Display information on ACME objects state and also restart the client.
Description
Display information about ACME objects.Usage
acme -num=<n>Show summary information about ACME objects.
acme -show [<ACME Certificate Management>]Show detailed certificate information.
acme -restartRestart the ACME client, resetting all object states.
acme -snoop [-on] [-off] [-verbose]Show requests and responses on the console.
Options
Show alarm information.
Description
Show list of currently active alarms.Usage
alarm [-history] [-active]
Options
Show application control status.
Description
Browse the applications defined in the Application Control functionality. Saved browsing results as filters that can be later used to define IPPolicies.Usage
appcontrolShow general information about application control system.
appcontrol -show_listsList information about specified application.
appcontrol -delete_lists={ALL | <Integer>}List information about specified application.
appcontrol <Name>List information about specified application.
appcontrol -application=<String> [-save_list]Define a filter selecting individual applications.
appcontrol -filter [-name=<String>] [-family=<String>] [-risk={VERY_LOW | LOW | MEDIUM | HIGH | VERY_HIGH}] [-tag=<String>] [-save_list]Define a filter selecting families, tags, risks and a matching expression for the applications names.
Options
Show ARP entries for given interface.
Description
List the ARP cache entries of specified interfaces.If no interface is given the ARP cache entries of all interfaces will be presented.
The presented list can be filtered using the ip
and hw
options.
Usage
arpShow all ARP entries.
arp -show [<Interface>] [-ip=<pattern>] [-hw=<pattern>] [-num=<n>]Show ARP entries.
arp -hashinfo [<Interface>]Show information on hash table health.
arp -flush [<Interface>]Flush ARP cache of specified interface.
arp -notify=<ip> [<Interface>] [-hwsender=<Ethernet Address>]Send gratuitous ARP for IP.
Options
Toggle snooping and displaying of ARP requests.
Description
Toggle snooping and displaying of ARP queries and responses on-screen.The snooped messages are displayed before the access section validates the sender IP addresses in the ARP data.
Usage
arpsnoopShow snooped interfaces.
arpsnoop {ALL | NONE | <interface>} [-verbose]Snoop specified interface.
Options
![]() |
Note |
---|---|
Requires Administrator privileges. |
Show active ARP Transaction States.
Description
Show active ARP Transaction States.Usage
ats [-num=<n>]
Options
Shows the state of the Authentication Agents.
Description
Shows the state of the Authentication Agents.Usage
authagent -versionShows the state of the configured Authentication Agents including the protocol version.
authagentShows the state of the configured Authentication Agents.
authagent {ALL | <AuthAgent>}Shows the state of the configured Authentication Agents.
authagent -reconnect {ALL | <AuthAgent>}Closes the connection with the Agent and attempst to reconnect.
Options
Toggle snooping and displaying of Authentication Agents traffic.
Description
Toggle snooping and displaying of Authentication Agents queries and responses on-screen.Usage
authagentsnoopShow snooped Authentication Agents.
authagentsnoop {ALL | NONE | <AuthAgent>} [-verbose]Snoop specified Authentication Agent.
Options
![]() |
Note |
---|---|
Requires Administrator privileges. |
Blacklist.
Description
Block and unblock hosts on the black and white list.Note: Static blacklist hosts cannot be unblocked.
If -force
is not specified, only the exact host with the service, protocol/port and destiny specified is unblocked.
Example 2.7. Block hosts
blacklist -show -black -listtime -info blacklist -block 100.100.100.0/24 -serv=FTP -dest=50.50.50.1 -time=6000
Usage
blacklistShow the current blacklist and whitelist content.
blacklist -show [-num={ALL | <Integer>}] [-alerttype={IDS | HOST_THRESHOLD | NETWORK_THRESHOLD | CLI | REST | DOS_GENERAL | DOS_GEOIP | BOTNET | SCANNER | SPAM | PHISHING | ALL}] [-creationtime] [-dynamic] [-listtime] [-info] [-black] [-white] [-all]Show information about the blacklisted hosts.
blacklist -block <host> [-serv=<service>] [-prot={TCP | UDP | ICMP | OTHER | TCPUDP | ALL}] [-port=<port number>] [-dest=<ip address>] [-time=<seconds>]Block specified netobject.
blacklist -unblock <host> [-serv=<service>] [-prot={TCP | UDP | ICMP | OTHER | TCPUDP | ALL}] [-port=<port number>] [-dest=<ip address>] [-force]Unblock specified netobject.
blacklist -purge {IDS | HOST_THRESHOLD | NETWORK_THRESHOLD | CLI | REST | DOS_GENERAL | DOS_GEOIP | BOTNET | SCANNER | SPAM | PHISHING}Unblock all netobject of specific alert type.
Options
CAM table information.
