-virus engine
Output
Failure shows an appropriate error message.
Description
Adds a new custom file type according to extension, to be handled by the Anti-Virus file type handling mechanism. An action for the Anti-Virus blade is also configured for this new custom file type.
Syntax
add threat-prevention anti-virus file-type extension
<extension> [ action
<action> ] [ description
<description> ]
Parameters
Parameter |
Description |
---|---|
action |
Indicates the action when the file type is detected Options: block, pass, scan |
description |
The file description Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
extension |
File extension that represents this file type Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
add threat-prevention anti-virus file-type extension “This is a comment.” action block description This is a comment.
Output
Failure shows an appropriate error message.
Description
Deletes a manually configured custom file type according to extension.
Syntax
delete threat-prevention anti-virus file-type extension
<extension>
Parameters
Parameter |
Description |
---|---|
extension |
File extension that represents this file type Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
delete threat-prevention anti-virus file-type extension pdf
Output
Failure shows an appropriate error message.
Description
Configure a specific action of the Anti-Virus blade for a specific file extension.
Syntax
set threat-prevention anti-virus file-type extension
<extension> [ action
<action> ] [ description
<description> ]
Parameters
Parameter |
Description |
---|---|
action |
Indicates the action when the file type is detected Options: block, pass, scan |
description |
The file description Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
extension |
File extension that represents this file type Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
set threat-prevention anti-virus file-type extension pdf action block description “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Shows the Anti-Virus blade configuration for a specific file type.
Syntax
show threat-prevention anti-virus file-type extension
<extension>
Parameters
Parameter |
Description |
---|---|
extension |
File extension that represents this file type Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
Example
show threat-prevention anti-virus file-type extension pdf
Output
Failure shows an appropriate error message.
Description
Shows the Anti-Virus blade configuration for all defined file types.
Syntax
show threat-prevention anti-virus file-types
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-virus file-types
Output
Failure shows an appropriate error message.
Description
Deletes all manually configured custom file types.
Syntax
delete threat-prevention anti-virus file-type custom all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete threat-prevention anti-virus file-type custom all
Output
Failure shows an appropriate error message.
Configures the policy of the Anti-Virus blade.
Description
Configures the policy of the Anti-Virus blade.
Syntax
set threat-prevention anti-virus policy [ mode
<mode> ] [ detect-mode
<detect-mode> ] [ scope
<scope> [ interfaces
<interfaces> ] ] [ protocol-http
<protocol-http> ] [ protocol-mail
<protocol-mail> ] [ protocol-ftp
<protocol-ftp> ] [ file-types-policy
<file-types-policy> ]
Parameters
Parameter |
Description |
---|---|
detect-mode |
Indicates if the Anti-Virus blade is set to ’Detect Only’ mode Type: Boolean (true/false) |
file-types-policy |
Indicates the file types that are inspected by the Anti-Virus blade: malware (known to contain malware), all (all file types), specific (configured file families) Options: malware, all-types, specific-families |
interfaces |
Indicates the source zones for inspected incoming files: External, External and DMZ or all interfaces Options: all, external, external-dmz |
mode |
Indicates if the Anti-Virus blade is active Type: Boolean (true/false) |
protocol-ftp |
Indicates if Anti-Virus inspection will be performed on FTP traffic Type: Boolean (true/false) |
protocol-http |
Indicates if Anti-Virus inspection will be performed on all configured ports of HTTP traffic Type: Boolean (true/false) |
protocol-mail |
Indicates if Anti-Virus inspection will be performed on mail traffic (SMTP and POP3) Type: Boolean (true/false) |
scope |
Indicates the source of scanned filed: Scan incoming files, or scan both incoming and outgoing files Options: incoming, incoming-and-outgoing |
Example
set threat-prevention anti-virus policy mode true detect-mode true scope incoming interfaces all protocol-http true protocol-mail true protocol-ftp true file-types-policy malware
Output
Failure shows an appropriate error message.
Description
Configures advanced settings of the Anti-Virus blade.
Syntax
set threat-prevention anti-virus policy advanced-settings priority-scanning
<priority-scanning>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention anti-virus policy advanced-settings priority-scanning true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings of the Anti-Virus blade.
Syntax
set threat-prevention anti-virus policy advanced-settings file-scan-size-kb
<file-scan-size-kb>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention anti-virus policy advanced-settings file-scan-size-kb
15000
Output
Failure shows an appropriate error message.
Description
Configures advanced settings of the Anti-Virus blade.
Syntax
set threat-prevention anti-virus policy advanced-settings max-nesting-level
<max-nesting-level>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention anti-virus policy advanced-settings max-nesting-level
2
Output
Failure shows an appropriate error message.
Description
Configures advanced settings of the Anti-Virus blade.
Syntax
set threat-prevention anti-virus policy advanced-settings
action-when-nesting-level-exceeded
<action-when-nesting-level-exceeded>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention anti-virus policy advanced-settings action-when-nesting-level-exceeded allow
Output
Failure shows an appropriate error message.
Description
Configures advanced settings of the Anti-Virus blade.
Syntax
set threat-prevention anti-virus policy advanced-settings res-class-mode
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention anti-virus policy advanced-settings res-class-mode rs-hold
Output
Failure shows an appropriate error message.
Shows the policy for the Anti-Virus blade.
Description
Shows the policy for the Anti-Virus blade.
Syntax
show threat-prevention anti-virus policy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-virus policy
Output
Failure shows an appropriate error message.
Description
Shows advanced settings for the Anti-Virus blade.
Syntax
show threat-prevention anti-virus policy advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-virus policy advanced-settings
Output
Failure shows an appropriate error message.
Description
Configures a customizable “ask” message shown to users upon match on browser based traffic.
Syntax
set threat-prevention anti-virus user-check ask [ body
<body> ] [ activity-text
<activity-text> ] [ fallback-action
<fallback-action> ] [ frequency
<frequency> ] [ subject
<subject> ] [ title
<title> ] [ reason-displayed
<reason-displayed> ]
Parameters
Parameter |
Description |
---|---|
activity-text |
This text appears next to the ’ignore warning’ checkbox of an Anti-Virus ’Ask’ user message Type: A string that contains only printable characters |
body |
The informative text that appears in the Anti-Virus ’Ask’ user message Type: A string that contains only printable characters |
fallback-action |
Indicates the action to take when an ’Ask’ user message cannot be displayed Options: block, accept |
frequency |
Indicates how often is the Anti-Virus ’Ask’ user message is being presented to the same user Options: day, week, month |
reason-displayed |
Indicates if the user must enter a reason for ignoring this message in a designated text dialog Type: Boolean (true/false) |
subject |
The subject of an Anti-Virus ’Ask’ user message Type: A string that contains only printable characters |
title |
The title of an Anti-Virus ’Ask’ user message Type: A string that contains only printable characters |
Example
set threat-prevention anti-virus user-check ask body My Network activity-text My Network fallback-action block frequency day subject My Network title My Network reason-displayed true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the customizable “ask” message shown to users upon Anti-Virus match on browser based traffic.
Syntax
show threat-prevention anti-virus user-check ask
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-virus user-check ask
Output
Failure shows an appropriate error message.
Description
Configures a customizable “block” message shown to users upon match on browser based traffic.
Syntax
set threat-prevention anti-virus user-check block [ body
<body> ] [ redirect-url
<redirect-url> ] [ subject
<subject> ] [ title
<title> ] [ redirect-to-url
<redirect-to-url> ]
Parameters
Parameter |
Description |
---|---|
body |
The informative text that appears in the Anti-Virus ’Block’ user message Type: A string that contains only printable characters |
redirect-to-url |
Indicates if the user will be redirected to a custom URL in case of a ’Block’ action Type: Boolean (true/false) |
redirect-url |
Indicates the URL to redirect the user in case of a ’Block’ action if configured to do so. The URL to redirect the user in case of a ’Block’ action. Redirection happens only if this functionality is turned on Type: urlWithHttp |
subject |
The subject of an Anti-Virus ’Block’ user message Type: A string that contains only printable characters |
title |
The title of an Anti-Virus ’Block’ user message Type: A string that contains only printable characters |
Example
set threat-prevention anti-virus user-check block body My Network redirect-url urlWithHttp subject My Network title My Network redirect-to-url true
Output
Failure shows an appropriate error message.
Description
Shows the settings of the customizable “block” message shown to users upon Anti-Virus match on browser based traffic.
Syntax
show threat-prevention anti-virus user-check block
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention anti-virus user-check block
Output
Failure shows an appropriate error message.
Description
Adds a new exception rule for Threat Prevention Anti-Virus, Anti-Bot and Threat Emulation (where applicable) blades.
Syntax
add threat-prevention exception [ comment
<comment> ] [ scope
<scope> ] protection
<protection> action
<action> log
<log> [ name
<name> ]
Parameters
Parameter |
Description |
---|---|
action |
The action taken when there is a match on the rule Options: ask, prevent, detect, inactive |
comment |
Additional description for the exception Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
log |
The logging method used when there is a match on the rule: None - do not log, Log - Create log, Alert - log with alert Options: none, log, alert |
name |
The name of the exception Type: A string of alphanumeric characters without space between them |
protection |
The blade to which the exception applies: Anti-Virus, Anti-Bot or both Options: any, any-av, any-ab |
scope |
IP address, network object or user group that the exception applies to |
Example
add threat-prevention exception comment “This is a comment.” scope TEXT protection any action ask log none name word
Output
Failure shows an appropriate error message.
Description
Deletes an existing threat prevention exception rule by name.
Syntax
delete threat-prevention exception name
<name>
Parameters
Parameter |
Description |
---|---|
name |
The name of the exception Type: A string of alphanumeric characters without space between them |
Example
delete threat-prevention exception name word
Output
Failure shows an appropriate error message.
Description
Configures an existing exception rule for the Threat Prevention blades by name.
Syntax
set threat-prevention exception name
<name> [ comment
<comment> ] [ scope
<scope> ] [ protection
<protection> ] [ action
<action> ] [ log
<log> ] [ new-name
<new-name> ]
Parameters
Parameter |
Description |
---|---|
action |
The action taken when there is a match on the rule Options: ask, prevent, detect, inactive |
comment |
Additional description for the exception Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . -: () @ |
log |
The logging method used when there is a match on the rule: None - do not log, Log - Create log, Alert - log with alert Options: none, log, alert |
name |
The name of the exception Type: A string of alphanumeric characters without space between them |
new-name |
The name of the exception Type: A string of alphanumeric characters without space between them |
protection |
The blade to which the exception applies: Anti-Virus, Anti-Bot or both Options: any, any-av, any-ab |
scope |
IP address, network object or user group that the exception applies to |
Example
set threat-prevention exception name word comment “This is a comment.” scope TEXT protection any action ask log none new-name word
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a specific tThreat Prevention exception rule by name.
Syntax
show threat-prevention exception name
<name>
Parameters
Parameter |
Description |
---|---|
name |
The name of the exception Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other rules Type: Decimal number |
Example
show threat-prevention exception name word
Output
Failure shows an appropriate error message.
Description
Deletes all existing Threat Prevention exception rules for Anti-Virus, Anti-Bot and Threat Emulation (where applicable).
Syntax
delete threat-prevention exceptions all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete threat-prevention exceptions all
Output
Failure shows an appropriate error message.
Description
Deletes an existing Threat Prevention exception rule for Anti-Virus, Anti-Bot and Threat Emulation (where applicable) by position.
Syntax
delete threat-prevention exception position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of the rule in comparison to other rules Type: Decimal number |
Example
delete threat-prevention exception position 2
Output
Failure shows an appropriate error message.
Description
Configures an existing exception rule for the Threat Prevention blades by position.
Syntax
set threat-prevention exception position
<position> [ comment
<comment> ] [ scope
<scope> ] [ protection
<protection> ] [ action
<action> ] [ log
<log> ] [ new-name
<new-name> ]
Parameters
Parameter |
Description |
---|---|
action |
The action taken when there is a match on the rule Options: ask, prevent, detect, inactive |
comment |
Additional description for the exception Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
log |
The logging method used when there is a match on the rule: None - do not log, Log - Create log, Alert - log with alert Options: none, log, alert |
new-name |
The name of the exception Type: A string of alphanumeric characters without space between them |
position |
The order of the rule in comparison to other rules Type: Decimal number |
protection |
The blade to which the exception applies: Anti-Virus, Anti-Bot or both Options: any, any-av, any-ab |
scope |
IP address, network object or user group that the exception applies to |
Example
set threat-prevention exception position 2 comment “This is a comment.” scope TEXT protection any action ask log none new-name word
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a specific threat prevention exception rule by position.
Syntax
show threat-prevention exception position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of the rule in comparison to other rules Type: Decimal number |
Example
show threat-prevention exception position 2
Output
Failure shows an appropriate error message.
Description
Shows a list of infected hosts detected by Threat Prevention blades.
Syntax
show threat-prevention infected-hosts
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention infected-hosts
Output
Failure shows an appropriate error message.
Description
Configures the default policy of the IPS blade.
