Table of Contents
Note: This document is also available in other formats | |
---|---|
A PDF version of this document along with all current and older documentation in PDF format can be found at https://my.clavister.com. It is also available in a framed HTML version. |
This guide is a reference for all commands and configuration object types that are available in the command line interface for Clavister cOS Core.
The CLI is case-sensitive. However, the tab-completion feature of the CLI does not require the correct case to perform completion and will alter the typed case if it is required.
The following notation is used throughout this reference guide when specifying the options of a command:
Example 1.1. Command Option Notation
One of the usages for the help command looks like this:
help -category={COMMANDS | TYPES} [<Topic>]
This means that help has an option called category
which has two possible values which are COMMANDS
and TYPES
. There is also an optional option called Topic
which in this case is a search
string used to specify what help topic to display. Since the topic is optional, it is possible to exclude it when
running the command.
Both of the following examples are valid for the usage described above:
Device:/>
help -category=COMMANDSDevice:/>
help -category=COMMANDS activate
The usage for the routes command is:
routes [-all] [-switched] [-flushl3cache[=<percent>]] [-num=<n>] [-nonhost] [-tables] [-lookup=<ip address>] [-verbose] [-setmtu=<mtu>] [-cacheinfo] [<table name>]...
None of the options of this command are mandatory. The flushl3cache
option also
has an optional value. This is because that option has a default value, 100
,
which will be used if no value is specified.
The following two examples will yield the same result:
Device:/>
routes -flushl3cache=100Device:/>
routes -flushl3cache
Because the table name
option is followed by ellipses it is possible to specify
more than one routing table. Since table name
is optional as well, the user can specify zero or more policy-based routing tables.
Device:/>
routes Virroute Virroute2
Entering Commands
The commands described in this guide can be run by typing the command name at the system prompt and then pressing the return key. Many commands require options to be set to run. If a required option is missing a brief syntax help will be displayed.User roles
Some commands and options cannot be used unless the logged-in user has administrator privileges. This is indicated in this guide by a note following the command or Admin only written next to an option.Function keys
There are a number of function keys that are used in the CLI.The CLI History
Every time a command is run, the command line is added to a history list. The up and down arrow keys are used to access previous command lines (up arrow for older command lines and down arrow to move back to a newer command line). See also Section 2.4.4, history.Example 1.2. The CLI History
Using the command line history via the arrow keys:
Device:/>
show AddressDevice:/>
(up arrow)Device:/>
show Address (the previous commandline is displayed)
Adding and Removing IP Address Group Members
With IP address groups, it is often useful to be able to add new members to a group or remove existing group members. This is easily done with the web interface which provides an intuitive display showing the available objects and the objects in the group. It can also be done with the CLI but requires a special command syntax.Suppose there already exists an IP4Group object called my_ip_group. It has three member IP4Address objects called my_ip_1, my_ip_2 and my_ip_3. Suppose that the object my_ip_2 is to be removed from the group. The command would be:
Device:/>
set Address IP4Group my_ip_group Members-=my_ip_2
The option Members-= can remove one or more members of the group. To add one or more members to a group, the option Members+= can be used. Suppose that the IP4Address objects my_ip_4 and my_ip_5 are to be added to the group. The command would be:
Device:/>
set Address IP4Group my_ip4_group Members+=my_ip_4,my_ip_5
By using the tab function key in the CLI the names of commands, options, objects and object properties can be automatically completed. If the text entered before pressing tab only matches one possible item, e.g. "activate" is the only match for "acti", and a command is expected, the name will be autocompleted. Should there be more than one match the part common to all matches will be completed. At this point the user can either enter more characters or press tab again, which will display a list of the possible completions. This can also be done without entering any characters, but the resulting list might be long if there are many possible completions, e.g. all commands.