Description
Show information about the CAM table(s) and their entries.Usage
cam -num=<n>Show CAM table information.
cam <Interface> [-num=<n>]Show interface-specified CAM table information.
cam <Interface> [-flush]Flush CAM table information of specified interface.
cam -flushFlush CAM table information.
Options
Show the contents of the certificate cache.
Description
Show all certificates in the certificate cache.Usage
certcache [-verbose] [-flush]
Options
List current state-tracked connections.
Description
List current state-tracked connections.Usage
connections -show [-extended] [-num=<n>] [-verbose] [-srciface=<interface>] [-destiface=<interface>] [-ipver={IPV6 | IPV4}] [-srcip=<ip address>] [-destip=<ip address>] [-protocol=<name/num>] [-srcport=<port>] [-destport=<port>] [-dataless=<bytes>] [-datamore=<bytes>]List connections.
connectionsSame as "connections -show".
connections -close [-all] [-srciface=<interface>] [-destiface=<interface>] [-ipver={IPV6 | IPV4}] [-srcip=<ip address>] [-destip=<ip address>] [-protocol=<name/num>] [-srcport=<port>] [-destport=<port>] [-dataless=<bytes>] [-datamore=<bytes>]Close connections.
Options
Show the contents of the crash.dmp file.
Description
Show the contents of the crash.dmp file, if it exists.Usage
crashdumpShow the contents of the crash.dmp file.
crashdump -removeRemove all stored crashdumps.
Options
Show information about crypto accelerators.
Description
Show information about active crypto accelerators.Usage
cryptostat [-all] [-hashinfo]
Options
Status of the Distributed Checksum Clearinghouses (DCC) anti-spam service.
Description
Shows status of the DCC service.Usage
dcc
Displays the content of the diagnose console.
Description
The diagnose console is used to help troubleshooting internal problems within the firewallUsage
dconsole [-clean] [-flush] [-date=<date>] [-onlyhigh]
Options
Display information about DHCP-enabled interfaces or modify/update their leases.
Description
Display information about a DHCP-enabled interface.Usage
dhcpList DHCP enabled interfaces.
dhcp -listList DHCP enabled interfaces.
dhcp -show [<interface>]Show information about DHCP enabled interface.
dhcp -lease={RENEW | RELEASE} <interface>Modify interface lease.
Options
Show DHCP/BOOTP relayer ruleset.
Description
Display the content of the DHCP/BOOTP relayer ruleset and the current routed DHCP relays.Display filter filters relays based on interface/ip (example: if1 192.168.*)
Usage
dhcprelayShow the currently relayed DHCP sessions.
dhcprelay -show [-num={ALL | <Integer>}] [-rules] [-routes] [<display filter>]...Show DHCP/BOOTP relayer ruleset.
dhcprelay -release <ip address> [-interface=<Interface>]Terminate relayed session.
Options
Show content of the DHCP server ruleset.
Description
Show the content of the DHCP server ruleset and various information about active/inactive leases.Display filter filters entries based on Interface/MAC/IP (example: If1 192.168.*)
Usage
dhcpserverShow DHCP server leases.
dhcpserver -show [-rules] [-leases] [-num=<Integer>] [-fromentry=<Integer>] [-mappings] [-utilization] [<Display filter>]...Show DHCP server ruleset.
dhcpserver -release={BLACKLIST}Release a specific types of IPs.
dhcpserver -releaseip <Interface> <IP address>Release an active IP.
Options
Display information about DHCPv6-enabled interfaces or modify/update their leases.
Description
Display information about a DHCPV6-enabled interface.Usage
dhcpv6List DHCPv6 enabled interfaces.
dhcpv6 -listList DHCPv6 enabled interfaces.
dhcpv6 -show [<interface>]Show information about DHCPv6 enabled interface.
dhcpv6 -lease={RENEW | RELEASE} <interface>Modify interface lease.
Options
Show content of the DHCPv6 server ruleset.
Description
Show the content of the DHCPv6 server ruleset and various information about active/inactive leases.Display filter filters leases based on interface/mac/ip (example: if1 2001:DB8::*)
Usage
dhcpv6serverShow DHCPv6 server leases.
dhcpv6server -releaseip <interface> <IPv6 address>Release an active IP6.
dhcpv6server -show [-rules] [-leases] [-num=<Integer>] [-fromentry=<Integer>] [<display filter>]...Show DHCP server ruleset.
Options
DNS client and queries.
Description
Show status of the DNS client and manage pending DNS queries.Usage
dns -cache [<FQDNAddress>] [-num=<n>] [-verbose]Show contents of DNS cache.
dns -flushFlush the contents of DNS cache.
dns -refresh [<FQDNAddress>]Set FQDN cache object to start DNS query.
dnsShow status of the DNS client.
dns -query <domain name> [-type={A | AAAA}]Resolve domain name.
dns -listList pending DNS queries.
dns -removeRemove all pending DNS queries.