Syntax
set threat-prevention ips custom-default-policy [ server-protections
<server-protections> ] [ client-protections
<client-protections> ] [ disable-by-confidence-level
<disable-by-confidence-level > ] [
disable-confidence-level-below-or-equal
<disable-confidence-level-below-or-equal>
] [ disable-by-severity
<disable-by-severity> ] [ disable-severity-below-or-equal
<disable-severity-below-or-equal> ] [ disable-by-performance-impact
<disable-by-performance-impact> ] [ disable-performance-impact-above-or-equal
<disable-performance-impact-above-or-equal> ] [ disable-protocol-anomalies
<disable-protocol-anomalies> ]
Parameters
Parameter |
Description |
---|---|
client-protections |
Indicates if Client protections are active by default Type: Boolean (true/false) |
disable-by-confidence-level |
Indicates if protections will be deactivated if their confidence level is below or equal configured level Type: Boolean (true/false) |
disable-by-performance-impact |
Indicates if protections will be deactivated if their performance impact is above or equal configured level Type: Boolean (true/false) |
disable-by-severity |
Indicates if protections will be deactivated if their severity is below or equal configured level Type: Boolean (true/false) |
disable-confidence-level-below -or-equal |
If configured, protections will be deactivated according to this confidence level Options: Low, Medium-low, Medium, Medium-high, High |
disable-performance-impact -above-or-equal |
If configured, protections will be deactivated according to this performance impact level Options: Very-low, Low, Medium, High |
disable-protocol-anomalies |
Do not activate protocol anomaly detection signatures Type: Boolean (true/false) |
disable-severity-below-or -equal |
If configured, protections will be deactivated according to this severity level Options: Low, Medium, High, Critical |
server-protections |
Indicates if Server protections are active by default Type: Boolean (true/false) |
Example
set threat-prevention ips custom-default-policy server-protections true client-protections true disable-by-confidence-level true
disable-confidence-level-below-or-equal Low disable-by-severity true disable-severity-below-or-equal Low disable-by-performance-impact true
disable-performance-impact-above-or-equal Very-low disable-protocol-anomalies true
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a custom IPS policy.
Syntax
show threat-prevention ips custom-default-policy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention ips custom-default-policy
Output
Failure shows an appropriate error message.
Adds a new exception rule for the IPS blade.
Description
Adds a new exception rule for the IPS blade. To create exceptions for specific protections use protection name.
Syntax
add threat-prevention ips network-exception protection-name
<protection-name> [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [ service-negate
<service-negate>
] [ source
<source> ] [ source-negate
<source-negate> ] [ comment
<comment> ]
Parameters
Parameter |
Description |
---|---|
comment |
Comment on the IPS Network exception Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
protection-name |
Indicates if the exception rule will be matched on all IPS protections or a specific one |
service |
Type of network service that is under exception |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
Example
add threat-prevention ips network-exception protection-name word destination TEXT destination-negate true service TEXT service-negate true source TEXT source-negate true comment “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Adds a new exception rule for the IPS blade. To create exceptions for specific protections use protection code.
Syntax
add threat-prevention ips network-exception [ protection-code
<protection-code> ] [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [ service-negate
<service-negate>
] [ source
<source> ] [ source-negate
<source-negate> ] [ comment
<comment> ]
Parameters
Parameter |
Description |
---|---|
comment |
Comment on the IPS Network exception Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
protection-code |
Indicates if the exception rule will be matched on all IPS protections or a specific one |
service |
Type of network service that is under exception |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
Example
add threat-prevention ips network-exception protection-code 123435 destination TEXT destination-negate true service TEXT service-negate true source TEXT source-negate true comment “This is a comment.”
Output
Failure shows an appropriate error message.
Deletes exception rules to bypass IPS protections for specific traffic.
Description
Deletes an existing exception rule for the IPS blade by position.
Syntax
delete threat-prevention ips network-exception position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of the rule in the Rule Base Type: Decimal number |
Example
delete threat-prevention ips network-exception position 2
Output
Failure shows an appropriate error message.
Description
Deletes all existing exception rules for the IPS blade.
Syntax
delete threat-prevention ips network-exception all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete threat-prevention ips network-exception all
Output
Failure shows an appropriate error message.
Configure exception rules to bypass IPS protections for specific traffic.
Description
Configure an existing exception rule to the IPS blade by position for a specific protection by protection ID (Code).
Syntax
set threat-prevention ips network-exception position
<position> [ protection-code
<protection-code> ] [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [
service-negate
<service-negate> ] [ source
<source> ] [ source-negate
<source-negate> ] [ comment
<comment> ]
Parameters
Parameter |
Description |
---|---|
comment |
Comment on the IPS Network exception Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . -: () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
position |
The order of the rule in the Rule Base Type: Decimal number |
protection-code |
Indicates if the exception rule will be matched on all IPS protections or a specific one |
service |
Type of network service that is under exception |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
Example
set threat-prevention ips network-exception position 2 protection-code
12345678 destination TEXT destination-negate true service TEXT service-negate true source TEXT source-negate true comment “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Configure an existing exception rule to the IPS blade by position for a specific protection by protection name.
Syntax
set threat-prevention ips network-exception position
<position> protection-name
<protection-name> [ destination
<destination> ] [ destination-negate
<destination-negate> ] [ service
<service> ] [ service-negate
<service-negate> ] [ source
<source> ] [ source-negate
<source-negate> ] [ comment
<comment> ]
Parameters
Parameter |
Description |
---|---|
comment |
Comment on the IPS Network exception Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
destination |
Network object that is the target of the connection |
destination-negate |
If true, the destination is all traffic except what is defined in the destination field Type: Boolean (true/false) |
position |
The order of the rule in the Rule Base Type: Decimal number |
protection-name |
Indicates if the exception rule will be matched on all IPS protections or a specific one |
service |
Type of network service that is under exception |
service-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
source |
Network object or user group that initiates the connection |
source-negate |
If true, the service is everything except what is defined in the service field Type: Boolean (true/false) |
Example
set threat-prevention ips network-exception position 2 protection-name word destination TEXT destination-negate true service TEXT service-negate true source TEXT source-negate true comment “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Shows the configuration of an IPS exception rule by position
Syntax
show threat-prevention ips network-exception position
<position>
Parameters
Parameter |
Description |
---|---|
position |
The order of the rule in the Rule Base Type: Decimal number |
Example
show threat-prevention ips network-exception position 2
Output
Failure shows an appropriate error message.
Description
Configures general settings in the policy of the IPS blade.
Syntax
set threat-prevention ips policy [ mode
<mode> ] [ log
<log> ] [ default-policy
<default-policy> ] [ detect-mode
<detect-mode> ]
Parameters
Parameter |
Description |
---|---|
default-policy |
The type of policy used for IPS - strict, typical or custom |
detect-mode |
Indicates if the default policy of IPS is to only logs events and not block them Type: Boolean (true/false) |
log |
Indicates the tracking level for IPS - none, block or alert Options: none, log, alert |
mode |
Indicates if IPS blade is active Type: Boolean (true/false) |
Example
set threat-prevention ips policy mode true log none default-policy word detect-mode true
Output
Failure shows an appropriate error message.
Description
Shows the policy of the IPS blade.
Syntax
show threat-prevention ips policy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention ips policy
Output
Failure shows an appropriate error message.
Description
Find an IPS protection by name (or partial string) to view further details regarding it.
Syntax
find threat-prevention ips protection
<name>
Parameters
Parameter |
Description |
---|---|
name |
The name of the IPS topic Type: A string of alphanumeric characters without space between them |
Example
find threat-prevention ips protection word
Output
Failure shows an appropriate error message.
Configures actions to override the IPS policy for a specific IPS protection.
Description
Enable/Disable an action override for a specific IPS protection by protection ID (code).
Syntax
set threat-prevention ips protection-action-override protection-code
<protection-code> [ action
<action> ] [ track
<track> ]
Parameters
Parameter |
Description |
---|---|
action |
Indicates the manually configured action for this protection |
protection-code |
The IPS topic the override belongs to. Every override belongs to a single topic Type: A number with no fractional part. Values are between 4,503,599,627,370,495 to 4,503,599,627,370,495 |
track |
Indicates the manually configured tracking option for this protection |
Example
set threat-prevention ips protection-action-override protection-code
12345678 action prevent track none
Output
Failure shows an appropriate error message.
Description
Configures an action override for a specific IPS protection by name.
Syntax
set threat-prevention ips protection-action-override protection-name
<protection-name> [ action
<action> ] [ track
<track> ]
Parameters
Parameter |
Description |
---|---|
action |
Indicates the manually configured action for this protection |
protection-name |
The name of the IPS topic Type: A string of alphanumeric characters without space between them |
track |
Indicates the manually configured tracking option for this protection |
Example
set threat-prevention ips protection-action-override protection-name word action prevent track none
Output
Failure shows an appropriate error message.
Description
Configures an action override for a specific IPS protection by protection ID (code).
Syntax
set threat-prevention ips protection-action-override protection-code
<protection-code> override-policy-action
<override-policy-action>
Parameters
Parameter |
Description |
---|---|
override-policy-action |
Indicates if the action upon detection will be according to the general IPS policy or manually configured for this protection Type: Boolean (true/false) |
protection-code |
The IPS topic the override belongs to. Every override belongs to a single topic Type: A number with no fractional part. Values are between 4,503,599,627,370,495 to 4,503,599,627,370,495 |
Example
set threat-prevention ips protection-action-override protection-code
12345678 override-policy-action true
Output
Failure shows an appropriate error message.
Description
Enable/Disable an action override for a specific IPS protection by name.
Syntax
set threat-prevention ips protection-action-override protection-name
<protection-name> override-policy-action
<override-policy-action>
Parameters
Parameter |
Description |
---|---|
override-policy-action |
Indicates if the action upon detection will be according to the general IPS policy or manually configured for this protection Type: Boolean (true/false) |
protection-name |
The name of the IPS topic Type: A string of alphanumeric characters without space between them |
Example
set threat-prevention ips protection-action-override protection-name word override-policy-action true
Output
Failure shows an appropriate error message.
Shows action overrides for specific IPS protections.
Description
Shows action overrides for a specific IPS protection by protection ID (code).
Syntax
show threat-prevention ips protection-action-override protection-code
<protection-code>
Parameters
Parameter |
Description |
---|---|
protection-code |
The IPS topic the override belongs to. Every override belongs to a single topic Type: A number with no fractional part. Values are between 4,503,599,627,370,495 to 4,503,599,627,370,495 |
Example
show threat-prevention ips protection-action-override protection-code 12345678
Output
Failure shows an appropriate error message.
Description
Shows action overrides for a specific IPS protection by protection name.
Syntax
show threat-prevention ips protection-action-override protection-name
<protection-name>
Parameters
Parameter |
Description |
---|---|
protection-name |
The name of the IPS topic Type: A string of alphanumeric characters without space between them |
Example
show threat-prevention ips protection-action-override protection-name word
Output
Failure shows an appropriate error message.
Configures the policy for the Threat Prevention blades Anti-Virus, Anti-Bot, and Threat Emulation (where applicable).
Description
Configures the policy for the Threat Prevention blades Anti-Virus, Anti-Bot and Threat Emulation (where applicable).
Syntax
set threat-prevention policy [ high-confidence
<high-confidence> ] [ medium-confidence
<medium-confidence> ] [ low-confidence
<low-confidence> ] [ performance-impact
<performance-impact> ] [ track
<track> ]
Parameters
Parameter |
Description |
---|---|
high-confidence |
Indicates the default action for Threat Prevention protections with a high confidence level Options: ask, prevent, detect, inactive |
low-confidence |
Indicates the default action for Threat Prevention protections with a low confidence level Options: ask, prevent, detect, inactive |
medium-confidence |
Indicates the default action for Threat Prevention protections with a medium confidence level Options: ask, prevent, detect, inactive |
performance-impact |
Indicates the allowed performance impact of active Threat Prevention protections by default Options: low, medium, high |
track |
Tracking options for Threat Prevention protections: None - do not log, Log -Create log, Alert - log with alert Options: none, log, alert |
Example
set threat-prevention policy high-confidence ask medium-confidence ask low-confidence ask performance-impact low track none
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for the Threat Prevention blades Anti-Virus, Anti-Bot and Threat Emulation (where applicable).
Syntax
set threat-prevention policy advanced-settings fail-mode
<fail-mode>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention policy advanced-settings fail-mode allow-all-requests
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for the Threat Prevention blades Anti-Virus, Anti-Bot and Threat Emulation (where applicable).
Syntax
set threat-prevention policy advanced-settings block-requests-when-the-web-service-is-
<block-requests-when-the-web-service-is-unavailable>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention policy advanced-settings block-requests-when-the-web-service-is true
Output
Failure shows an appropriate error message.
Shows the configuration for the Threat Prevention policy shared by the Anti-Bot, Anti-Virus and Threat Emulation (where applicable) blades.
Description
Shows the configuration for the Threat Prevention policy shared by the Anti-Bot, Anti-Virus and Threat Emulation (where applicable) blades.
Syntax
show threat-prevention policy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention policy
Output
Failure shows an appropriate error message.
Description
Shows advanced settings for the Threat Prevention policy shared by the Anti-Bot, Anti-Virus and Threat Emulation (where applicable) blades.
Syntax
show threat-prevention policy advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention policy advanced-settings
Output
Failure shows an appropriate error message.
Description
Add a gateway to the threat emulation list of additional (private) emulation gateways.
Syntax
add threat-prevention threat-emulation additional-remote-emulator ip-address
<ip-address> name
<name>
Parameters
Parameter |
Description |
---|---|
ip-address |
Remote emulation gateway IP address Type: IP address |
name |
Remote emulation gateway name Type: A string of alphanumeric characters with space between them |
Example
add threat-prevention threat-emulation additional-remote-emulator ip-address 192.168.1.1 name several words
Output
Failure shows an appropriate error message.
Delete a gateway from the threat emulation list of additional (private) emulation gateways.
Description
Delete a gateway from the threat emulation list of additional (private) emulation gateways.
Syntax
delete threat-prevention threat-emulation additional-remote-emulator
ip-address
<ip-address>
Parameters
Parameter |
Description |
---|---|
ip-address |
Remote emulation gateway IP address Type: IP address |
Example
delete threat-prevention threat-emulation additional-remote-emulator
ip-address 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Delete a gateway from the threat emulation list of additional (private) emulation gateways.
Syntax
delete threat-prevention threat-emulation additional-remote-emulator name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Remote emulation gateway name Type: A string of alphanumeric characters with space between them |
Example
delete threat-prevention threat-emulation additional-remote-emulator name
several words
Output
Failure shows an appropriate error message.
Description
Configure a gateway as an additional (private) emulation gateway.
