List of Available Extended Commands in Roles
Command name |
Command name |
Description |
---|---|---|
|
|
Starts, stops, or checks the status of the API server |
|
|
Runs the Gaia Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. First Time Configuration tool in Expert mode. |
|
|
Runs the Check Point configuration utility for some local settings. |
|
|
Runs the Check Point Internal Certificate Authority (ICA Internal Certificate Authority. A component on Check Point Management Server that issues certificates for authentication.). |
|
|
Controls the Check Point Internal Certificate Authority (ICA). |
|
|
Creates the Check Point Internal Certificate Authority (ICA) database. |
|
|
Controls the Check Point Internal Certificate Authority (ICA) database. |
|
|
Runs the Check Point Configuration Tool for Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. and Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.. |
|
|
Access to clustering commands. |
|
|
Enables the clustering feature on Security Gateway. |
|
|
Disables the clustering feature on Security Gateway. |
|
|
Collects the Check Point diagnostics information. |
|
|
Controls the Check Point licenses. |
|
|
Shows the Check Point SVN Foundation version. |
|
|
Starts the installed Check Point products. |
|
|
Shows the Check Point statistics history information for Software Blades and Gaia. |
|
|
Stops the installed Check Point products. |
|
|
Shows the advanced Check Point statistics information for Software Blades and Gaia in real-time. |
|
|
Controls the Check Point WatchDog administration tool. |
|
|
Sends the system diagnostics information. |
|
|
Controls the Endpoint Policy Server commands. |
|
|
Starts the QoS Check Point Software Blade on a Security Gateway that provides policy-based traffic bandwidth management to prioritize business-critical traffic and guarantee bandwidth and control latency. Software Blade Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities.. |
|
|
Stops the QoS Software Blade. |
|
|
Controls the QoS Software Blade. |
|
|
Controls the FIPS mode. |
|
|
Access to Security Gateway commands for IPv4. |
|
|
Access to Security Gateway commands for IPv6. |
|
|
Access to SecureXL Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that passes through a Security Gateway. commands for IPv4. |
|
|
Access to SecureXL commands for IPv6. |
|
|
Access to Security Management commands. |
|
|
Deprecated. Use "show interface", or "set interface" commands instead. |
|
|
Controls the IPS Check Point Software Blade on a Security Gateway that inspects and analyzes packets and data for numerous types of risks (Intrusion Prevention System). Software Blade. |
|
|
Configures the LOM Card IP address. |
|
|
|
|
|
Enables the SmartProvisioning. |
|
|
|
|
|
Restores the backup of the Multi-Domain Server. |
|
|
Access to Multi-Domain Server command line. |
|
|
Runs the Check Point Configuration Tool for Multi-Domain Server. |
|
|
Starts the Multi-Domain Server. |
|
|
Starts a specific Domain Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server.. |
|
|
Shows the status of the Multi-Domain Server and all Domain Management Servers. |
|
|
Stops the Multi-Domain Server. |
|
|
Stops a specific Domain Management Server. |
|
|
Shows network connections, routing tables, and interface statistics. |
|
|
Sends pings to a host using IPv4. |
|
|
Sends pings to a host using IPv6. |
|
|
Access to RAID Monitoring tool. |
|
|
Access to RAID Configuration and Monitoring tool. |
|
|
Controls the Monitoring Software Blade. |
|
|
Starts the Monitoring Software Blade. |
|
|
Stops the Monitoring Software Blade. |
|
|
Monitors top services using the Monitoring Software Blade. |
|
|
Access to Software Distribution Server utility. |
|
|
Access to SecureXL SIM device commands for IPv4. |
|
|
Access to the IPS Snort conversion tool. |
|
|
Access to the Threat Emulation Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE. Software Blade shell. |
|
|
Shows the most active system processes. |
|
|
Runs the trace tool. |
|
|
Controls the VPN kernel module for IPv4. |
|
|
Controls the VPN kernel module for IPv6. |
|
|
Controls the managed VSX Virtual System Extension. Check Point virtual networking solution, hosted on a computer or cluster with virtual abstractions of Check Point Security Gateways and other network devices. These Virtual Devices provide the same functionality as their physical counterparts. Gateways and VSX Clusters on a Management Server. |