Example 1.3. Tab completion
An example of tab completion when using the add command:
Device:/>
add Add (tab)Device:/>
add Address ("ress" was autocompleted)Device:/>
add Address i (tab)Device:/>
add Address IP4 ("IP4" was autocompleted)Device:/>
add Address IP4 (tab, or double tab if IP4 were entered manually) (A list of all types starting with IP4 is listed)Device:/>
add Address IP4a (tab)Device:/>
add Address IP4Address ("Address" was autocompleted)Device:/>
add Address IP4Address example_ip a (tab)Device:/>
add Address IP4Address example_ip Address= ("Address=" was autocompleted)Device:/>
add Address IP4Address example_ip Address=1.2.3.4
Tab completion of references:
Device:/>
set Address IP4Group examplegroup Members= (tab, tab) (A list of valid objects is displayed)Device:/>
set Address IP4Group examplegroup Members=e (tab)Device:/>
set Address IP4Group examplegroup Members=example_ip ("example_ip" was autocompleted)
It is possible to get help about available properties of configuration objects while a command
line is being typed by using the ?
character. Write ?
instead of a property name and press tab and help text for the available properties is shown.
If ?
is typed instead of a property value and tab is pressed, help text
for that property which contains more information such as data type, default value, etc. is displayed.
Example 1.4. Inline help
Get inline help for all properties of an IP4Address:
Device:/>
set IP4Address example_ip ? (tab)
(Help text describing all available properties is displayed)
Getting inline help for the Address property:
Device:/>
set IP4Address example_ip Address=? (tab)
(More detailed help text about Address is displayed)
Another special character that can be used together with tab completion is the period ".
"
character.
If ".
" is entered instead of a property value and tab is pressed it will be
replaced by the current value of that property. This is useful when editing an existing list of items or a long text
value.
The "<" character before a tab can be used to automatically fill in the default value for a parameter if no value has yet been set. If the "." character is used, all possible values will be shown and these can then be edited with the back arrrow and backspace keys.
Example 1.5. Edit an Existing Property Value in the CLI
Edit the current value:
Device:/>
add IP4Address example_ip Address=1.2.3.4Device:/>
set IP4Address example_ip Address=. (tab)Device:/>
set IP4Address example_ip Address=1.2.3.4 (the value was inserted) The value can now be edited by using the arrow keys or backspace.Device:/>
set IP4Group examplegroup Members=ip1,ip2,ip3,ip5Device:/>
set IP4Group examplegroup Members=. (tab)Device:/>
set IP4Group examplegroup Members=ip1,ip2,ip3,ip5 (current value is inserted and it is now possible to add or remove a member to the list without having to enter all the other members again)
Edit the default value:
Device:/>
add LogReceiverSyslog example Address=example_ip LogSeverity=. (tab)Device:/>
add LogReceiverSyslog example Address=example_ip LogSeverity=Emergency,Alert,Critical,Error,Warning,Notice,Info
It is now easy to remove a log severity.
Some object types are grouped together in a category in the CLI. This only matters when using tab completion as they are used to limit the number of possible completions when tab completing object types. The category can always be omitted when running commands if the type name is entered manually.
Example 1.6. Using categories with tab completion
Accessing an IP4Address object with the use of categories:
Device:/>
show ad (tab)Device:/>
show Address (the category is autocompleted)Device:/>
show Address ip4a (tab)Device:/>
show Address IP4Address (the type is autocompleted)Device:/>
show Address IP4Address example_ip
Accessing an IP4Address object without the use of categories:
Device:/>
show IP4Address example_ip
There are two ways of getting help about a command. A brief help is displayed if the
command name is typed followed by -?
or -h
. This
applies to all commands and is therefore not listed in the option list for each command
in this guide. Using the help
command gives a more detailed help corresponding to the information found in this guide.
In most cases it is possible to simply type help followed by the
command name to get the full help. See Section 2.4.3, help for a more detailed
description. To list the available commands, just type help
and press return.
Example 1.7. Displaying Help for Commands
Display brief help for the activate command:
Device:/>
activate -?Device:/>
activate -h
Display full help for activate:
Device:/>
help activate
Help for the arp command. Arp is also the name of a configuration object type, so it is necessary to specify that the help text for the command should be displayed:
Device:/>
help -category=COMMANDS arp
Display a list all available commands:
Device:/>
help
To get help about configuration object types, use the help
command. It is also possible to get information about each property in an object type, such
as data type, default value, etc. by entering the ?
character
when entering the value of a property and pressing tab. More on this in Section 1.3.1, Inline Help with Tab Completion.
Example 1.8. Displaying Help for Object Types
Full help for IP4Address
:
Device:/>
help IP4Address
Help for the ARP
configuration object type, which collides with the arp command:
Device:/>
help -category=TYPES ARP
Activate changes.
