List of Available Extended Commands in Roles
|
Important - Read the Known Limitations for R82 in sk181128. |
Command name |
Command name |
Description |
---|---|---|
|
|
Starts, stops, or checks the status of the API server |
|
|
Runs the Check Point configuration utility for some local settings. |
|
|
Runs the Check Point Internal Certificate Authority (ICA). |
|
|
Controls the Check Point Internal Certificate Authority (ICA). |
|
|
Creates the Check Point Internal Certificate Authority (ICA) database. |
|
|
Controls the Check Point Internal Certificate Authority (ICA) database. |
|
|
Runs the Check Point Configuration Tool for Security Management Server and Security Gateway. |
|
|
Access to clustering commands. |
|
|
Enables the clustering feature on Security Gateway. |
|
|
Disables the clustering feature on Security Gateway. |
|
|
Collects the Check Point diagnostics information. |
|
|
Controls the Check Point licenses. |
|
|
Starts the installed Check Point products. |
|
|
Shows the Check Point statistics history information for Software Blades and Gaia. |
|
|
Stops the installed Check Point products. |
|
|
Shows the advanced Check Point statistics information for Software Blades and Gaia in real-time. |
|
|
Controls the Check Point WatchDog administration tool. |
|
|
Sends the system diagnostics information. |
|
|
Controls the Endpoint Policy Server commands. |
|
|
Starts the QoS Software Blade. |
|
|
Stops the QoS Software Blade. |
|
|
Controls the QoS Software Blade. |
|
|
Controls the FIPS mode. |
|
|
Access to Security Gateway commands for IPv4. |
|
|
Access to Security Gateway commands for IPv6. |
|
|
Access to SecureXL commands for IPv4. |
|
|
Access to SecureXL commands for IPv6. |
|
|
Access to Security Management commands. |
|
|
Deprecated. Use "show interface", or "set interface" commands instead. |
|
|
Monitoring on Scalable Platforms. |
|
|
Controls the IPS Software Blade. |
|
|
Configures the LOM Card IP address. |
|
|
Access to SmartProvisioning command line. |
|
|
Enables the SmartProvisioning. |
|
|
Shows network connections, routing tables, and interface statistics. |
|
|
Sends pings to a host using IPv4. |
|
|
Sends pings to a host using IPv6. |
|
|
Access to RAID Monitoring tool. |
|
|
Access to RAID Configuration and Monitoring tool. |
|
|
Controls the Monitoring Software Blade. |
|
|
Starts the Monitoring Software Blade. |
|
|
Stops the Monitoring Software Blade. |
|
|
Monitors top services using the Monitoring Software Blade. |
|
|
Access to SecureXL SIM device commands for IPv4. |
|
|
Access to the IPS Snort conversion tool. |
|
|
Access to the Threat Emulation Software Blade shell. |
|
|
Shows the most active system processes. |
|
|
Runs the trace tool. |
|
|
Controls the VPN kernel module for IPv4. |
|
|
Controls the VPN kernel module for IPv6. |
|
|
Controls the managed VSX Gateways and VSX Clusters on a Management Server. |