Options
DNSBL.
Description
Show status of DNSBL.Usage
dnsbl [-show] [<SMTP ALG>] [-clean]
Options
DNS Control ALG commands.
Description
Show status for DNS Control ALG sessions.Usage
dnscontrolList DNS Control Sessions.
dnscontrol -list [-num[=<Integer>]] [-verbose]List DNS Control Sessions (Advanced).
dnscontrol -statsShow DNS control statistics.
Options
Show dynamic routing policy.
Description
Show the dynamic routing policy filter ruleset and current exports.In the "Flags" field of the dynrouting exports, the following letters are used:
Usage
dynroute [-rules] [-exports]
Options
Ethernet address OUI lookup.
Description
Ethernet address OUI lookup.Usage
enetvendor -hw=<Ethernet Address>
Options
Manage and show status for fallback policy.
Description
Display fallback policy status and preform various related actionsUsage
fallbackDisplay status for all policies.
fallback -status <String>Display status for specific policy.
fallback -suspend <String> <ip address>Suspend load distribution to primary server.
fallback -resume <String> <ip address>Resume load distribution to primary server.
Options
File download stats.
Description
Show statistics of the File Download engine.Usage
filedownloadShow active downloads.
filedownload -inactiveShow inactive downloads.
filedownload -activeShow active downloads.
Options
Show active fragment reassemblies.
Description
List active fragment reassemblies.More detailed information can optionally be obtained for specific reassemblies:
Usage
frags [{NEW | ALL | <reassembly id>}] [-free] [-done] [-num=<n>]
Options
Show and change HA status.
Description
Show current HA status.Usage
ha [-activate] [-deactivate]
Options
Show Host Monitor statistics.
Description
Show active Host Monitor sessions.Usage
hostmon [-verbose] [-num=<n>]
Options
Commands related to the HTTP Application Layer Gateway.
Description
Show information about the WCF cache or list the overridden WCF hosts.Usage
httpalg -override [-flush]List or flush hosts that have overridden the wcf filter.
httpalg -wcfcache [-show] [-url=<String>] [-flush] [-verbose] [-count] [-server[={STATUS | CONNECT | DISCONNECT}]] [-num=<n>]Display URL cache information.
Options
Display HTTP Poster status.
Description
Display configuration and status of configured HTTPPoster_URLx targets.Usage
httpposter [-repost=<Integer>]
Options
Show hardware monitor sensor status.
Description
Show hardware monitor sensor status.Usage
hwm [-all] [-verbose]
Options
Show and remove hosts that are piped by IDP.
Description
Show list of currently piped hosts.Usage
idppipesList all idppipes.
idppipes -show [-host=<ip addr>]Lists hosts for which new connections are piped by IDP.
idppipes -unpipe [-all] [-host=<ip addr>]Remove piping for the specified host.
Options
Show interface statistics.
Description
Show list of attached interfaces, or in-depth information about a specific interface.Usage
ifstat [<Interface>] [-filter=<expr>] [-pbr=<table name>] [-num=<n>] [-type={ETHERNET | IFACEGROUP | ZONE | ALL}] [-restart] [-allindepth] [-maclist] [-snmpnewindexes] [-extend]
Options
IGMP Interfaces.
Description
Show information about the current state of the IGMP interfaces.Send simulated messages to test configuration of the interface.
Usage
igmpPrints the current IGMP state.
igmp -state [<Interface>]Prints the current IGMP state. If an interface is specified, more details are provided.
igmp -query <Interface> [<MC address> [<router address>]]Simulate an incoming IGMP query message.
igmp -join <Interface> <MC address> [<host address>]Simulate an incoming IGMP join message.
igmp -leave <Interface> <MC address> [<host address>]Simulate an incoming IGMP leave message.
Options
Initiate/delete/show IKE negotiated SAs.
Description
Command to do various operations on IKE negotiated Security Associations.Usage
ike -stat [<IPsecTunnelBase>] [-cfgmode]Show global or interface statistics about IKE SAs.
ike -memShow memory statistics about the IKE enigne.
ike -delete [<ip address>] [-srcif=<Interface>] [-tunnel=<IPsecTunnelBase>] [-force]Delete IKE SAs.
ike -connect [<IPsecTunnelBase>]Setup IKE and IPsec SAs for a specified tunnel.
ike -tunnels [<IPsecTunnelBase>] [-num={ALL | <Integer>}] [-force]Show configured tunnels.
ike -show [<ip address>] [-num={ALL | <Integer>}] [-srcif=<Interface>] [-verbose] [-force] [-tunnel=<IPsecTunnelBase>]Show current IKE SAs.
ike -snoop [<ip address>] [-match] [-brief] [-off]Enable/disable IKE snooping.
ike -ha [-clear]Shows statistics about IKE/IPsec SAs synchronized and how many that failed to import. Sent statistics shows how many packets that has been sent to the other cluster member when this node was active and receive statistics show how many packets/failures it got as inactive.
ikeShow current IKE SAs.