Description
Activate the latest changes.This will issue a reconfiguration, using the new configuration. If the reconfiguration is successful a commit command must be issued within the configured timeout interval in order to save the changes to media. If not, the system will revert to using the previous version of the configuration.
Usage
activate
Note | |
---|---|
Requires Administrator privileges. |
Create a new object.
Description
Create a new object and add it to the configuration.Specify the type of object you want to create and the identifier, if the type has one, unless the object is identified by an index. Set the properties of the object by writing the propertyname equals (=) and then the value. An optional category can be specified for some object types when using tab completion.
If a mandatory property isn't specified a list of errors will be shown after the object is created. If an invalid property or value type is specified or if the identifier is missing the command will fail and not create an object.
Adjustments can be made after the object is created by using the set command.
Example 2.1. Create a new object
Add objects with an identifier property (not index): gw-world:/> add Address IP4Address example_ip Address=1.2.3.4 Comments="This is an example" gw-world:/> add IP4Address example_ip2 Address=2.3.4.5 Add an object with an index: gw-world:/main> add Route Interface=lan Add an object without identifier: gw-world:/> add DynDnsClientDyndnsOrg DNSName=example Username=example
Usage
add [<Category>] <Type> [<Identifier>] [-force] [-silent] [<key-value pair>]...
Options
Note | |
---|---|
Requires Administrator privileges. |
Cancel ongoing commit.
Description
Cancel commit operation immediately, without waiting for the timeout.Usage
cancel
Note | |
---|---|
Requires Administrator privileges. |
Change the current context.
Description
Change the current configuration context.A context is a group of objects that are dependent on and grouped by a parent object. Many objects lie in the "root" context and do not have a specific parent. Other objects, e.g. User objects lie in a sub-context (or child context) of the root - in this case in a LocalUserDatabase. In order to add or modify users you have to be in the correct context, e.g. a LocalUserDatabase called "exampledb". Only objects in the current context can be accessed.
Example 2.2. Change context
Change to a sub/child context: gw-world:/> cc LocalUserDatabase exampledb gw-world:/exampledb> Go back to the parent context: gw-world:/ospf1/area1> cc .. gw-world:/ospf1> cc .. gw-world:/> Go back to the root context: gw-world:/ospf1/area1> cc gw-world:/> or gw-world:/ospf1/area1> cc / gw-world:/>
Usage
cc [<Category>] <Type> <Identifier>Change the current context.
cc -printPrint the current context.
ccChange to root context (same as "cc /").
Options
Save new configuration to media.
Description
Save the new configuration to media. This command can only be issued after a successful activate command.Usage
commit
Note | |
---|---|
Requires Administrator privileges. |
Delete specified objects.
Description
Delete the specified object, removing it from the configuration.Add the force flag to delete the object even if it is referenced by other objects or if it is a context that has child objects that aren't deleted. This may cause objects referring to the specified object or one of its children to get errors that must be corrected before the configuration can be activated.
See also: undelete
Example 2.3. Delete an object
Delete an unreferenced object: gw-world:/> delete Address IP4Address example_ip Delete a referenced object: (will cause error in examplerule) gw-world:/> set IPRule examplerule SourceNetwork=examplenet gw-world:/> delete Address IP4Address examplenet -force
Usage
delete [<Category>] <Type> [<Identifier>] [-force]
Options
Note | |
---|---|
Requires Administrator privileges. |
Generate random pre-shared key.
Description
Generate a pre-shared key of specified size, containing randomized key data. If a key with the specified name exists, the existing key is modified. Otherwise a new key object is created.Usage
pskgen <Name> [-comments=<String>] [-size={64 | 128 | 256 | 512 | 1024 | 2048 | 4096}]
Options
Note | |
---|---|
Requires Administrator privileges. |
Reject changes.
Description
Reject the changes made to the specified object by reverting to the values of the last committed configuration.All changes made to the object will be lost. If the object is added after the last commit, it will be removed.
To reject the changes in more than one object, use either the -recursive
flag to delete a context and all its children recursively or the
-all
flag to reject the changes in all objects in the
configuration.