Syntax
set threat-prevention threat-emulation additional-remote-emulator name
<name> [ ip-address
<ip-address> ] [ name <name> ]
Parameters
Parameter |
Description |
---|---|
ip-address |
Remote emulation gateway IP address Type: IP address |
name |
Remote emulation gateway name Type: A string of alphanumeric characters with space between them |
Example
textset threat-prevention threat-emulation additional-remote-emulator name several words ip-address 192.168.1.1 name several words
Output
Failure shows an appropriate error message.
Show all gateways that are configured as additional (private) emulation gateways.
Description
Show all gateways that are configured as additional (private) emulation gateways.
Syntax
show threat-prevention threat-emulation additional-remote-emulator
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention threat-emulation additional-remote-emulator
Output
Failure shows an appropriate error message.
Description
Show all gateways that are configured as additional (private) emulation gateways.
Syntax
show threat-prevention threat-emulation additional-remote-emulator name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Remote emulation gateway name Type: A string of alphanumeric characters with space between them |
Example
show threat-prevention threat-emulation additional-remote-emulator name several words
Output
Failure shows an appropriate error message.
Description
Reverts all actions on specific file types to their default value in the factory settings.
Syntax
set threat-prevention threat-emulation file-types-revert-actions-to-default
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention threat-emulation file-types-revert-actions-to-default
Output
Failure shows an appropriate error message.
Description
Configures an override action for a specific file type by the Threat Emulation blade (where applicable).
Syntax
set threat-prevention threat-emulation file-type
<extension> [ action
<action> ] [ description
<description> ]
Parameters
Parameter |
Description |
---|---|
action |
Indicates the action when the file type is detected Options: bypass, inspect |
description |
The file description Type: A string that contains less than 257 characters, of this set: 0-9, a-z or , . - : () @ |
extension |
File extension that represents this file type Type: A string of alphanumeric characters without space between them |
Example
set threat-prevention threat-emulation file-type word action bypass description “This is a comment.”
Output
Failure shows an appropriate error message.
Description
Shows the Threat Emulation (where applicable) configuration for a specific file type.
Syntax
show threat-prevention threat-emulation file-type
<extension>
Parameters
Parameter |
Description |
---|---|
extension |
File extension that represents this file type Type: A string of alphanumeric characters without space between them |
Example
show threat-prevention threat-emulation file-type word
Output
Failure shows an appropriate error message.
Description
Shows the Threat Emulation (where applicable) configuration for all specific file types.
Syntax
show threat-prevention threat-emulation file-types
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention threat-emulation file-types
Output
Failure shows an appropriate error message.
Configures a policy specific to the Threat Emulation blade (where applicable).
Description
Configures policy settings for the Threat Emulation blade (where applicable).
Syntax
set threat-prevention threat-emulation policy [ mode
<mode> ] [ detect-mode
<detect-mode> ] [ scope
<scope> ] [ interfaces
<interfaces>
] [ protocol-http
<protocol-http> ] [ protocol-mail <protocol-mail> ] [ connection-handling-mode-http
<connection-handling-mode-http> ] [ connection-handling-mode-smtp
<connection-handling-mode-smtp> ]
Parameters
Parameter |
Description |
---|---|
connection-handling- mode-http |
Indicates the strictness mode of the Threat Emulation engine over HTTP: Back-ground - connections are allowed while the file emulation runs (if needed), Hold - connections are blocked until the file emulation is completed Options: background, hold |
connection-handling- mode-smtp |
Indicates the strictness mode of the Threat Emulation engine over SMTP: Back-ground - connections are allowed while the file emulation runs (if needed), Hold - connections are blocked until the file emulation is completed Options: background, hold |
detect-mode |
Indicates if the Threat Emulation blade is set to ’Detect Only’ mode Type: Boolean (true/false) |
interfaces |
Indicates the source zones for inspected incoming files: External, External and DMZ or all interfaces Options: all, external, external-dmz |
mode |
Indicates if the Threat Emulation blade is active Type: Boolean (true/false) |
protocol-http |
Indicates if file emulation will be performed on all configured ports of HTTP traffic Type: Boolean (true/false) |
protocol-mail |
Indicates if file emulation will be performed on mail traffic (SMTP) Type: Boolean (true/false) |
scope |
Indicates the source of scanned file: scan incoming files, or scan both incoming and outgoing files Options: incoming, incoming-and-outgoing |
Example
set threat-prevention threat-emulation policy mode true detect-mode true scope incoming interfaces all protocol-http true protocol-mail true connection-handling-mode-http background connection-handling-mode-smtp background
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for the Threat Emulation blade (where applicable).
Syntax
set threat-prevention threat-emulation policy advanced-settings connection-handling-mode-smtp
<connection-handling-mode-smtp>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set threat-prevention threat-emulation policy advanced-settings connection-handling-mode-smtp background
Output
Failure shows an appropriate error message.
Shows the policy of the Threat Emulation policy.
Description
Shows the policy of the Threat Emulation policy.
Syntax
show threat-prevention threat-emulation policy
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention threat-emulation policy
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of the Threat Emulation policy.
Syntax
show threat-prevention threat-emulation policy advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention threat-emulation policy advanced-settings
Output
Failure shows an appropriate error message.
Description
Adds a new excluded mail addresses for the Threat Emulation blade (where applicable).
Syntax
add threat-prevention whitelist mail email-address
<email-address> [ type
<type> ]
Parameters
Parameter |
Description |
---|---|
email-address |
The email address of the recipient or sender Type: Email address |
type |
The type of the email address - recipient, sender or both Options: recipient, sender, both |
Example
add threat-prevention whitelist mail email-address MyEmail@mail.com type recipient
Output
Failure shows an appropriate error message.
Description
Shows the list of whitelist files (md5sum) for the Threat Prevention blades.
Syntax
show threat-prevention whitelist files
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention whitelist files
Output
Failure shows an appropriate error message.
Description
Deletes an excluded mail address for the Threat Emulation blade (where applicable).
Syntax
delete threat-prevention whitelist mail
<email-address>
Parameters
Parameter |
Description |
---|---|
email-address |
The email address of the recipient or sender Type: Email address |
Example
delete threat-prevention whitelist mail MyEmail@mail.com
Output
Failure shows an appropriate error message.
Description
Configures excluded mail addresses for the Threat Emulation blade (where applicable).
Syntax
set threat-prevention whitelist mail
<email-address> type
<type>
Parameters
Parameter |
Description |
---|---|
email-address |
The email address of the recipient or sender Type: Email address |
type |
The type of the email address - recipient, sender or both Options: recipient, sender, both |
Example
set threat-prevention whitelist mail MyEmail@mail.com type recipient
Output
Failure shows an appropriate error message.
Description
Shows the setting for a whitelist email address set for the Threat Prevention blades.
Syntax
show threat-prevention whitelist mail
<email-address>
Parameters
Parameter |
Description |
---|---|
email-address |
The email address of the recipient or sender Type: Email address |
Example
show threat-prevention whitelist mail MyEmail@mail.com
Output
Failure shows an appropriate error message.
Description
Deletes all excluded mail addresses for the Threat Emulation blade (where applicable).
Syntax
delete threat-prevention whitelist mails all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete threat-prevention whitelist mails all
Output
Failure shows an appropriate error message.
Description
Shows the whitelist email addresses set for the Threat Prevention blades.
Syntax
show threat-prevention whitelist mails
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention whitelist mails
Output
Failure shows an appropriate error message.
Description
Adds a new excluded file for Threat Prevention blades according to md5.
Syntax
add threat-prevention whitelist type-file md5
<md5>
Parameters
Parameter |
Description |
---|---|
md5 |
MD5 encryption for the file in the whitelist Type: MD5 checksum of a file. Contains only [a-f] and [0-9] characters and of exact length of 32 |
Example
add threat-prevention whitelist type-file md5 d41d8cd98f00b204e9800998ecf8427e
Output
Failure shows an appropriate error message.
Deletes excluded files for Threat Prevention blades.
Description
Removes an excluded file for Threat Prevention blades by md5.
Syntax
delete threat-prevention whitelist type-file md5
<md5>
Parameters
Parameter |
Description |
---|---|
md5 |
MD5 encryption for the file in the whitelist Type: MD5 checksum of a file. Contains only [a-f] and [0-9] characters and of exact length of 32 |
Example
delete threat-prevention whitelist type-file md5 d41d8cd98f00b204e9800998ecf8427e
Output
Failure shows an appropriate error message.
Description
Removes all excluded files for Threat Prevention blades.
Syntax
delete threat-prevention whitelist type-file all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete threat-prevention whitelist type-file all
Output
Failure shows an appropriate error message.
Description
Adds a new excluded URL for Threat Prevention blades.
Syntax
add threat-prevention whitelist type-url url
<url>
Parameters
Parameter |
Description |
---|---|
url |
URL Type: URL |
Example
add threat-prevention whitelist type-url url http://somehost.example.com
Output
Failure shows an appropriate error message.
Deletes excluded URLs for Threat Prevention blades.
Description
Removes an excluded URL for Threat Prevention blades.
Syntax
delete threat-prevention whitelist type-url url
<url>
Parameters
Parameter |
Description |
---|---|
url |
URL Type: URL |
Example
delete threat-prevention whitelist type-url url http://somehost.example.com
Output
Failure shows an appropriate error message.
Description
Removes all excluded URLs for Threat Prevention blades.
Syntax
delete threat-prevention whitelist type-url all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete threat-prevention whitelist type-url all
Output
Failure shows an appropriate error message.
Description
Shows the whitelist URLs set for the Threat Prevention blades.
Syntax
show threat-prevention whitelist urls
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show threat-prevention whitelist urls
Output
Failure shows an appropriate error message.
Configures customizations that can be done for the administration portal.
Description
Configure a custom logo that will appear in the administration portal. The logo can be reached through a URL.
Syntax
set ui-settings [ use-custom-webui-logo
<use-custom-webui-logo> ] [ custom-webui-logo-url
<custom-webui-logo-url> ]
Parameters
Parameter |
Description |
---|---|
custom-webui-logo-url |
Clicking the company logo in the web interface opens this URL Type: urlWithHttp |
use-custom-webui- logo |
The company logo is displayed on the appliance’s web interface and on its login page. The customized logo should follow the size restrictions in order to be displayed properly. Type: Boolean (true/false) |
Example
set ui-settings use-custom-webui-logo true custom-webui-logo-url urlWithHttp
Output
Failure shows an appropriate error message.
Description
Configures customizations that can be done for the administration portal.
Syntax
set ui-settings advanced-settings AboutConfigCustomLogos [
custom-webui-logo-url
<custom-webui-logo-url> ] [ use-custom-webui-logo
<use-custom-webui-logo> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set ui-settings advanced-settings AboutConfigCustomLogos custom-webui-logo-url urlWithHttp use-custom-webui-logo true
Output
Failure shows an appropriate error message.
Shows web interface settings and customizations.
Description
Shows web interface settings and customizations.
Syntax
show ui-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ui-settings
Output
Failure shows an appropriate error message.
Description
Shows web Interface advanced settings.
Syntax
show ui-settings advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show ui-settings advanced-settings
Output
Failure shows an appropriate error message.
Description
Add a USB modem advanced entry.
Syntax
add usb-modem-advanced field-name
<field-name> field-value
<field-value>
is-any-device
<is-any-device> vendor-id
<vendor-id> product-id
<product-id>
Parameters
Parameter |
Description |
---|---|
field-name |
Name Type: A string that contains [a-z], [A-Z], [0-9], ’_’ |
field-value |
Value Type: A string that contains [a-z], [A-Z], [0-9], ’_’, ’.’, ’,’, ’-’, ’/’, ’@’, ’+’, ’,’, ’:’, ’=’ |
is-any-device |
Does paramter apply to all devices Type: Boolean (true/false) |
product-id |
Product ID Type: A hexadecimal string |
vendor-id |
Vendor ID Type: A hexadecimal string |
Example
add usb-modem-advanced field-name usb_advanced_config_name field-value
usb_advanced_config_value is-any-device true vendor-id 7AA1 product-id 7AA1
Output
Failure shows an appropriate error message.
Description
Delete an existing USB modem advanced entry.
Syntax
delete usb-modem-advanced
<id>
Parameters
Parameter |
Description |
---|---|
id |
id Type: A number with no fractional part (integer) |
Example
delete usb-modem-advanced -1000000
Output
Failure shows an appropriate error message.
Description
Delete all existing USB modem advanced entries.
Syntax
delete usb-modem-advanced-all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete usb-modem-advanced-all
Output
Failure shows an appropriate error message.
Description
Configure a USB modem advanced entry.
Syntax
set usb-modem-advanced
<id> [ field-name
<field-name> ] [ field-value
<field-value> ] [ is-any-device
<is-any-device> ] [ vendor-id
<vendor-id> ]
[ product-id
<product-id>
Parameters
Parameter |
Description |
---|---|
field-name |
Name Type: A string that contains [a-z], [A-Z], [0-9], ’_’ |
field-value |
Value Type: A string that contains [a-z], [A-Z], [0-9], ’_’, ’.’, ’,’, ’-’, ’/’, ’@’, ’+’, ’,’, ’:’, ’=’ |
id |
id Type: A number with no fractional part (integer) |
is-any-device |
Does parameter apply to all devices Type: Boolean (true/false) |
product-id |
Product ID Type: A hexadecimal string |
vendor-id |
Vendor ID Type: A hexa decimal string |
Example
set usb-modem-advanced -1000000 field-name usb_advanced_config_name
field-value usb_advanced_config_value is-any-device true vendor-id 7AA1
product-id 7AA1
Output
Failure shows an appropriate error message.
Description
Show existing USB modem advanced entries.
Syntax
show usb-modem-advanced
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show usb-modem-advanced
Output
Failure shows an appropriate error message.
Description
Show the existing USB modem advanced entries in a table.