Options
Show IP pool information.
Description
Show information about the current state of the configured IP pools.Usage
ippoolShow IP pool information.
ippool -release [<ip address>] [-all]Forcibly free IP assigned to subsystem.
ippool -renew [<ip address>] [-all]Try to renew IP leases through DHCP Server.
ippool -show [-verbose] [-num=<n>]Show IP pool information.
Options
IP Reputation stats.
Description
Show IP Reputation engine information and perform IP Reputation operations.Usage
ipreputation -query <ip address> [-category[={ALL | SPAM_SOURCES | WINDOWS_EXPLOITS | WEB_ATTACKS | BOTNETS | SCANNERS | DOS | REPUTATION | PHISHING | PROXY | NETWORK | CLOUD_PROVIDERS | MOBILE_THREATS | <String>}]] [-lookup[={ALLMETHODS | LOCAL | CLOUD | CACHE}]]Perform an advanced IP Reputation Query.
ipreputation -query <ip address>Perform an IP Reputation Query.
ipreputation -show [-updates] [-verbose]Show IP Reputation update information.
ipreputation -updates [-update] [-verbose]Update IP Reputation Database.
ipreputationShow engine information.
ipreputation -cache [-show] [-flush] [-num=<n>] [-verbose]IP Reputation cache.
ipreputation -subsystems [-verbose]Show subsystem information.
ipreputation -statistics[={TOTAL | 24H | 2M | 30D}]Show IP Reputation statistics.
Options
Show the IPsec SAs in use.
Description
List the currently active IPsec SAs, optionally only showing SAs matching the pattern given for the argument "iface".Usage
ipsec -stat [<IPsecTunnelBase>]Show global or interface statistics about IPsec SAs.
ipsec -show [<IPsecTunnelBase>] [-verbose] [-num={ALL | <Integer>}] [-srcif=<Interface>] [-force] [-usage] [-hash]Show SA information.
ipsec -globalstats [-verbose]Show global IPsec statistics.
ipsec -definesShow IPsec system defines.
ipsecShow SA information.
Options
Show statistics about HA synchronization for IPsec.
Description
Shows statistics about IKE/IPsec SAs synchronized and how many that failed to import. Sent statistics shows how many packets that has been sent to the other cluster member when this node was active and receive statistics show how many packets/failures it got as inactive.Usage
ipsechastat [-clear]
Options
Show L2TP information.
Description
Shows L2TP information and statistics.Usage
l2tp -state={ALL | ACTIVE | LISTENING} [-child] [-num=<Integer>]Show all L2TP sessions.
l2tp -l2tpserver=<PPTP/L2TP Server> [-l2tpv3server=<L2TPv3 Server>] [-l2tpv3client=<L2TPv3 Client>] [-l2tpclient=<PPTP/L2TP Client>] [-state={ALL | ACTIVE | LISTENING}] [-child] [-num=<Integer>]List L2TP sessions.
l2tp -l2tpv3server=<L2TPv3 Server> [-l2tpserver=<PPTP/L2TP Server>] [-state={ALL | ACTIVE | LISTENING}] [-child] [-num=<Integer>]List L2TP sessions.
l2tp -l2tpclient=<PPTP/L2TP Client> [-l2tpv3client=<L2TPv3 Client>] [-state={ALL | ACTIVE | LISTENING}] [-child] [-num=<Integer>]List L2TP sessions.
l2tp -l2tpv3client=<L2TPv3 Client> [-l2tpclient=<PPTP/L2TP Client>] [-state={ALL | ACTIVE | LISTENING}] [-child] [-num=<Integer>]List L2TP sessions.
Options
Manage language files on disk.
Description
Manage language files on diskUsage
languagefilesShow all language files on disk.
languagefiles -remove=<String>Remove a language file from disk.
Options
LDAP information.
Description
Status and statistics for the configured LDAP databases.Usage
ldapList all LDAP databases.
ldap -listList all LDAP databases.
ldap -show [<LDAP Server>]Show LDAP database status and statistics.
ldap -reset [<LDAP Server>]Reset LDAP database.
Options
License management.
Description
Manage the contents of the current license.Usage
licenseShow the contents of the current license.
license -showShow the contents of the current license.
license -activate [-request] [-username=<String>] [-password=<String>]Activates a license.
license -myclavister [-username=<String>] [-password=<String>] [-disconnect]Manages the MyClavister connection.
license -downloadlicenseDownloads the latest license from MyClavister.
license -checkdatePerform a check to see if a newer license exists from MyClavister.
license -removeRemove the installed license. Unit will enter 2h demo mode.
license -updateInitiate a license update.
license -secaas_add <String> <String>Add SECaaS configuration.
license -secaas_removeRemove SECaaS configuration and license.