Example 2.4. Reject changes
Reject changes in individual objects: gw-world:/> set Address IP4Address example_ip Comments="This comment will be rejected" gw-world:/> reject Address IP4Address example_ip gw-world:/> add Address IP4Address example_ip2 Address=1.2.3.4 Comments="This whole object will be removed" gw-world:/> reject Address IP4Address example_ip2 Reject changes recursively: (will reject changes in the user database and all users) gw-world:/exampledb> set User user1 Comments="Something" gw-world:/exampledb> set User user2 Comments="that will be" gw-world:/exampledb> set User user3 Comments="rejected" gw-world:/exampledb> cc .. gw-world:/> reject LocalUserDatabase exampledb -recursive Reject all changes: gw-world:/anycontext> reject -all All changes since the last commit will be rejected: (example_ip will be removed since it is newly added) gw-world:/> add IP4Address example_ip Address=1.2.3.4 gw-world:/> delete IP4Address example_ip gw-world:/> reject IP4Address example_ip
Usage
reject [<Category>] <Type> [<Identifier>] [-recursive]Reject changes made to the specified object.
reject -allReject all changes in the configuration.
Options
Note | |
---|---|
Requires Administrator privileges. |
Reset unit configuration and/or binaries.
Description
Reset configuration to the base configuration as generated by the current core or reset binaries to factory defaults.Usage
reset -configurationReset the configuration to factory defaults.
reset -unitReset the unit to factory defaults.
Options
Note | |
---|---|
Requires Administrator privileges. |
Set property values.
Description
Set property values of configuration objects.Specify the type of object you want to modify and the identifier, if the type has one. Set the properties of the object by writing the propertyname equals (=) and then the value. An optional category can be specified for some object types when using tab completion.
If a mandatory property hasn't been specified or if a property has an error a list of errors will be shown after the specified properties have been set. If an invalid property or value type is specified the command will fail and not modify the object.
See also: add
Example 2.5. Set property values
Set properties for objects that have an identifier property: gw-world:/> set Address IP4Address example_ip Address=1.2.3.4 Comments="This is an example" gw-world:/> set IP4Address example_ip2 Address=2.3.4.5 Comments=comment_without_whitespace gw-world:/main> set Route 1 Comment="A route" gw-world:/> set IPRule 12 Index=1 Set properties for an object without identifier: gw-world:/> set DynDnsClientDyndnsOrg Username=example
Usage
set [<Category>] <Type> [<Identifier>] [-disable] [-enable] [-force] [<key-value pair>]...
Options
Note | |
---|---|
Requires Administrator privileges. |
Show objects.
Description
Show objects.Show the properties of a specified object.
There are a number of flags that can be specified to show otherwise hidden properties.
To show a list of object types and categories available in the current context, just type show.
Show a table of all objects of a type by specifying a type or a category. Use the
-errors
or -changes
flags to show what objects have been changed or have
errors in the configuration.
When showing a table of all objects of a certain type, the status of each object since the last time the configuration was committed is indicated by a flag. The flags used are:
Additional flags:
When listing categories and object types, categories are indicated by [] and types where objects may be contexts by /.
Example 2.6. Show objects
Show the properties of an individual object: gw-world:/> show Address IP4Address example_ip gw-world:/main> show Route 1 gw-world:/> show Client DynDnsClientDyndnsOrg Show a table of all objects of a type and a selection of their properties as well as their status: gw-world:/> show Address IP4Address gw-world:/> show IP4Address Show a table of all objects for each type in a category: gw-world:/> show Address Show objects with changes and errors: gw-world:/> show -changes gw-world:/> show -errors Show what objects use (refer to) a certain object: gw-world:/> show Address IP4Address example_ip -references
Usage
showShow the types and categories available in the current context.
show [<Category>] [<Type> [<Identifier>]] [-disabled] [-references]Show an object or list a type or category.
show -errors [-verbose]Show all errors.
show -changesShow all changes.
Options
Restore previously deleted objects.
Description
Restore a previously deleted object.This is possible as long as the activate command has not been called.
See also: delete
Example 2.7. Undelete an object
Undelete an unreferenced object: gw-world:/> delete Address IP4Address example_ip gw-world:/> undelete Address IP4Address example_ip Undelete a referenced object: (will remove the error in examplerule) gw-world:/> set IPRule examplerule SourceNetwork=examplenet gw-world:/> delete Address IP4Address examplenet -force gw-world:/> undelete Address IP4Address examplenet
Usage
undelete [<Category>] <Type> [<Identifier>]
Options
Note | |
---|---|
Requires Administrator privileges. |
Display information on ACME objects state and also restart the client.