Syntax
show usb-modem-advanced table
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show usb-modem-advanced table
Output
Failure shows an appropriate error message.
Description
Show existing USB modem information.
Syntax
show usb-modem-info
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show usb-modem-info
Output
Failure shows an appropriate error message.
Description
Show existing USB modem information in a table.
Syntax
show usb-modem-info table
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show usb-modem-info table
Output
Failure shows an appropriate error message.
Configures the internet probing (if probing is enabled) to automatically detect and fix 3G/4G internet connectivity problems.
Description
Configures the internet probing (if probing is enabled) to automatically detect and fix 3G/4G internet connectivity problems.
Syntax
set usb-modem-watchdog advanced-settings interval
<interval>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set usb-modem-watchdog advanced-settings interval 10
Output
Failure shows an appropriate error message.
Description
Configures the internet probing (if probing is enabled) to automatically detect and fix 3G/4G internet connectivity problems.
Syntax
set usb-modem-watchdog advanced-settings mode
<mode>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set usb-modem-watchdog advanced-settings mode off
Output
Failure shows an appropriate error message.
Description
Shows configuration for additional health monitoring functionality to USB modems.
Syntax
show usb-modem-watchdog advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show usb-modem-watchdog advanced-settings
Output
Failure shows an appropriate error message.
Configures settings of a user group defined in the AD server.
Description
Adds a bookmark to be shown in the SNX landing page to user group defined in the AD server. This is relevant only if the user group is defined with VPN remote access privileges.
Syntax
set used-ad-group name
<name> add bookmark label
<bookmark label>
Parameters
Parameter |
Description |
---|---|
bookmark label |
Text for the bookmark in the SSL Network Extender portal |
name |
Group name Type: Active Directory group name |
Example
set used-ad-group name my AD group add bookmark label myLabel
Output
Failure shows an appropriate error message.
Description
Removes a bookmark from being shown in the SNX landing page to user group defined in the AD server. This is relevant only if the user group is defined with VPN remote access privileges.
Syntax
set used-ad-group name
<name> remove bookmark label
<bookmark label>
Parameters
Parameter |
Description |
---|---|
bookmark label |
Text for the bookmark in the SSL Network Extender portal |
name |
Group name Type: Active Directory group name |
Example
set used-ad-group name my AD group remove bookmark label myLabel
Output
Failure shows an appropriate error message.
Configures settings for the User Awareness blade.
Description
Configures the activation mode and user identification methods for the User Awareness blade.
Syntax
set user-awareness [ mode
<mode> ] [ ad-queries-mode
<ad-queries-mode> ] [ browser-based-authentication-mode
<browser-based-authentication-mode> ]
Parameters
Parameter |
Description |
---|---|
ad-queries-mode |
Indicates if User Awareness seamlessly queries the AD (Active Directory) servers to get user information Type: Boolean (true/false) |
browser-based-authentication- mode |
Indicates if User Awareness uses a portal to identify locally defined users or as a backup to other identification methods Type: Boolean (true/false) |
mode |
User Awareness mode - true for on, false for off Type: Boolean (true/false) |
Example
set user-awareness mode true ad-queries-mode true browser-based-authentication-mode true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for the User Awareness blade.
Syntax
set user-awareness advanced-settings association-timeout
<association-timeout>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set user-awareness advanced-settings association-timeout 10
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for the User Awareness blade.
Syntax
set user-awareness advanced-settings assume-single-user
<assume-single-user>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set user-awareness advanced-settings assume-single-user true
Output
Failure shows an appropriate error message.
Configures settings for browser-based authentication (captive portal) by the User Awareness blade.
Description
Configures settings for browser-based authentication (captive portal) by the User Awareness blade.
Syntax
set user-awareness browser-based-authentication [ redirect-upon-destinations
{ manually-defined [ redirect-upon-destination-internet
<redirect-upon-destination-internet>
] [ redirect-upon-destinations-net-objs
<redirect-upon-destinations-net-objs>
] | all } ] [ block-unauthenticated-non-web-traffic
<block-unauthenticated-non-web-traffic>
] [ require-user-agreement
<require-user-agreement> ] [ agreement-text
<agreement-text> ] [ portal-address
<portal-address> ] [ session-timeout
<session-timeout> ] [ log-out-on-portal-close
<log-out-on-portal-close> ]
Parameters
Parameter |
Description |
---|---|
agreement-text |
The conditions shown to the users to agree to Type: A string that contains only printable characters |
block-unauthenticated- non-web-traffic |
When true, users using non-HTTP traffic are forced to login first through Browser-Based Authentication Type: Boolean (true/false) |
log-out-on-portal-close |
When true, the user is forced to keep the portal window open to remain logged in Type: Boolean (true/false) |
portal-address |
Use the auto option unless you want to redirect to a manually configured URL Type: String Enter "<auto>" for default |
redirect-upon- destination-internet |
When choosing redirect to manually defined destinations - indicates if the destinations include the internet (external interfaces) Type: Boolean (true/false) |
redirect-upon-destinations |
Browser based authentication will only be shown to unidentified users on traffic to these configured destinations Type: Press TAB to see available options |
redirect-upon- destinations-net-objs |
When choosing redirect to manually defined destinations - indicates if the destinations include a manual list of network objects Type: Boolean (true/false) |
require-user-agreement |
Indicates if users must agree to the legal conditions Type: Boolean (true/false) |
session-timeout |
Session timeout duration, in minutes, for browser-based authentication Type: A number with no fractional part (integer) Units should be entered in minutes |
Example
set user-awareness browser-based-authentication redirect-upon-destinations
manually-defined redirect-upon-destination-internet true redirect-upon-destinations-net-o true block-unauthenticated-non-web-traffic true require-user-agreement
true agreement-text My Network portal-address TEXT session-timeout 10 log-out-on-portal-close true
Output
Failure shows an appropriate error message.
Description
Configures network objects to be used in the User Awareness blade.
Syntax
set user-awareness browser-based-authentication add net-obj <net-obj>
Parameters
Parameter |
Description |
---|---|
net-obj |
Network object name |
Example
set user-awareness browser-based-authentication add net-obj TEXT
Output
Failure shows an appropriate error message.
Description
Configures network objects to be used in the User Awareness blade.
Syntax
set user-awareness browser-based-authentication remove net-obj
<net-obj>
Parameters
Parameter |
Description |
---|---|
net-obj |
Network object name |
Example
set user-awareness browser-based-authentication remove net-obj TEXT
Output
Failure shows an appropriate error message.
Description
Configures network objects to be used in the User Awareness blade.
Syntax
set user-awareness browser-based-authentication remove-all net-objs
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set user-awareness browser-based-authentication remove-all net-objs
Output
Failure shows an appropriate error message.
Shows the configuration of the User Awareness blade.
Description
Shows the configuration of the User Awareness blade.
Syntax
show user-awareness
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show user-awareness
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of the User Awareness blade.
Syntax
show user-awareness advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show user-awareness advanced-settings
Output
Failure shows an appropriate error message.
Description
Shows the browser-based authentication configuration of the User Awareness blade.
Syntax
show user-awareness browser-based-authentication
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show user-awareness browser-based-authentication
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for the User Awareness blade.
Syntax
set user-management advanced-settings auto-delete-expired-local-users
<auto-delete-expired-local-users>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set user-management advanced-settings auto-delete-expired-local-users true
Output
Failure shows an appropriate error message.
Description
Shows upgrade log files.
Syntax
show upgrade-log
Parameters
Parameter |
Description |
---|---|
|
|
Example
show upgrade-log
Output
Success shows upgrade log files. Failure shows an appropriate error message.
Description
Show bookmarks configured to a user group defined in AD.
Syntax
show used-ad-group bookmarks name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Group name Type: Active Directory group name |
Example
show used-ad-group bookmarks name my AD group
Output
Failure shows an appropriate error message.
Description
Upgrades the software image from a file on a USB drive or TFTP server.
Syntax
upgrade from {usb [file
<usb_file>]|tftp server
<server> filename
<tftp_file>}
Parameters
Parameter |
Description |
---|---|
|
Name of software image file on USB drive. |
|
Host name or IP address of TFTP server. |
|
Name of software image file on TFTP server. |
Example
upgrade from tftp server my-tftp-server filename my-new-software
Output
Success shows info after the download succeed. Failure shows an appropriate error message.
The vpn
command manages the VPN driver and helps to debug the VPN.
Description
Installs the VPN kernel (vpnk) and connects to the firewall kernel (fwk), attaching the VPN driver to the Firewall driver.
Syntax
vpn drv
<on|off>
Parameters
Parameter |
Description |
---|---|
|
Starts or stops the VPN kernel |
Return Value
0 on success, 1 on failure
Example
vpn drv on
Output
Success shows OK. Failure shows an appropriate error message.
Description
Launches the VPN TunnelUtil tool to:
Syntax
vpn tunnelutil
Parameters
Parameter |
Description |
---|---|
|
|
Return Value
0 on success, 1 on failure
Example
vpn tunnelutil
Output
Success launches VPN TunnelUtil tool. Failure shows an appropriate error message.
Description
Contains multiple utilities for troubleshooting VPN issues.
Syntax
vpn debug {on [TOPIC=level]|off} [ikeon|ikeoff] [trunc [TOPIC=level]] [mon|moff]
Parameters
Parameter |
Description |
---|---|
|
Writes debugging information to $FWDIR/log/sfwd.elg |
|
Sets level of debugging for a particular topic. This argument can only be used after on or trunc. |
|
Writes IKE packet information into $FWDIR/log/ike.elg |
|
Writes both sfwd.elg and ike.elg, but first clears the files |
|
Writes raw IKE packets to $FWDIR/log/ikemonitor.snoop |
Return Value
0
on success, 1 on failureExample
vpn debug on
Output
Failure shows an appropriate error message.
Description
Delete a configured Virtual Tunnel Interface (VTI) by tunnel ID.
Syntax
delete vpn tunnel
<tunnel>
Parameters
Parameter |
Description |
---|---|
tunnel |
A number identifying the Virtual Tunnel Interface (VTI) Type: A number with no fractional part (integer) |
Example
delete vpn tunnel 12
Output
Failure shows an appropriate error message.
Configures existing remote VPN sites.
Description
Configures existing remote VPN sites.
Syntax
set vpn site
<site> [ enabled
<enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type> ] [ enc-profile
<enc-profile> ] [
phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval> ] [ enable-perfect-forward-secrecy { true [ phase2-dh
<phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false
} ] [ disable-nat
<disable-nat> ] [ aggressive-mode-enabled { true aggressive-mode-DH-group
<aggressive-mode-DH-group> | false } ] [ {
aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id>
| false } | aggressive-mode-enable-gateway-id { true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false } } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [
match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ]
[ match-cert-e-mail { true match-cert-e-mail-string
<match-cert-e-mail-string>
| false } ] [ link-selection-probing-method
<link-selection-probing-method>
] [ name
<name> ] [ remote-site-link-selection
<remote-site-link-selection>
] [ remote-site-host-name
<remote-site-host-name> ] [ remote-site-ip-address
<remote-site-ip-address> ] [ is-site-behind-static-nat
<is-site-behind-static-nat>
] [ static-nat-ip
<static-nat-ip> ] [ auth-method { preshared-secret password
<password> | certificate } ] [ link-selection-primary-addr
<link-selection-primary-addr> ]
Parameters
Parameter |
Description |
---|---|
aggressive-mode-DH-group |
Determine the strength of the key when aggressive mode is enabled |
aggressive-mode- enable-gateway-id |
Indicates if gateway ID matching will be used. This adds a layer of security to aggressive mode Type: Boolean (true/false) |
aggressive-mode- enable-peer-id |
Indicates if peer ID matching will be used. This adds a layer of security to aggressive mode Type: Boolean (true/false) |
aggressive-mode-enabled |
Indicates if Aggressive mode, a less secure negotiation protocol compared to main mode, is used. It is less recommended if the remote site supports IPSec main mode Type: Boolean (true/false) |
aggressive-mode-gateway-id |
The gateway ID that will be used for matching when configured to Type: vpnAggressiveModePeerId |
aggressive-mode- gateway-id-type |
Indicates the type of gateway ID that will be used for matching when configured Options: domain-name, user-name |
aggressive-mode-peer-id |
The peer ID that will be used for matching when configured to Type: vpnAggressiveModePeerId |
aggressive-mode-peer-id-type |
Indicates the type of peer ID that will be used for matching when configured Options: domain-name, user-name |
auth-method |
Indicates the type of authentication used when connecting to the remote site Type: Press TAB to see available options |
disable-nat |
Disable NAT for traffic to/from the remote site. Useful when one of the internal networks contains a server Type: Boolean (true/false) |
enable-perfect- forward-secrecy |
Ensures that a session key will not be compromised if one of the (long-term) private keys is compromised in the future. Type: Boolean (true/false) |
enable-permanent-vpn-tunnel |
VPN Tunnels are constantly kept active and as a result, make it easier to recognize malfunctions and connectivity problems Type: Boolean (true/false) |
enabled |
Indicates whether or not the remote site is enabled Type: Boolean (true/false) |
enc-method |
Indicates which encryption method is used Options: ike-v1, ike-v2, prefer-ike-v2 |
enc-profile |
Encryption profile (one of predefined profiles or custom) Type: virtual |
is-check-point-site |
Enable if the remote site is connected through a Check Point Security Gateway Type: Boolean (true/false) |
is-site-behind-static-nat |
When connection type is IP address, this indicates if it is behind static NAT |
link-selection-primary-addr |
Specifies The primary IP address for the link selection Type: A string of alphanumeric characters without space between them |
link-selection-probing-method |
The type of probing used for link selection when multiple IP addresses are configured for the remote site Options: ongoing, one-time |
match-cert-dn |
Indicates if certificate matching should match the DN string in the certificate to the configured DN string Type: Boolean (true/false) |
match-cert-dn-string |
Indicates the configured DN string for certificate matching Type: String |
match-cert-e-mail |
Indicates if certificate matching should match the E-mail string in the certificate to the configured E-mail string Type: Boolean (true/false) |
match-cert-e-mail-string |
Indicates the configured E-mail string for certificate matching Type: Email address |
match-cert-ip |
Indicates if certificate matching should match IP address in the certificate to the site’s IP address Type: Boolean (true/false) |
name |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
password |
Preshared secret (minimum 6 characters) to be used when authentication method is configured as such Type: vpnPassword |
phase1-reneg-interval |
The period, in minutes, between each IKE SA renegotiation Type: A number with no fractional part (integer) |
phase2-dh |
Determine the strength of the key used for the IPsec (Phase 2) key exchange process. The higher the group number, the stronger and more secure the key is. |
phase2-reneg-interval |
The period, in seconds, between each IPSec SA renegotiation Type: A number with no fractional part (integer) |
remote-site-enc-dom-type |
The method of defining the remote site’s encryption domain Options: manually-defined-enc-dom, route-all-traffic-to-site, route-based-vpn, enc-dom-hidden-behind-remote-site |
remote-site-host-name |
Indicates the remote site’s host name when the link selection method is configured as such |
remote-site-ip-address |
Indicates the remote site’s single IP address when the link selection method is configured as such |
remote-site-link-selection |
Indicates the method of determining the destination IP address/s of the remote site Options: ip-address, host-name, high-availability, load-sharing, connection- initiated-only-from-remote-site |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
static-nat-ip |
Indicates an external routable IP address via static NAT used by the remote site, when configured as such |
use-trusted-ca |
Indicates if a specific trusted CA is used for matching the remote site’s certificate or all configured trusted CAs |
Example
set vpn site site17 enabled true remote-site-enc-dom-type manually-defined-enc-dom enc-profile custom phase1-reneg-interval
15 phase2-reneg-interval 15 enable-perfect-forward-secrecy
true phase2-dh word is-check-point-site true enable-permanent-vpn-tunnel true disable-nat true aggressive-mode-enabled true aggressive-mode-DH-group word aggressive-mode-enable-peer-id true aggressive-mode-peer-id-type
domain-name aggressive-mode-peer-id vpnAggressiveModePeerId enc-method ike-v1 use-trusted-ca TEXT match-cert-ip true match-cert-dn true match-cert-dn-string TEXT match-cert-e-mail true match-cert-e-mail-string MyEmail@mail.com
link-selection-probing-method ongoing name site17 remote-site-link-selection ip-address remote-site-host-name myHost.com remote-site-ip-address 192.168.1.1 is-site-behind-static-nat true static-nat-ip 192.168.1.1 auth-method
preshared-secret password vpnPassword link-selection-primary-addr word
Output
Failure shows an appropriate error message.