Options
Display link montitoring statistics.
Description
If link monitor hosts have been configured, linkmon will monitor host reachability to detect link/NIC problems.Usage
linkmon
Simple tool to test connection to external server.
Description
Verifies connection using Measurement Lab NDT7 protocol or HTTP(S) server.Usage
linktestShow test results.
linktest -abort [-clear]Aborts currently running test.
linktest -clearClear results from previous test.
linktest -show [-verbose]Show test results.
linktest -start [-host=<IPAddress>] [-port=<1...65535>] [-ssl={TRUE | FALSE}] [-pbr=<table>] [-clients[=<1...15>]]Speed test using Measurement Lab NDT7.
linktest -start_http {GET | PUT | POST} <String> [-limit[=<MB>]] [-timeout[=<seconds>]] [-pbr=<table>] [-clients[=<1...15>]]Speed test using HTTP(S) server.
Options
![]() |
Note |
---|---|
Requires Administrator privileges. |
Commands related to the Light-Weight HTTP inspection engine.
Description
The lwhttp CLI command prints information about the Light-Weight HTTP inspection engine a.k.a. LW-HTTP ALG.The LW-HTTP inspection engine is automaticlaly enabled for IP policies with HTTP protocol validation or a web profile configured.
Compared to the ordinary HTTP-ALG, the LW-HTTP inspector provides better throughput performance without affecting network security.
Usage
lwhttp
The MAC address storage.
Description
The mac address storage keeps mac addresses persistent for SR-IOV interfaces when used in virtual environments.Usage
macstorage
Show remote management status.
Description
Show remote management status and informationUsage
managementList remote management.
management -type=InCenterShow InCenter remote management.
management -type=InControlShow InControl remote management.
management -type={REST | SNMP | SSH | WEBUI} [<String>]Show info for specific remote management.
Options
Show current NAT Pools.
Description
Show current NAT Pools and in-depth information.Usage
natpool [-num=<Integer>] [<pool name> [<IPv4 Address>]]
Options
Show Neighbor Discovery entries for given interface.
Description
List the Neighbor Discovery cache entries of specified interfaces.If no interface is given the Neighbor Discovery cache entries of all interfaces will be presented.
The presented list can be filtered using the ip
and hw
options.
Usage
nd -routerdiscovery [<Interface>] [-num=<n>]Show Router Discovery enabled interfaces.
ndShow all Neighbor Discovery entries.
nd -show [<Interface>] [-ip=<pattern>] [-hw=<pattern>] [-num=<n>]Show Neighbor Discovery entries.
nd -hashinfo [<Interface>]Show information on hash table health.
nd -flush [<Interface>]Flush Neighbor Discovery cache of specified interface.
nd -query=<ip> <Interface>Send Neighbor Solicitation for IP.
nd -del=<ip> <Interface>Delete ND cache entry.
Options
Toggle snooping and displaying of ARP requests.
Description
Toggle snooping and displaying of Neighbor Discovery queries and responses on-screen.The snooped messages are displayed before the access section validates the sender IP addresses in the ARP data.
Usage
ndsnoopShow snooped interfaces.
ndsnoop {ALL | NONE | <interface>} [-verbose]Snoop specified interface.
Options
![]() |
Note |
---|---|
Requires Administrator privileges. |
Shows the default contents of the neighbor cache.
Description
Contains information such as hostname, configured name, hardware address and ip4 address, for the firewall's network neighbors.Usage
neighborcacheShow neighbor cache.
neighborcache -show [-names] [-users] [-ipv6] [-devinfo] [-filter={INACTIVE | ACTIVE}]Show neighbor cache.
neighborcache -devinfo [-filter={INACTIVE | ACTIVE}]Show device intelligence information for neighbor cache entries.
Options
Show runtime values of network objects.
Description
Displays named network objects and their contents.Usage
netobjects [<String>] [-num=<num>]
Options
OIDC command.
Description
OIDC functions.Usage
oidcShow OIDC objects.
oidc -manualShow manual OIDC objects.
oidc -discovery [-url=<String>]Manual discovery download.
oidc -memoryShow OIDC memory usage.
oidc -refreshRefresh OIDC contexts.
oidc -verboseVerbose output.
Options
OneConnect tunnels.
Description
List running OneConnect configurations, OneConnect active tunnels and call information.Usage
oneconnect -num=<n> [-verbose]Show sessions.
Options
Show runtime OSPF information.
Description
Show runtime information about the OSPF router process(es).Note: -process
is only required if there are >1 OSPF router processes.