Description
Display information about ACME objects.Usage
acme -num=<n>Show summary information about ACME objects.
acme -show [<ACME Certificate Management>]Show detailed certificate information.
acme -restartRestart the ACME client, resetting all object states.
acme -snoop [-on] [-off] [-verbose]Show requests and responses on the console.
Options
Show alarm information.
Description
Show list of currently active alarms.Usage
alarm [-history] [-active]
Options
Show application control status.
Description
Browse the applications defined in the Application Control functionality. Saved browsing results as filters that can be later used to define IPPolicies.Usage
appcontrolShow general information about application control system.
appcontrol -show_listsList information about specified application.
appcontrol -delete_lists={ALL | <Integer>}List information about specified application.
appcontrol <Name>List information about specified application.
appcontrol -application=<String> [-save_list]Define a filter selecting individual applications.
appcontrol -filter [-name=<String>] [-family=<String>] [-risk={VERY_LOW | LOW | MEDIUM | HIGH | VERY_HIGH}] [-tag=<String>] [-save_list]Define a filter selecting families, tags, risks and a matching expression for the applications names.
Options
Show ARP entries for given interface.
Description
List the ARP cache entries of specified interfaces.If no interface is given the ARP cache entries of all interfaces will be presented.
The presented list can be filtered using the ip
and hw
options.
Usage
arpShow all ARP entries.
arp -show [<Interface>] [-ip=<pattern>] [-hw=<pattern>] [-num=<n>]Show ARP entries.
arp -hashinfo [<Interface>]Show information on hash table health.
arp -flush [<Interface>]Flush ARP cache of specified interface.
arp -notify=<ip> [<Interface>] [-hwsender=<Ethernet Address>]Send gratuitous ARP for IP.
Options
Toggle snooping and displaying of ARP requests.
Description
Toggle snooping and displaying of ARP queries and responses on-screen.The snooped messages are displayed before the access section validates the sender IP addresses in the ARP data.
Usage
arpsnoopShow snooped interfaces.
arpsnoop {ALL | NONE | <interface>} [-verbose]Snoop specified interface.
Options
Note | |
---|---|
Requires Administrator privileges. |
Show active ARP Transaction States.
Description
Show active ARP Transaction States.Usage
ats [-num=<n>]
Options
Shows the state of the Authentication Agents.
Description
Shows the state of the Authentication Agents.Usage
authagent -versionShows the state of the configured Authentication Agents including the protocol version.
authagentShows the state of the configured Authentication Agents.
authagent {ALL | <AuthAgent>}Shows the state of the configured Authentication Agents.
authagent -reconnect {ALL | <AuthAgent>}Closes the connection with the Agent and attempst to reconnect.
Options
Toggle snooping and displaying of Authentication Agents traffic.
Description
Toggle snooping and displaying of Authentication Agents queries and responses on-screen.Usage
authagentsnoopShow snooped Authentication Agents.
authagentsnoop {ALL | NONE | <AuthAgent>} [-verbose]Snoop specified Authentication Agent.
Options
Note | |
---|---|
Requires Administrator privileges. |
Blacklist.
Description
Block and unblock hosts on the black and white list.Note: Static blacklist hosts cannot be unblocked.
If -force
is not specified, only the exact host with the service, protocol/port and destiny specified is unblocked.
Example 2.8. Block hosts
blacklist -show -black -listtime -info blacklist -block 100.100.100.0/24 -serv=FTP -dest=50.50.50.1 -time=6000
Usage
blacklistShow the current blacklist and whitelist content.
blacklist -show [-num={ALL | <Integer>}] [-alerttype={IDS | HOST_THRESHOLD | NETWORK_THRESHOLD | CLI | REST | DOS_GENERAL | DOS_GEOIP | BOTNET | SCANNER | SPAM | PHISHING | ALL}] [-creationtime] [-dynamic] [-listtime] [-info] [-black] [-white] [-all]Show information about the blacklisted hosts.
blacklist -block <host> [-serv=<service>] [-prot={TCP | UDP | ICMP | OTHER | TCPUDP | ALL}] [-port=<port number>] [-dest=<ip address>] [-time=<seconds>]Block specified netobject.
blacklist -unblock <host> [-serv=<service>] [-prot={TCP | UDP | ICMP | OTHER | TCPUDP | ALL}] [-port=<port number>] [-dest=<ip address>] [-force]Unblock specified netobject.
blacklist -purge {IDS | HOST_THRESHOLD | NETWORK_THRESHOLD | CLI | REST | DOS_GENERAL | DOS_GEOIP | BOTNET | SCANNER | SPAM | PHISHING}Unblock all netobject of specific alert type.