Description
Adds network objects to the encryption domain of existing remote VPN sites.
Syntax
set vpn site
<site> add remote-site-enc-dom-network-obj
<remote-site-enc-dom-network-obj>
Parameters
Parameter |
Description |
---|---|
remote-site-enc-dom- network-obj |
Network Object name |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 add remote-site-enc-dom-network-obj TEXT
Output
Failure shows an appropriate error message.
Description
Removes all network objects from the encyryption domain of existing remote VPN sites.
Syntax
set vpn site
<site> remove-all remote-site-enc-dom-network-obj
<remote-site-enc-dom-network-obj>
Parameters
Parameter |
Description |
---|---|
remote-site-enc-dom- network-obj |
Network Object name |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove-all remote-site-enc-dom-network-obj TEXT
Output
Failure shows an appropriate error message.
Description
Removes network objects from the encryption domain of existing remote VPN sites.
Syntax
set vpn site
<site> remove remote-site-enc-dom-network-obj
<remote-site-enc-dom-network-obj>
Parameters
Parameter |
Description |
---|---|
remote-site-enc-dom- network-obj |
Network Object name |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove remote-site-enc-dom-network-obj TEXT
Output
Failure shows an appropriate error message.
Description
Adds IP addresses to an existing remote VPN site. This allows High Availability or Load Sharing between the remote links using the link selection functionality.
Syntax
set vpn site
<site> add link-selection-multiple-addrs addr
<link-selection-multiple-addrs addr>
Parameters
Parameter |
Description |
---|---|
link-selection-multiple- addrs addr |
IP address |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 add link-selection-multiple-addrs addr 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Removes all IP addresses from an existing remote VPN site configured with multiple links.
Syntax
set vpn site
<site> remove-all link-selection-multiple-addrs addr
<link-selection-multiple-addrs addr>
Parameters
Parameter |
Description |
---|---|
link-selection-multiple- addrs addr |
IP address |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove-all link-selection-multiple-addrs addr 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Removes IP addresses from an existing remote VPN site. This allows High Availability or Load Sharing between the remote links using the link selection functionality.
Syntax
set vpn site
<site> remove link-selection-multiple-addrs addr
<link-selection-multiple-addrs addr>
Parameters
Parameter |
Description |
---|---|
link-selection-multiple- addrs addr |
IP address |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove link-selection-multiple-addrs addr 192.168.1.1
Output
Failure shows an appropriate error message.
Description
Adds a phase 1 encryption algorithm to an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> add custom-enc-phase1-enc
<custom-enc-phase1-enc>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase1-enc |
Encryption algorithm preferences for phase1 in the VPN encryption algorithm, which sets the base for phase2 |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 add custom-enc-phase1-enc word
Output
Failure shows an appropriate error message.
Description
Removes all phase 1 encryption algorithm from an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> remove-all custom-enc-phase1-enc
<custom-enc-phase1-enc>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase1-enc |
Encryption algorithm preferences for phase1 in the VPN encryption algorithm, which sets the base for phase2 |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove-all custom-enc-phase1-enc word
Output
Failure shows an appropriate error message.
Description
Removes a phase 1 encryption algorithm from an existing remote VPN site configured with a custom encryption suite
Syntax
set vpn site
<site> remove custom-enc-phase1-enc
<custom-enc-phase1-enc>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase1-enc |
Encryption algorithm preferences for phase1 in the VPN encryption algorithm, which sets the base for phase2 |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove custom-enc-phase1-enc word
Output
Failure shows an appropriate error message.
Description
Adds a phase 1 authentication algorithm to an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> add custom-enc-phase1-auth
<custom-enc-phase1-auth>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase1-auth |
Authentication algorithm used for encryption validation |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 add custom-enc-phase1-auth word
Output
Failure shows an appropriate error message.
Description
Removes all phase 1 authentication algorithms from an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> remove-all custom-enc-phase1-auth
<custom-enc-phase1-auth>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase1-auth |
Authentication algorithm used for encryption validation |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove-all custom-enc-phase1-auth word
Output
Failure shows an appropriate error message.
Description
Removes a phase 1 authentication algorithm from an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> remove custom-enc-phase1-auth
<custom-enc-phase1-auth>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase1-auth |
Authentication algorithm used for encryption validation |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove custom-enc-phase1-auth word
Output
Failure shows an appropriate error message.
Description
Adds a Diffie-Hellman group to an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> add custom-enc-phase1-dh-group
<custom-enc-phase1-dh-group>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase1-dh-group |
VPN Diffie-Hellman key exchange encryption level |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 add custom-enc-phase1-dh-group word
Output
Failure shows an appropriate error message.
Description
Removes all Diffie-Hellman groups from an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> remove-all custom-enc-phase1-dh-group
<custom-enc-phase1-dh-group>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase1-dh-group |
VPN Diffie-Hellman key exchange encryption level |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove-all custom-enc-phase1-dh-group word
Output
Failure shows an appropriate error message.
Description
Removes an Diffie-Hellman group from an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> remove custom-enc-phase1-dh-group
<custom-enc-phase1-dh-group>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase1-dh-group |
VPN Diffie-Hellman key exchange encryption level |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove custom-enc-phase1-dh-group word
Output
Failure shows an appropriate error message.
Description
Adds a phase 2 encryption algorithm to an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> add custom-enc-phase2-enc
<custom-enc-phase2-enc>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase2-enc |
Encryption algorithm preferences for phase2 in the VPN encryption algorithm |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 add custom-enc-phase2-enc word
Output
Failure shows an appropriate error message.
Description
Removes all phase 2 encryption algorithms from an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> remove-all custom-enc-phase2-enc
<custom-enc-phase2-enc>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase2-enc |
Encryption algorithm preferences for phase2 in the VPN encryption algorithm |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove-all custom-enc-phase2-enc word
Output
Failure shows an appropriate error message.
Description
Removes a phase 2 encryption algorithm from an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> remove custom-enc-phase2-enc
<custom-enc-phase2-enc>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase2-enc |
Encryption algorithm preferences for phase2 in the VPN encryption algorithm |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove custom-enc-phase2-enc word
Output
Failure shows an appropriate error message.
Description
Adds a phase 2 authentication algorithm to an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> add custom-enc-phase2-auth
<custom-enc-phase2-auth>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase2-auth |
Authentication algorithm used for encryption validation |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 add custom-enc-phase2-auth word
Output
Failure shows an appropriate error message.
Description
Removes all phase 2 authentication algorithms from an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> remove-all custom-enc-phase2-auth
<custom-enc-phase2-auth>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase2-auth |
Authentication algorithm used for encryption validation |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove-all custom-enc-phase2-auth word
Output
Failure shows an appropriate error message.
Description
Removes a phase 2 authentication algorithm from an existing remote VPN site configured with a custom encryption suite.
Syntax
set vpn site
<site> remove custom-enc-phase2-auth
<custom-enc-phase2-auth>
Parameters
Parameter |
Description |
---|---|
custom-enc-phase2-auth |
Authentication algorithm used for encryption validation |
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
set vpn site site17 remove custom-enc-phase2-auth word
Output
Failure shows an appropriate error message.
Description
Configures an existing Virtual Tunnel Interface (VTI) for route based VPN.
Syntax
set vpn tunnel
<tunnel> type { unnumbered [ peer
<peer> ] [
internet-connection
<internet-connection> ] | numbered [ local
<local> ] [ remote
<remote> ] [ peer
<peer> ] }
Parameters
Parameter |
Description |
---|---|
internet-connection |
The local interface for unnumbered VTI |
local |
Enter the IP address of the interface Type: IP address |
peer |
Remote peer name as defined in the VPN community. You must define the two peers in the VPN community before you can define the VTI. The Peer ID is an alpha-numeric character string. Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
remote |
Defines the remote peer IPv4 address, used at the peer gateway’s point-to-point virtual interface (numbered VTI only) Type: IP address |
tunnel |
A number identifying the Virtual Tunnel Interface (VTI) Type: A number with no fractional part (integer) |
type |
The type of VTI: Numbered VTI that uses a specified, static IPv4 addresses for local and remote connections, or unnumbered VTI that uses the interface and the remote peer name to get addresses Type: Press TAB to see available options |
Example
set vpn tunnel 15 type unnumbered peer site17 internet-connection My connection
Output
Failure shows an appropriate error message.
Shows VPN site to site configuration.
Description
Shows the configuration of a remote VPN site.
Syntax
show vpn site
<site>
Parameters
Parameter |
Description |
---|---|
site |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
show vpn site site17
Output
Failure shows an appropriate error message.
Description
Shows the configuration of a Virtual Tunnel Interface (VTI) used for route-based VPN.
Syntax
show vpn tunnel
<tunnel>
Parameters
Parameter |
Description |
---|---|
tunnel |
A number identifying the Virtual Tunnel Interface (VTI) Type: A number with no fractional part (integer) |
Example
show vpn tunnel 12
Output
Failure shows an appropriate error message.
Configures settings for VPN remote access (Client to server VPN).
Description
Configures settings for VPN remote access.