Usage
ospf -memory [-verbose]Show OSPF memory information.
ospf -statusShow OSPF status information.
ospfShow runtime information.
ospf -iface [<interface>] [-process=<OSPF Router Process>]Show interface information.
ospf -area [<OSPF Area>] [-process=<OSPF Router Process>]Show area information.
ospf -cfgneighbor [<OSPF Neighbor>] [-process=<OSPF Router Process>]Show neighbor information.
ospf -neighbor [-listall] [-ip=<ip>] [-num=<n>] [-process=<OSPF Router Process>]Show neighbor information.
ospf -route [{HA | ALT}] [-process=<OSPF Router Process>]Show the internal OSPF process routingtable.
ospf -database [-verbose] [-process=<OSPF Router Process>]Show the LSA database.
ospf -lsa <lsaID> [-process=<OSPF Router Process>]Show details for a specified LSA.
ospf -snoop={ON | OFF} [-process=<OSPF Router Process>]Show troubleshooting messages on the console.
ospf -ifacedown <interface> [-process=<OSPF Router Process>]Take specified interface offline.
ospf -ifaceup <interface> [-process=<OSPF Router Process>]Take specified interface online.
ospf -execute={STOP | START | RESTART} [-process=<OSPF Router Process>]Start/stop/restart OSPF process.
Options
Packet capturing.
Description
Packet capture engineUsage
pcapdumpShow capture status.
pcapdump -start [<interface(s)>] [-size=<value>] [-snaplen=<value>] [-count=<value>] [-out] [-out-nocap] [-eth=<Ethernet Address>] [-ethsrc=<Ethernet Address>] [-ethdest=<Ethernet Address>] [-ip=<IPv4 Address>] [-ipsrc=<IPv4 Address>] [-ipdest=<IPv4 Address>] [-port=<String>] [-srcport=<String>] [-destport=<String>] [-proto=<0...255>] [-icmp] [-tcp] [-udp] [-promisc] [-ipversion=<1...15>]Start capture.
pcapdump -stop [<interface(s)>]Stop capture.
pcapdump -statusShow capture status.
pcapdump -show [<interface(s)>] [-num={ALL | <Integer>}]Show a captured packets brief.
pcapdump -write [<interface(s)>] [-filename=<String>]Write the captured packets to disk.
pcapdump -wipeRemove all captured packets from memory.
pcapdump -cleanupRemove all captured packets, release capture mode and delete all written capture files from disk.
Options
![]() |
Note |
---|---|
Requires Administrator privileges. |
Show detected PCI devices.
Description
Usage
pciscanShow identified ethernet devices.
pciscan -allShow all detected devices.
pciscan -ethernetShow all detected ethernet devices.
pciscan -cfgupdateUpdates the config with detected devices.
pciscan -force_driver <Integer> {UIO}Force a certain driver to a device.
Options
Show pipes information.
Description
Show list of configured pipes / pipe details / pipe users.Note: The "pipes" command is not executed right away; it is queued until the end of the second, when pipe values are calculated.
Usage
pipesList all pipes.
pipes -users [<Pipe>] [-expr=<String>]List users of a given pipe.
pipes -show [<Pipe>] [-expr=<String>]Show pipe details.
Options
Show PPTP information.
Description
Shows PPTP information and statistics.Usage
pptp -state={ALL | ACTIVE | LISTENING | CHILDONLY} [-child] [-num=<Integer>]Show all PPTP sessions.
pptp -pptpserver=<PPTP/L2TP Server> [-state={ALL | ACTIVE | LISTENING | CHILDONLY}] [-child] [-num=<Integer>]List PPTP sessions.
pptp -pptpclient=<PPTP/L2TP Client> [-state={ALL | ACTIVE | LISTENING | CHILDONLY}] [-child] [-num=<Integer>]List PPTP sessions.
Options
Show PPTP ALG information.
Description
Shows information and statistics of the PPTP ALGs.Usage
pptpalgShow all configured PPTP ALGs.
pptpalg -sessions <PPTP ALG> [-verbose] [-num=<Integer>]List all PPTP sessions.
pptpalg -services <PPTP ALG>List all services attached to PPTP ALG.
Options
Initiates a configuration re-read.
Description
Restart the firewall using the currently active configuration.Usage
![]() |
Note |
---|---|
Requires Administrator privileges. |
Rekey IPsec or IKE SAs established with given remote peer.
Description
Rekey IPsec or IKE SAs associated with a given remote IKE peer, or optionally all IPsec or IKE SAs in the system.Usage
rekeysa -ike <ip address>Rekey IKE SAs.
rekeysa -ipsec <ip address>Rekey IPsec SAs.
rekeysa <ip address>Rekey IPsec SAs.
Options
![]() |
Note |
---|---|
Requires Administrator privileges. |
List the currently monitored interfaces and gateways.
Description
List the currently monitored interfaces and/or gateways.Usage
routemon
Real-time monitor information.
Description
Show information about real-time monitor objects, and real-time monitor alerts.All objects matching the specified filter are displayed. The filter can be the name of an object, or the beginning of a name. If no filter is specified, all objects are displayed.