Syntax
set vpn remote-access [ default-access-to-lan
<default-access-to-lan>
] [ mode
<mode> ] [ track
<track> ] [ mobile-client
<mobile-client> ] [ sslvpn-client
<sslvpn-client> ] [ l2tp-vpn-client
<l2tp-vpn-client> ] [ l2tp-pre-shared-key
<l2tp-pre-shared-key> ]
Parameters
Parameter |
Description |
---|---|
default-access-to-lan |
Allow traffic from Remote Access clients (by default) Options: block, accept |
l2tp-pre-shared-key |
L2TP Pre-Shared Key Type: A string of alphanumeric characters without space between them |
l2tp-vpn-client |
Enable VPN remote access clients to connect via native VPN client (L2TP) Type: Boolean (true/false) |
mobile-client |
Enable VPN remote access mobile clients to connect via Check Point Mobile VPN client Type: Boolean (true/false) |
mode |
Enable VPN Remote Access Type: Boolean (true/false) |
sslvpn-client |
Enable VPN remote access clients to connect via SSL VPN Type: Boolean (true/false) |
track |
Log traffic from Remote Access clients (by default) Options: none, log |
Example
set vpn remote-access default-access-to-lan block mode true track none mobile-client true sslvpn-client true l2tp-vpn-client true l2tp-pre-shared-key word
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings enc-dns-traffic
<enc-dns-traffic>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings enc-dns-traffic true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings verify-gateway-cert
<verify-gateway-cert>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings verify-gateway-cert true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings update-topo-startup
<update-topo-startup>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings update-topo-startup true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings keep-alive-time
<keep-alive-time>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings keep-alive-time 15
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings endpoint-vpn-user-re-auth-timeout
<endpoint-vpn-user-re-auth-timeout>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings endpoint-vpn-user-re-auth-timeout
15
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings ike-over-tcp
<ike-over-tcp>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings ike-over-tcp true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings is-udp-enc-active
<is-udp-enc-active>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings is-udp-enc-active true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings radius-retransmit-timeout
<radius-retransmit-timeout>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings radius-retransmit-timeout 15
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings om-method-radius
<om-method-radius>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings om-method-radius true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings snx-uninstall-on-disconnect
<snx-uninstall-on-disconnect>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings snx-uninstall-on-disconnect ask-user
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings snx-keep-alive-timeout
<snx-keep-alive-timeout>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings snx-keep-alive-timeout 15
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings snx-min-tls
<snx-min-tls>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings snx-min-tls tls-1-0
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings snx-encryption-enable-3des
<snx-encryption-enable-3des>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings snx-encryption-enable-3des true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings update-topo <update-topo>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings update-topo 15
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings use-limited-auth-timeout
<use-limited-auth-timeout>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings use-limited-auth-timeout true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings auth-timeout-limit
<auth-timeout-limit>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings auth-timeout-limit 15
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings om-enable-with-multiple-if
<om-enable-with-multiple-if>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings om-enable-with-multiple-if true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings disconnect-enc-domain
<disconnect-enc-domain>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings disconnect-enc-domain true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings enable-back-conn
<enable-back-conn>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings enable-back-conn true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings allow-update-topo
<allow-update-topo>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings allow-update-topo true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings snx-encryption-enable-rc4
<snx-encryption-enable-rc4>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings snx-encryption-enable-rc4 true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings ike-ip-comp-support
<ike-ip-comp-support>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings ike-ip-comp-support true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings enc-method <enc-method>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings enc-method ike-v1
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings snx-upgrade
<snx-upgrade>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings snx-upgrade ask-user
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings ike-support-crash-recovery
<ike-support-crash-recovery>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings ike-support-crash-recovery true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings allow-clear-traffic-while-disconnected
<allow-clear-traffic-while-disconnected>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings allow-clear-traffic-while-disconnected true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings allow-caching-passwords-on-client
<allow-caching-passwords-on-client>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings allow-caching-passwords-on-client true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings prevent-ip-pool-nat
<prevent-ip-pool-nat>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings prevent-ip-pool-nat true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings disable-office-mode
<disable-office-mode>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings disable-office-mode true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings snx-user-re-auth-timeout
<snx-user-re-auth-timeout>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings snx-user-re-auth-timeout 15
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings allow-simultaneous-login
<allow-simultaneous-login>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings allow-simultaneous-login true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings port [ visitor-mode-port
<visitor-mode-port> ] [ reserve-port-443
<reserve-port-443> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings port visitor-mode-port 8080 reserve-port-443 true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings office-mode [ om-perform-antispoofing
<om-perform-antispoofing> ] [ single-om-per-site
<single-om-per-site> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings office-mode om-perform-antispoofing true single-om-per-site true
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced-settings visitor-mode [ enable-visitor-mode-all
<enable-visitor-mode-all> ] [ visitor-mode-interface
<visitor-mode-interface>
]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn remote-access advanced-settings visitor-mode enable-visitor-mode-all all visitor-mode-interface 192.168.1.1
Output
Failure shows an appropriate error message.
Shows configuration of remote access VPN.
Description
Shows configuration of remote access VPN.
Syntax
show vpn remote-access
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show vpn remote-access
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of remote access VPN.
Syntax
show vpn remote-access advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show vpn remote-access advanced-settings
Output
Failure shows an appropriate error message.
Description
Configures advanced settings for VPN remote access.
Syntax
set vpn remote-access advanced [ om-network-ip
<om-network-ip> ] [ om-subnet-mask
<om-subnet-mask> ] [ default-route-through-this-gateway
<default-route-through-this-gateway> ] [ enc-dom
<enc-dom> ] [
use-this-gateway-as-dns-server
<use-this-gateway-as-dns-server> ] [
dns-primary
<dns-primary> ] [ dns-secondary
<dns-secondary> ] [ dns-tertiary
<dns-tertiary> ] [ dns-domain-mode
<dns-domain-mode> ] [ domain-name
<domain-name> ]
Parameters
Parameter |
Description |
---|---|
default-route-through- this-gateway |
Indicates if Internet traffic from connected clients will be routed first through this gateway Type: Boolean (true/false) |
dns-domain-mode |
Indicates if remote access clients use the domain name configured under DNS network settings of the device, or a manually configured domain name Type: Boolean (true/false) |
dns-primary |
Configure manually office mode first DNS Type: IP address |
dns-secondary |
Configure manually office mode second DNS Type: IP address |
dns-tertiary |
Configure manually office mode third DNS Type: IP address |
domain-name |
Manual configuration of the domain used by remote access clients Type: A FQDN |
enc-dom |
Indicates if the encryption domain for remote access clients is calculated automatically or manually configured Options: manual, auto |
om-network-ip |
Office Mode - Allocate IP addresses from the following network Type: Network address |
om-subnet-mask |
Subnet for allocating IP addresses of incoming remote access connections (Office Mode) Type: Subnet mask |
use-this-gateway-as- dns-server |
Indicates if the remote access clients will use this gateway as a DNS server. Applicable only when encryption domain is calculated automatically Type: Boolean (true/false) |
Example
set vpn remote-access advanced om-network-ip 172.16.10.0 om-subnet-mask
255.255.255.0 default-route-through-this-gateway true enc-dom manual
use-this-gateway-as-dns-server true dns-primary 192.168.1.1 dns-secondary 192.168.1.1 dns-tertiary 192.168.1.1 dns-domain-mode true domain-name somehost.example.com
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of remote access VPN.
Syntax
show vpn remote-access advanced
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show vpn remote-access advanced
Output
Failure shows an appropriate error message.
Configures manual encryption domain for VPN remote access users.
Description
Adds a network object to the manual encryption domain of VPN remote access.
Syntax
set vpn remote-access advanced enc-dom-obj manual add name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name |
Example
set vpn remote-access advanced enc-dom-obj manual add name TEXT
Output
Failure shows an appropriate error message.
Description
Removes a network object from the manual encryption domain of VPN remote access.
Syntax
set vpn remote-access advanced enc-dom-obj manual remove name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name |
Example
set vpn remote-access advanced enc-dom-obj manual remove name TEXT
Output
Failure shows an appropriate error message.
Description
Adds a new remote VPN site for VPN site-to-site.
Syntax
add vpn site name
<name> remote-site-link-selection {
host-name remote-site-host-name
<remote-site-host-name> auth-method
{ preshared-secret password
<password> [ enabled
<enabled>
] [ remote-site-enc-dom-type
<remote-site-enc-dom-type>
] [ enc-profile
<enc-profile> ] [ phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval>
] [ enable-perfect-forward-secrecy { true [ phase2-dh <phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat>
] [ aggressive-mode-enabled { true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } |
aggressive-mode-enable-gateway-id { true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false } } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail { true match-cert-e-mail-string
<match-cert-e-mail-string> | false } ] [ link-selection-probing-method
<link-selection-probing-method>
] | certificate [ enabled
<enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type> ] [ enc-profile
<enc-profile> ] [
phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval> ] [ enable-perfect-forward-secrecy { true [ phase2-dh
<phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat> ] [ aggressive-mode-enabled
{ true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } | aggressive-mode-enable-gateway-id
{ true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false
} } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail
{ true match-cert-e-mail-string
<match-cert-e-mail-string> | false } ] [ link-selection-probing-method
<link-selection-probing-method> ] } |
ip-address remote-site-ip-address
<remote-site-ip-address> is-site-behind-static-nat
{ true static-nat-ip
<static-nat-ip> auth-method { preshared-secret password
<password> [ enabled
<enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type> ] [ enc-profile
<enc-profile> ] [
phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval> ] [ enable-perfect-forward-secrecy { true [ phase2-dh <phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat> ] [ aggressive-mode-enabled
{ true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } | aggressive-mode-enable-gateway-id
{ true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false
} } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail
{ true match-cert-e-mail-string
<match-cert-e-mail-string> | false
} ] [ link-selection-probing-method
<link-selection-probing-method>
] | certificate [ enabled
<enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type> ] [ enc-profile
<enc-profile> ] [
phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval> ] [ enable-perfect-forward-secrecy { true [ phase2-dh
<phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat> ] [ aggressive-mode-enabled
{ true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } | aggressive-mode-enable-gateway-id
{ true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false
} } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail
{ true match-cert-e-mail-string
<match-cert-e-mail-string> | false }
] [ link-selection-probing-method
<link-selection-probing-method> ] }
| false auth-method { preshared-secret password
<password> [ enabled
<enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type>
] [ enc-profile
<enc-profile> ] [ phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval>
] [ enable-perfect-forward-secrecy { true [ phase2-dh
<phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat>
] [ aggressive-mode-enabled { true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } |
aggressive-mode-enable-gateway-id { true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false } } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail { true match-cert-e-mail-string
<match-cert-e-mail-string> | false } ] [ link-selection-probing-method
<link-selection-probing-method>
] | certificate [ enabled <enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type> ] [ enc-profile
<enc-profile> ] [
phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval> ] [ enable-perfect-forward-secrecy { true [ phase2-dh
<phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat> ] [ aggressive-mode-enabled
{ true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } | aggressive-mode-enable-gateway-id
{ true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false
} } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail
{ true match-cert-e-mail-string
<match-cert-e-mail-string> | false } ] [ link-selection-probing-method
<link-selection-probing-method> ] } } |
load-sharing link-selection-multiple-addrs addr
<link-selection-multiple-addrs addr> auth-method { preshared-secret password
<password> [ enabled
<enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type>
] [ enc-profile
<enc-profile> ] [ phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval>
] [ enable-perfect-forward-secrecy { true [ phase2-dh
<phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat>
] [ aggressive-mode-enabled { true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } |
aggressive-mode-enable-gateway-id { true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false } } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail { true match-cert-e-mail-string
<match-cert-e-mail-string> | false } ] [ link-selection-probing-method
<link-selection-probing-method>
] | certificate [ enabled
<enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type> ] [ enc-profile
<enc-profile> ] [
phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval> ] [ enable-perfect-forward-secrecy { true [ phase2-dh
<phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat> ] [ aggressive-mode-enabled
{ true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } | aggressive-mode-enable-gateway-id
{ true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false
} } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail
{ true match-cert-e-mail-string
<match-cert-e-mail-string> | false } ] [ link-selection-probing-method
<link-selection-probing-method> ] } |
high-availability link-selection-multiple-addrs addr
<link-selection-multiple-addrs addr> auth-method { preshared-secret password
<password> [ enabled
<enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type>
] [ enc-profile
<enc-profile> ] [ phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval>
] [ enable-perfect-forward-secrecy { true [ phase2-dh
<phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat>
] [ aggressive-mode-enabled { true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } |
aggressive-mode-enable-gateway-id { true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false } } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail { true match-cert-e-mail-string
<match-cert-e-mail-string> | false } ] [ link-selection-probing-method
<link-selection-probing-method>
] | certificate [ enabled <enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type> ] [ enc-profile
<enc-profile> ] [
phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval> ] [ enable-perfect-forward-secrecy { true [ phase2-dh <phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat> ] [ aggressive-mode-enabled
{ true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } | aggressive-mode-enable-gateway-id
{ true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false
} } ] | false } ] [ enc-method <enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail
{ true match-cert-e-mail-string
<match-cert-e-mail-string> | false } ] [ link-selection-probing-method
<link-selection-probing-method> ] } |
connection-initiated-only-from-remote-site auth-method { preshared-secret password
<password> [ enabled
<enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type> ] [ enc-profile
<enc-profile> ] [
phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval> ] [ enable-perfect-forward-secrecy { true [ phase2-dh
<phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat> ] [ aggressive-mode-enabled
{ true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } | aggressive-mode-enable-gateway-id
{ true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false
} } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail
{ true match-cert-e-mail-string
<match-cert-e-mail-string> | false
} ] [ link-selection-probing-method
<link-selection-probing-method>
] | certificate [ enabled
<enabled> ] [ remote-site-enc-dom-type
<remote-site-enc-dom-type> ] [ enc-profile
<enc-profile> ] [
phase1-reneg-interval
<phase1-reneg-interval> ] [ phase2-reneg-interval
<phase2-reneg-interval> ] [ enable-perfect-forward-secrecy { true [ phase2-dh
<phase2-dh> ] | false } ] [ is-check-point-site { true [ enable-permanent-vpn-tunnel
<enable-permanent-vpn-tunnel> ] | false } ] [ disable-nat
<disable-nat> ] [ aggressive-mode-enabled
{ true aggressive-mode-DH-group
<aggressive-mode-DH-group> [ { aggressive-mode-enable-peer-id { true aggressive-mode-peer-id-type
<aggressive-mode-peer-id-type> aggressive-mode-peer-id
<aggressive-mode-peer-id> | false } | aggressive-mode-enable-gateway-id
{ true aggressive-mode-gateway-id-type
<aggressive-mode-gateway-id-type> aggressive-mode-gateway-id
<aggressive-mode-gateway-id> | false
} } ] | false } ] [ enc-method
<enc-method> ] [ use-trusted-ca
<use-trusted-ca> ] [ match-cert-ip
<match-cert-ip> ] [ match-cert-dn { true match-cert-dn-string
<match-cert-dn-string> | false } ] [ match-cert-e-mail
{ true match-cert-e-mail-string
<match-cert-e-mail-string> | false } ] [ link-selection-probing-method
<link-selection-probing-method> ] }
}
Parameters
Parameter |
Description |
---|---|
aggressive-mode-DH-group |
determine the strength of the key when aggressive mode is enabled |
aggressive-mode- enable-gateway-id |
Indicates if gateway ID matching will be used. This adds a layer of security to aggressive mode Type: Boolean (true/false) |
aggressive-mode- enable-peer-id |
Indicates if peer ID matching will be used. This adds a layer of security to aggressive mode Type: Boolean (true/false) |
aggressive-mode- enabled |
main mode, is used. It is less recommended if the remote site supports IPSec main mode Type: Boolean (true/false) |
aggressive-mode- gateway-id |
The gateway ID that will be used for matching when configured to Type: vpnAggressiveModePeerId |
aggressive-mode- gateway-id-type |
Indicates the type of gateway ID that will be used for matching when configured Options: domain-name, user-name |
aggressive-mode- peer-id |
The peer ID that will be used for matching when configured to Type: vpnAggressiveModePeerId |
aggressive-mode- peer-id-type |
Indicates the type of peer ID that will be used for matching when configured Options: domain-name, user-name |
auth-method |
Indicates the type of authentication used when connecting to the remote site Type: Press TAB to see available options |
disable-nat |
Disable NAT for traffic to/from the remote site. Useful when one of the internal networks contains a server Type: Boolean (true/false) |
enable-perfect- forward-secrecy |
Ensures that a session key will not be compromised if one of the (long-term) private keys is compromised in the future. Type: Boolean (true/false) |
enable-permanent- vpn-tunnel |
VPN Tunnels are constantly kept active and as a result, make it easier to recognize malfunctions and connectivity problems Type: Boolean (true/false) |
enabled |
Indicates whether or not the remote site is enabled Type: Boolean (true/false) |
enc-method |
Indicates which encryption method is used Options: ike-v1, ike-v2, prefer-ike-v2 |
enc-profile |
Encryption profile (one of predefined profiles or custom) Type: virtual |
is-check-point-site |
Enable if the remote site is connected through a Check Point Security Gateway Type: Boolean (true/false) |
is-site-behind-static- nat |
Indicates if the remote site is behind static NAT Type: Boolean (true/false) |
link-selection-multiple-addrs addr |
IP address |
link-selection-probing- method |
The type of probing used for link selection when multiple IP addresses are configured for the remote site Options: ongoing, one-time |
match-cert-dn |
Indicates if certificate matching should match the DN string in the certificate to the configured DN string Type: Boolean (true/false) |
match-cert-dn-string |
Indicates the configured DN string for certificate matching Type: String |
match-cert-e-mail |
Indicates if certificate matching should match the E-mail string in the certificate to the configured E-mail string Type: Boolean (true/false) |
match-cert-e-mail- string |
Indicates the configured E-mail string for certificate matching Type: Email address |
match-cert-ip |
Indicates if certificate matching should match IP address in the certificate to the site’s IP address Type: Boolean (true/false) |
name |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
password |
Preshared secret (minimum 6 characters) to be used when authentication method is configured as such Type: vpnPassword |
phase1-reneg-interval |
The period, in minutes, between each IKE SA renegotiation Type: A number with no fractional part (integer) |
phase2-dh |
Determine the strength of the key used for the IPsec (Phase 2) key exchange process. The higher the group number, the stronger and more secure the key is. |
phase2-reneg-interval |
The period, in seconds, between each IPSec SA renegotiation Type: A number with no fractional part (integer) |
remote-site-enc-dom- type |
The method of defining the remote site’s encryption domain Options: manually-defined-enc-dom, route-all-traffic-to-site, route-based-vpn, enc-dom-hidden-behind-remote-site |
remote-site-host- name |
Indicates the host name of the remote site Type: An IP address or host name |
remote-site-ip- address |
Indicates the IP address of the remote site Type: IP address |
remote-site-link- selection |
Indicates the method of determining the destination IP address/s of the remote site Type: Press TAB to see available options |
static-nat-ip |
Indicates an external routable IP address via static NAT used by the remote site Type: IP address |
use-trusted-ca |
Indicates if a specific trusted CA is used for matching the remote site’s certificate or all configured trusted CAs |
Example
add vpn site name site17 remote-site-link-selection host-name remote-site-host-name myHost.com auth-method preshared-secret password
vpnPassword enabled true remote-site-enc-dom-type manually-defined-enc-dom enc-profile custom phase1-reneg-interval 15 phase2-reneg-interval
15 enable-perfect-forward-secrecy true phase2-dh word
is-check-point-site true enable-permanent-vpn-tunnel true disable-nat true aggressive-mode-enabled true aggressive-mode-DH-group word
aggressive-mode-enable-peer-id true aggressive-mode-peer-id-type domain-name aggressive-mode-peer-id vpnAggressiveModePeerId enc-method ike-v1
use-trusted-ca TEXT match-cert-ip true match-cert-dn true match-cert-dn-string TEXT match-cert-e-mail true match-cert-e-mail-string MyEmail@mail.com
link-selection-probing-method ongoing enabled true remote-site-enc-dom-type manually-defined-enc-dom enc-profile custom phase1-reneg-interval
15 phase2-reneg-interval 15 enable-perfect-forward-secrecy true phase2-dh word is-check-point-site true enable-permanent-vpn-tunnel
true disable-nat true aggressive-mode-enabled true aggressive-mode-DH-group word aggressive-mode-enable-peer-id true aggressive-mode-peer-id-type domain-name aggressive-mode-peer-id vpnAggressiveModePeerId enc-method
ike-v1 use-trusted-ca TEXT match-cert-ip true match-cert-dn true
match-cert-dn-string TEXT match-cert-e-mail true match-cert-e-mail-string MyEmail@mail.com link-selection-probing-method ongoing auth-method preshared-secret password vpnPassword enabled true remote-site-enc-dom-type manually-defined-enc-dom enc-profile custom phase1-reneg-interval
15 phase2-reneg-interval 15 enable-perfect-forward-secrecy true phase2-dh word is-check-point-site true enable-permanent-vpn-tunnel
true disable-nat true aggressive-mode-enabled true aggressive-mode-DH-group word aggressive-mode-enable-peer-id true aggressive-mode-peer-id-type
domain-name aggressive-mode-peer-id vpnAggressiveModePeerId enc-method ike-v1 use-trusted-ca TEXT match-cert-ip true match-cert-dn true match-cert-dn-string TEXT match-cert-e-mail true match-cert-e-mail-string MyEmail@mail.com
link-selection-probing-method ongoing enabled true remote-site-enc-dom-type manually-defined-enc-dom enc-profile custom phase1-reneg-interval
15 phase2-reneg-interval 15 enable-perfect-forward-secrecy true phase2-dh word is-check-point-site true enable-permanent-vpn-tunnel
true disable-nat true aggressive-mode-enabled true aggressive-mode-DH-group word aggressive-mode-enable-peer-id true aggressive-mode-peer-id-type
domain-name aggressive-mode-peer-id vpnAggressiveModePeerId enc-method ike-v1 use-trusted-ca TEXT match-cert-ip true match-cert-dn true match-cert-dn-string TEXT match-cert-e-mail true match-cert-e-mail-string MyEmail@mail.com
link-selection-probing-method ongoing
Output
Failure shows an appropriate error message.
Delete VPN sites.
Description
Delete an existing VPN site by name.
Syntax
delete vpn site name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Site name Type: A string that begins with a letter and contains up to 32 alphanumeric (0-9, a-z, _ -) characters without spaces |
Example
delete vpn site name site17
Output
Failure shows an appropriate error message.
Description
Delete all existing VPN sites.
Syntax
delete vpn site all
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete vpn site all
Output
Failure shows an appropriate error message.
Description
Show all configured remote VPN sites.
Syntax
show vpn sites
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show vpn sites
Output
Failure shows an appropriate error message.
Configure global settings for VPN site to site.
Description
Configure global settings for VPN site to site.
Syntax
set vpn site-to-site [ mode
<mode> ] [ default-access-to-lan
<default-access-to-lan> ] [ track
<track> ] [ local-encryption-domain
<local-encryption-domain> ] [ manual-source-ip-address
<manual-source-ip-address>
] [ source-ip-address-selection
<source-ip-address-selection> ] [ outgoing-interface-selection
<outgoing-interface-selection> ] [
use-dpd-responder-mode
<use-dpd-responder-mode> ] [ tunnel-health-monitor-mode
<tunnel-health-monitor-mode> ]
Parameters
Parameter |
Description |
---|---|
default-access-to-lan |
Allow traffic from remote sites (by default)âA˘ ˙I Options: block, accept |
local-encryption-domain |
Indicates if the local encryption domain is configured manually or determined automatically using the local networks Options: auto, manual |
manual-source-ip-address |
A manually configured source IP address to be used (if configured to) for VPN tunnels Type: IP address |
mode |
Indicates whether or not VPN site to site is active Type: Boolean (true/false) |
outgoing-interface-selection |
Indicates the method according to which the outgoing interface selection for VPN traffic is chosen Options: routing-table, route-based-probing |
source-ip-address-selection |
Select whether the source IP address is chosen automatically according to the outgoing interface or manually configured Options: automatically, manually |
track |
The default Logging setting for traffic from remote sites Options: none, log |
tunnel-health-monitor-mode |
VPN tunnel monitor mechanism, can work with permanent tunnel or with DPD mode Options: tunnel-test, dpd |
use-dpd-responder-mode |
Once checked DPD responder mode will be enabled, otherwise permanent tunnel based on DPD mode will be enabled Type: Boolean (true/false) |
Example
set vpn site-to-site mode true default-access-to-lan block track none local-encryption-domain auto manual-source-ip-address 192.168.1.1 source-ip-address-selection automatically outgoing-interface-selection routing-table use-dpd-responder-mode true tunnel-health-monitor-mode tunnel-test
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings sync-sa-with-other-cluster-members
<sync-sa-with-other-cluster-members>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings sync-sa-with-other-cluster-members
15
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings keep-dont-fragment-flag-on-packet
<keep-dont-fragment-flag-on-packet>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings keep-dont-fragment-flag-on-packet true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings delete-ipsec-sas-on-ikes-delete
<delete-ipsec-sas-on-ikes-delete>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings delete-ipsec-sas-on-ikes-delete true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings period-after-crl-not-valid
<period-after-crl-not-valid>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings period-after-crl-not-valid 2
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings log-notification-for-administrative-actions
<log-notification-for-administrative-actions>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings log-notification-for-administrative-actions none
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings udp-encapsulation-for-firewalls-and-proxies
<udp-encapsulation-for-firewalls-and-proxies>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings udp-encapsulation-for-firewalls-and-proxies true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings copy-diff-serv-from-ipsec-packet
<copy-diff-serv-from-ipsec-packet>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings copy-diff-serv-from-ipsec-packet true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings log-vpn-successful-key-exchange
<log-vpn-successful-key-exchange>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings log-vpn-successful-key-exchange none
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings dpd-triggers-new-ike-negotiation
<dpd-triggers-new-ike-negotiation>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings dpd-triggers-new-ike-negotiation true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings log-vpn-packet-handling-errors
<log-vpn-packet-handling-errors>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings log-vpn-packet-handling-errors none
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings keep-ikesa-keys
<keep-ikesa-keys>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings keep-ikesa-keys do-not-keep
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings permanent-tunnel-up-track
<permanent-tunnel-up-track>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings permanent-tunnel-up-track none
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings tunnel-test-from-internal
<tunnel-test-from-internal>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings tunnel-test-from-internal true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings vpn-tunnel-sharing
<vpn-tunnel-sharing>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings vpn-tunnel-sharing hosts
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings vpn-configuration-and-key-exchange-errors
<vpn-configuration-and-key-exchange-errors>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings vpn-configuration-and-key-exchange-errors none
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings reply-from-same-ip
<reply-from-same-ip>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings reply-from-same-ip true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings no-local-dns-encrypt
<no-local-dns-encrypt>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings no-local-dns-encrypt true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings is-admin-access-agnostic
<is-admin-access-agnostic>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings is-admin-access-agnostic true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings period-before-crl-valid
<period-before-crl-valid>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings period-before-crl-valid 5
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings maximum-concurrent-vpn-tunnels
<maximum-concurrent-vpn-tunnels>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings maximum-concurrent-vpn-tunnels
5
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings limit-open-sas
<limit-open-sas>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings limit-open-sas 5
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings permanent-tunnel-down-track
<permanent-tunnel-down-track>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings permanent-tunnel-down-track none
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings enable-link-selection
<enable-link-selection>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings enable-link-selection true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings check-validity-of-ipsec-reply-packets
<check-validity-of-ipsec-reply-packets>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings check-validity-of-ipsec-reply-packets true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings ike-dos-protection-unknown-sites
<ike-dos-protection-unknown-sites>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings ike-dos-protection-unknown-sites none
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings ike-dos-protection-known-sites
<ike-dos-protection-known-sites>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings ike-dos-protection-known-sites none
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings maximum-concurrent-ike-negotiations
<maximum-concurrent-ike-negotiations>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings maximum-concurrent-ike-negotiations
20
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings log-vpn-outgoing-link
<log-vpn-outgoing-link>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings log-vpn-outgoing-link none
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings delete-ike-sas-from-a-dead-peer
<delete-ike-sas-from-a-dead-peer>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings delete-ike-sas-from-a-dead-peer true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings timeout-for-an-rdp-packet-reply
<timeout-for-an-rdp-packet-reply>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings timeout-for-an-rdp-packet-reply
15
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings perform-ike-using-cluster-ip
<perform-ike-using-cluster-ip>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings perform-ike-using-cluster-ip true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings reply-from-incoming-interface
<reply-from-incoming-interface>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings reply-from-incoming-interface true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings ike-use-largest-possible-subnets
<ike-use-largest-possible-subnets>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings ike-use-largest-possible-subnets true
Output
Failure shows an appropriate error message.
Description
Configure advanced settings for VPN site to site.
Syntax
set vpn site-to-site advanced-settings copy-diff-serv-to-ipsec-packet
<copy-diff-serv-to-ipsec-packet>
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set vpn site-to-site advanced-settings copy-diff-serv-to-ipsec-packet true
Output
Failure shows an appropriate error message.
Shows configuration of site-to-site VPN.
Description
Shows configuration of site-to-site VPN.
Syntax
show vpn site-to-site
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show vpn site-to-site
Output
Failure shows an appropriate error message.
Description
Shows advanced settings of site-to-site VPN.
Syntax
show vpn site-to-site advanced-settings
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show vpn site-to-site advanced-settings
Output
Failure shows an appropriate error message.
Configures manually the local encryption domain for site-to-site VPN
Description
Adds a network object to the local encryption domain for site-to-site VPN.
Syntax
set vpn site-to-site enc-dom manual add name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name |
Example
set vpn site-to-site enc-dom manual add name TEXT
Output
Failure shows an appropriate error message.
Description
Removes all network objects from the local encryption domain for site-to-site VPN.
Syntax
set vpn site-to-site enc-dom manual remove-all name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name |
Example
set vpn site-to-site enc-dom manual remove-all name TEXT
Output
Failure shows an appropriate error message.
Description
Removes a network object from the local encryption domain for site-to-site VPN.
Syntax
set vpn site-to-site enc-dom manual remove name
<name>
Parameters
Parameter |
Description |
---|---|
name |
Network Object name |
Example
set vpn site-to-site enc-dom manual remove name TEXT
Output
Failure shows an appropriate error message.
Description
Shows all IKE (Internet Key Exchange) and IPSec (Internet Protocol Security) SAs (Security Associations) for the VPN tunnel.
Syntax
show vpn-tunnel-info
Parameters
Parameter |
Description |
---|---|
|
|
Example
show vpn-tunnel-info
Output
Success shows information about the VPN tunnel. Failure shows an appropriate error message.
Description
Shows all Virtual Tunnel Interfaces (VTIs).
Syntax
show vpn tunnels
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show vpn tunnels
Output
Failure shows an appropriate error message.
Description
Delete an existing wireless Virtual Access Point (VAP) by SSID.
Syntax
delete wlan vap
<vap>
Parameters
Parameter |
Description |
---|---|
vap |
The name of the Virtual Access Point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
delete wlan vap My_Network
Output
Failure shows an appropriate error message.
Configures a virtual access point (VAP) wireless network in appliance models that contain wireless options).
Description
Enable/Disable the first wireless network (VAP) that was created.
Syntax
set wlan { enable | disable }
Parameters
Parameter |
Description |
---|---|
mode |
The mode of the Virtual Access Point Options: on, off |
Example
set wlan on
Output
Failure shows an appropriate error message.
Description
Configures the SSID of the first wireless network that was created.
Syntax
set wlan ssid
<ssid>
Parameters
Parameter |
Description |
---|---|
ssid |
Wireless network name (SSID) Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and space characters |
Example
set wlan ssid My wireless
Output
Failure shows an appropriate error message.
Description
Configures the first wireless network that was created.
Syntax
set wlan security-type
<security-type>
Parameters
Parameter |
Description |
---|---|
security-type |
Security Type Options: none, WEP, WPA2, WPA/WPA2 |
Example
set wlan security-type none
Output
Failure shows an appropriate error message.
Description
Configures the first wireless network that was created.
Syntax
set wlan wpa-auth-type password
<password> [ hotspot
<hotspot > ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set wlan wpa-auth-type password gTd&3(gha_ hotspot on
Output
Failure shows an appropriate error message.
Description
Configures the first wireless network that was created.
Syntax
set wlan wpa-auth-type { radius [ hotspot
<hotspot > ] }
Parameters
Parameter |
Description |
---|---|
hotspot |
The Hotspot of the Virtual Access Point Options: on, off |
wpa-auth-type |
Wireless protected access authentication Type: Press TAB to see available options |
Example
set wlan wpa-auth-type radius hotspot on
Output
Failure shows an appropriate error message.
Description
Configures the first wireless network that was created.
Syntax
set wlan wpa-encryption-type
<wpa-encryption-type>
Parameters
Parameter |
Description |
---|---|
wpa-encryption-type |
Wireless protected access encryption type Options: Auto, CCMP-AES, TKIP |
Example
set wlan wpa-encryption-type Auto
Output
Failure shows an appropriate error message.
Description
Configures the first wireless network that was created.
Syntax
set wlan assignment
<assignment>
Parameters
Parameter |
Description |
---|---|
assignment |
The network assigned to the virtual access point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set wlan assignment My_Network
Output
Failure shows an appropriate error message.
Description
Enable/Disable an existing wireless network (VAP).
Syntax
set wlan vap
<vap> { enable | disable }
Parameters
Parameter |
Description |
---|---|
mode |
The mode of the Virtual Access Point Options: on, off |
vap |
The name of the Virtual Access Point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set wlan vap My_Network on
Output
Failure shows an appropriate error message.
Description
Configures the SSID of an existing wireless network (VAP).
Syntax
set wlan vap
<vap> ssid
<ssid>
Parameters
Parameter |
Description |
---|---|
ssid |
Wireless network name (SSID) Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and space characters |
vap |
The name of the Virtual Access Point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set wlan vap My_Network ssid My wireless
Output
Failure shows an appropriate error message.
Description
Configures an existing wireless network (VAP).
Syntax
set wlan vap
<vap> security-type
<security-type>
Parameters
Parameter |
Description |
---|---|
security-type |
Security Type Options: none, WEP, WPA2, WPA/WPA2 |
vap |
The name of the Virtual Access Point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set wlan vap My_Network security-type none
Output
Failure shows an appropriate error message.
Description
Configures an existing wireless network (VAP).
Syntax
set wlan vap
<vap> wpa-auth-type password
<password> [ hotspot
<hotspot > ]
Parameters
Parameter |
Description |
---|---|
vap |
The name of the Virtual Access Point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set wlan vap My_Network wpa-auth-type password gTd&3(gha_ hotspot on
Output Failure shows an appropriate error message.
Output
Failure shows an appropriate error message.
Description
Configures an existing wireless network (VAP).
Syntax
set wlan vap
<vap> wpa-auth-type { radius [ hotspot
<hotspot > ] }
Parameters
Parameter |
Description |
---|---|
hotspot |
The Hotspot of the Virtual Access Point Options: on, off |
vap |
The name of the Virtual Access Point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
wpa-auth-type |
Wireless protected access authentication Type: Press TAB to see available options |
Example
set wlan vap My_Network wpa-auth-type radius hotspot on
Output
Failure shows an appropriate error message.
Description
Configures an existing wireless network (VAP).
Syntax
set wlan vap
<vap> wpa-encryption-type
<wpa-encryption-type>
Parameters
Parameter |
Description |
---|---|
vap |
The name of the Virtual Access Point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
wpa-encryption-type |
Wireless protected access encryption type Options: Auto, CCMP-AES, TKIP |
Example
set wlan vap My_Network wpa-encryption-type Auto
Output
Failure shows an appropriate error message.
Description
Configures an existing wireless network (VAP).
Syntax
set wlan vap
<vap> assignment
<assignment>
Parameters
Parameter |
Description |
---|---|
assignment |
The network assigned to the virtual access point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
vap |
The name of the Virtual Access Point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
set wlan vap My_Network assignment My_Network
Output
Failure shows an appropriate error message.
Shows configuration for wireless networks (relevant to hardware models with wireless).
Description
Shows configuration for a virtual access point (VAP or wireless network).
Syntax
show wlan vap
<vap>
Parameters
Parameter |
Description |
---|---|
vap |
The name of the Virtual Access Point Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and ’/’ characters |
Example
text
show wlan vap My_Network
Output
Failure shows an appropriate error message.
Description
Shows configuration of the wireless radio.
Syntax
text
show wlan
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show wlan
Output
Failure shows an appropriate error message.
Configures the radio settings of wireless antennas (in appliance models that contain wireless options).
Description
Configures the radio settings of wireless antennas.
Syntax
set wlan radio [ country
<country> ] [ operation-mode
<operation-mode> ] [ channel
<channel> ] [ channel-width
<channel-width> ]
Parameters
Parameter |
Description |
---|---|
channel |
Channel Options: channel |
channel-width |
Channel width Options: auto, 20, 40, 80 |
country |
Country Options: country |
operation-mode |
Operation mode Options: 11b, 11g, 11bg, 11n, 11ng, 11ac, 11nac |
Example
set wlan radio country albania operation-mode 11b channel auto channel-width auto
Output
Failure shows an appropriate error message.
Description
Configures the radio settings of wireless antennas per band (in wireless models that contain a concurrent dual band option using two radio antennas).
Syntax
set wlan radio band
<band> [ country
<country> ] [ operation-mode
<operation-mode> ] [ channel
<channel> ] [ channel-width
<channel-width> ]
Parameters
Parameter |
Description |
---|---|
band |
type Options: 5GHz, 2.4GHz |
channel |
Channel Options: channel |
channel-width |
Channel width Options: auto, 20, 40, 80 |
country |
Country Options: country |
operation-mode |
Operation mode Options: 11b, 11g, 11bg, 11n, 11ng, 11ac, 11nac |
Example
set wlan radio band 5GHz country albania operation-mode 11b channel auto channel-width auto
Output
Failure shows an appropriate error message.
Description
Enable/Disable the wireless radio.
Syntax
set wlan radio { off | on }
Parameters
Parameter |
Description |
---|---|
mode |
Wireless radio mode Options: off, on |
Example
set wlan radio off
Output
Failure shows an appropriate error message.
Description
Enable/Disable the wireless radio per band (in wireless models that contain a concurrent dual band option using two radio antennas).
Syntax
set wlan radio band <band> { off | on }
Parameters
Parameter |
Description |
---|---|
band |
type Options: 5GHz, 2.4GHz |
mode |
Wireless radio mode Options: off, on |
Example
set wlan radio band 5GHz off
Output
Failure shows an appropriate error message.
Description
Configures advanced radio settings for the wireless radio.
Syntax
set wlan radio advanced-settings [ transmitter-power
<transmitter-power> ] [ guard-interval
<guard-interval> ] [ antenna
<antenna> ]
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
set wlan radio advanced-settings transmitter-power minimum guard-interval short antenna auto
Output
Failure shows an appropriate error message.
Description
Configures advanced radio settings for the wireless radio per band (in wireless models that contain a concurrent dual band option using two radio antennas).
Syntax
set wlan radio band
<band> advanced-settings [ transmitter-power
<transmitter-power> ] [ guard-interval
<guard-interval> ] [ antenna
<antenna>
]
Parameters
Parameter |
Description |
---|---|
band |
type Options: 5GHz, 2.4GHz |
Example
set wlan radio band 5GHz advanced-settings transmitter-power minimum guard-interval short antenna auto
Output
Failure shows an appropriate error message.
Description
Shows configuration of the wireless radio.
Syntax
show wlan radio
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show wlan radio
Output
Failure shows an appropriate error message.
Description
Shows statistics of the wireless radio.
Syntax
show wlan statistics
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show wlan statistics
Output
Failure shows an appropriate error message.
Description
Adds a new wireless network (Virtual Access Point or VAP) to an available wireless radio. In hardware models were dual antennas are available, during configuration of a wireless network the specific band for the network must be selected (2.4Ghz/5Ghz).
Syntax
add wlan vap ssid
<ssid> band
<band>
Parameters
Parameter |
Description |
---|---|
band |
Wireless radio transmitter Options: 5GHz, 2.4GHz |
ssid |
Wireless network name (SSID) Type: A string that contains [A-Z], [0-9], ’_’, ’.’, ’-’ and space characters |
Example
add wlan vap ssid My wireless band 5GHz
Output
Failure shows an appropriate error message.
Description
Delete all existing wireless Virtual Access Points (VAP).
Syntax
delete wlan vaps
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
delete wlan vaps
Output
Failure shows an appropriate error message.
Description
Use MAC address as wireless password.
Syntax
set wlan vap
<vap> wpa-auth-type password-set-as-mac-with-prefix
<prefix>
Parameters
Parameter |
Description |
---|---|
vap |
Name of the VAP that is being edited. |
prefix |
The authentication type is password-set-as-mac-with-prefix. |
Example
set wlan vap Guest1 wpa-auth-type password-set-as-mac-with-prefix aaa
Output
Failure shows an appropriate error message.
Description
Shows all Virtual Access points (VAPs or wireless network).
Syntax
show wlan vaps
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show wlan vaps
Output
Failure shows an appropriate error message.
Description
Shows statistics per Virtual Access Point.
Syntax
show wlan vaps statistics
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show wlan vaps statistics
Output
Failure shows an appropriate error message.
Description
Configure parameters for the ZeroTouch service.
Syntax
set zero-touch [ cloud-url
<cloud-url> ] [ verify-certificate
<verify-certificate> ] [ mode
<mode> ]
Parameters
Parameter |
Description |
---|---|
cloud-url |
The DNS or IP address of the cloud service. Default: Type: URL or IP address |
mode |
When the mode is set to on, the appliance will constantly try to fetch configuration from the Zero Touch server if the First Time Configuration Wizard is not started. Options: on, off Default: on |
verify-certificate |
When verify-certificate is set to on, the appliance will verify the SSL certificate of the Zero Touch server. You are advised NOT to change this value. Options: on, off Default: on |
Example
set zero-touch cloud-url
<url> verify-certificate on mode on
Output
Failure shows an appropriate error message.
Description
Show the parameters configured for the Zero Touch service.
Syntax
show zero-touch
Parameters
Parameter |
Description |
---|---|
n/a |
|
Example
show zero-touch
Output
Failure shows an appropriate error message.
Description
Test the procedure of receiving configuration from the Zero Touch server. If the command is executed without parameters, the gateway will connect to the Zero Touch server and display the received configuration without enforcing it. There is an option to store the configuration in the /storage/zt_cfg.clish
file.
Syntax
test zero-touch-request [save-config-as file ]
Parameters
Optional Parameter |
Description |
---|---|
save-configuration-as file |
Save received configuration to the |
Example
test zero-touch-request
test zero-touch-request save-config-as file
Output
Failure shows an appropriate error message.