If the option "monitored" is specified, only objects that have an associated real-time monitor alert are displayed.
Usage
rtmonitor [<filter>] [-terse] [-monitored] [-num={ALL | <Integer>}]
Options
Show rules lists.
Description
Shows the content of the various types of rules, i.e. main ruleset, pipe ruleset, etc.Usage
rules -type=IP [-ruleset={* | MAIN | <IP Rule Set>}] [-verbose] [-schedule] [-usageless=<usageless>] [-usagemore=<usagemore>] [<rules>]...Show IP rules.
rules -type={ROUTING | PIPE | IDP | THRESHOLD | IGMP} [-verbose] [-schedule] [-usageless=<usageless>] [-usagemore=<usagemore>] [<rules>]...Show a specific type of rules.
Options
Run appliance self tests.
Description
The appliance self tests are used to verify the correct function of hardware components.IMPORTANT: In order for a selftest result to be reliable the test must be run using a default configuration and having the firewall disconnected from any networks.
IMPORTANT: Normal firewall operations might be disrupted during the test(s).
The outcome of the throughput crypto accelerator tests are dependent on configuration values. If the number of large buffers (LocalReassSettings->LocalReass_NumLarge) too low, it might lower throughput result. In the field 'Drop/Fail', the 'Drop' column contains the number of packets that were dropped before ever reaching the crypto accelerator and the 'Fail' column contains the number of packets that for some reason failed encryption. The 'Pkt In/Out' field shows the total number of packets sent to, and returned from the accelerator.
The interface tests 'traffic' and 'throughput' are dependent on the settings for the NIC ring sizes and possibly also license limitations. The 'traffic' test uses a uniform random distribution of six packet sizes between 60 and 1518 bytes. The content of each received packet is validated. The 'throughput' test uses only the largest packet size, and does not validate the contents of the received packets.
Example 2.13. Interface ping test between interfaces 'if1' and 'if2'
selftest -ping -interfaces=if1,if2
Example 2.14. Start 30 min burn-in, testing RAM, storage media and crypto accelerator
selftest -burnin -minutes 30 -media -memory -cryptoaccel
Usage
selftest -memory [-num=<Integer>]Check the sanity of the RAM.
selftest -sslValidation and Performance test for SSL.
selftest -media [-size=<Integer>]Check the sanity of the disk drive.
selftest -macCheck if there are MAC address collisions on the interfaces.
selftest -ping [-interfaces=<Interface>]Run a ping test over the interfaces.
selftest -throughput [-interfaces=<Interface>]Run a throughput test over the interfaces.
selftest -traffic [-interfaces=<Interface>] [-verbose]Run a traffic test over the interfaces.
selftest -latency [-interfaces=<Interface>]Run a latency test over the interfaces.
selftest -cryptoaccelVerify the correct functioning of the accelerator cards.
selftest -burnin [-hours[=<Integer>]] [-minutes[=<Integer>]] [-memory] [-media] [-ping] [-throughput] [-traffic] [-cryptoaccel] [-size=<Integer>]Run burn-in tests for a set of sub tests. If no sub tests are specified the following are included: -memory, -ping, -traffic, -cryptoaccel.
selftest -abortAbort a running self test.
selftestShow the status of a running test.
Options
![]() |
Note |
---|---|
Requires Administrator privileges. |
Show runtime values of configured services.
Description
Shows the runtime values of all configured services.Usage
servicesList services.
services <String>Show services.
services -policy [<String>]Show IP Policy generated services.
Options
Session Manager.
Description
Show information about the Session Manager, and list currently active users.Explanation of Timeout flags for sessions:
Usage
sessionmanagerShow Session Manager status.
sessionmanager -statusShow Session Manager status.
sessionmanager -list [-num=<n>]List active sessions.
sessionmanager -info <session name> <database>Show in-depth information about session(s).
sessionmanager -message <session name> <database> <message text>Send message to session with console.
sessionmanager -disconnect <session name> <database> [<IP Address> [{LOCAL | SSH | NETCON | HTTP | HTTPS}]]Forcibly terminate session(s).
Options
Initiate core or system shutdown.
Description
Initiate restart of the core/system.Usage
shutdown [<seconds>] [-normal] [-reboot]
Options
![]() |
Note |
---|---|
Requires Administrator privileges. |
SIP ALG.
Description
List running SIP-ALG configurations, SIP registration and call information.The -flags option with -snoop allows any combination of the following values:
Flags can be added in the usual way. The default value is 0x00000003 (GENERAL and ERRORS).
NOTE: 'verbose' option outputs a lot of information on the console which may lead to system instability. Use with caution.
Usage
sipalg -definition [<alg>]Show running ALG configuration parameters.
sipalg -registration[={SHOW | FLUSH}] <alg>Show or flush current registration table.
sipalg -calls <alg>Show active calls table.
sipalg -session <alg>Show active SIP sessions.
sipalg -connection <alg> [-num=<n>]Show SIP connections.
sipalg -statistics[={SHOW | FLUSH}] <alg>Show or flush SIP counters.
sipalg -snoop={ON | OFF | VERBOSE} [<ipaddr>] [-flags=<String>]Control SIP snooping. Useful for troubleshooting SIP transactions. NOTE: 'verbose' option outputs a lot of information on the console which may lead to system instability. Use with caution.
Options
Manage and show status for SLB.
Description
Display SLB status and preform various related actionsUsage
slbDisplay status for all policies.
slb -status <String>Display status for specific policy.
slb -suspend <String> <ip address>Suspend load distribution to server.
slb -resume <String> <ip address>Resume load distribution to server.
Options
List SMTP LogReceiver sessions and send test mail.
Description
List SMTP sessions for configured SMTP LogReceivers and CLI SMTP sessions created when using "sendmail" to send test mail to SMTP LogReceiver. The temporary CLI sessions, marked with (CLI), has a lifetime of 300s.Usage
smtp -list [-num[=<1...1000>]] [-verbose]Show SMTP sessions.
smtp -verboseShow SMTP sessions with verbose output.
smtp -statShow SMTP statistics.
smtp -sendmail -logreceiver=<Mail Alerting> [-message=<String>]Send mail to specified SMTP LogReceiver.
Options
Show SNMP information.
Description
Show SNMP statusUsage
snmp [-engineId]
Options
SSH Server.
Description
Show SSH Server status, or start/stop/restart SSH Server.Usage
sshserverShow server status and list all connected clients.
sshserver -status [-verbose]Show server status and list all connected clients.
sshserver -keygen <Local System SSH Host Key>Generate SSH Server private keys.
sshserver -restart <ssh server>Restart SSH Server.
Options
![]() |
Note |
---|---|
Requires Administrator privileges. |
SSLVPN tunnels.
Description
List running SSLVPN configurations, SSLVPN active tunnels and call information.Usage
sslvpn [-num=<n>]
Options
Display various general firewall statistics.
Description
Display general information about the firewall, such as uptime, CPU load, resource consumption and other performance data.Usage
Display system/OS messages.
Description
Show contents of the sysmsg buffer.Usage
sysmsgsShow system messages.
sysmsgs -num=<n>Show system messages.
Options
Technical Support information.
Description
Generate information useful for technical support.Due to the large amount of output, this command might show a truncated result when execute from the local console.
Usage
techsupport
Display current system time.
Description
Display/set the system date and time.Usage
timeDisplay current system time.
time -verboseDisplay current system time.
time -set <date> <time>Set system local time: <YYYY-MM-DD> <HH:MM:SS>.
time -sync [-force]Synchronize time with timeserver(s) (specified in settings).
Options
Show user authentication rules.
Description
Displays the contents of the user authentication ruleset.Usage
uarules [-verbose] [<Integer Range>]
Options
Show status and manage autoupdate information.
Description
Show autoupdate mechanism status or force an update.Usage
updatecenterShow update status and database information.
updatecenter -status[={ANTIVIRUS | IDP | IPREPUTATION | ALL}]Show update status and database information.
updatecenter -update[={ANTIVIRUS | IDP | IPREPUTATION | ALL}]Initiate an update check of the specified database.
updatecenter -removedb={ANTIVIRUS | IDP | IPREPUTATION}Remove the specified signature database.
updatecenter -serversShow status of update servers.
Options
Show logged-on users.
Description
Show currently logged-on users and other information. Also allows logged-on users to be forcibly logged out.Note: In the user listing -list
, only privileges actually used by
the policy are displayed.
Usage
userauthList all authenticated users.
userauth -list [-num=<n>] [-blocked] [-verbose]List all authenticated users.
userauth -privilegeList all known privileges (usernames and groups).
userauth -user [<user ip>]Show all information for user(s) with this IP address.
userauth -remove [<user ip> [<Interface>]] [-all]Forcibly log out an authenticated user.
Options
Show information about VLAN.
Description
Show list of attached Virtual LAN Interfaces, or in-depth information about a specified VLAN.Usage
vlanList attached VLANs.
vlan -num=<n> [-page[=<n>]] [-verbose]Set number of display lines per page and display page.
vlan <Interface>Display in-depth information about a VLAN interface, and/or the VLAN interfaces that are based on a specific interface.
vlan -verboseShow more details, eg zone and PBR table, for the configured VLAN interfaces.
Options
Zonedefense.
Description
Block/unblock IP addresses/net and ethernet addresses.Usage
zonedefense [-save] [-blockip=<ip address>] [-blockenet=<ethernet address>] [-eraseip=<ip address>] [-eraseenet=<ethernet address>] [-status] [-show]
Options