Options
List packet buffers or the contents of a buffer.
Description
Lists the 20 most recently freed packet buffers, or in-depth information about a specific buffer.Usage
buffersList the 20 most recently freed buffers.
buffers -recentDecode the most recently freed buffer.
buffers <Num>Decode buffer number <Num>.
Options
CAM table information.
Description
Show information about the CAM table(s) and their entries.Usage
cam -num=<n>Show CAM table information.
cam <Interface> [-num=<n>]Show interface-specified CAM table information.
cam <Interface> [-flush]Flush CAM table information of specified interface.
cam -flushFlush CAM table information.
Options
Show the contents of the certificate cache.
Description
Show all certificates in the certificate cache.Usage
certcache [-verbose] [-flush]
Options
Display configuration log.
Description
Display the log of the last configuration read attempt.Usage
cfglog
List current state-tracked connections.
Description
List current state-tracked connections.Usage
connections -show [-extended] [-num=<n>] [-verbose] [-srciface=<interface>] [-destiface=<interface>] [-ipver={IPV6 | IPV4}] [-srcip=<ip address>] [-destip=<ip address>] [-protocol=<name/num>] [-srcport=<port>] [-destport=<port>] [-dataless=<bytes>] [-datamore=<bytes>]List connections.
connectionsSame as "connections -show".
connections -close [-all] [-srciface=<interface>] [-destiface=<interface>] [-ipver={IPV6 | IPV4}] [-srcip=<ip address>] [-destip=<ip address>] [-protocol=<name/num>] [-srcport=<port>] [-destport=<port>] [-dataless=<bytes>] [-datamore=<bytes>]Close connections.
Options
Display info about the cpu.
Description
Display the make and model of the machine's CPU.Usage
cpuidDisplay the make and model of the machine's CPU.
Show the contents of the crash.dmp file.
Description
Show the contents of the crash.dmp file, if it exists.Usage
crashdump
Show information about crypto accelerators.
Description
Show information about active crypto accelerators.Usage
cryptostat [-all] [-hashinfo]
Options
Status of the Distributed Checksum Clearinghouses (DCC) anti-spam service.
Description
Shows status of the DCC service.Usage
dcc
Displays the content of the diagnose console.
Description
The diagnose console is used to help troubleshooting internal problems within the firewallUsage
dconsole [-clean] [-flush] [-date=<date>] [-onlyhigh]
Options
Display information about DHCP-enabled interfaces or modify/update their leases.
Description
Display information about a DHCP-enabled interface.Usage
dhcpList DHCP enabled interfaces.
dhcp -listList DHCP enabled interfaces.
dhcp -show [<interface>]Show information about DHCP enabled interface.
dhcp -lease={RENEW | RELEASE} <interface>Modify interface lease.
Options
Show DHCP/BOOTP relayer ruleset.
Description
Display the content of the DHCP/BOOTP relayer ruleset and the current routed DHCP relays.Display filter filters relays based on interface/ip (example: if1 192.168.*)
Usage
dhcprelayShow the currently relayed DHCP sessions.
dhcprelay -show [-num={ALL | <Integer>}] [-rules] [-routes] [<display filter>]...Show DHCP/BOOTP relayer ruleset.
dhcprelay -release <ip address> [-interface=<Interface>]Terminate relayed session.
Options
Show content of the DHCP server ruleset.
Description
Show the content of the DHCP server ruleset and various information about active/inactive leases.Display filter filters entries based on Interface/MAC/IP (example: If1 192.168.*)
Usage
dhcpserverShow DHCP server leases.
dhcpserver -show [-rules] [-leases] [-num=<Integer>] [-fromentry=<Integer>] [-mappings] [-utilization] [<Display filter>]...Show DHCP server ruleset.
dhcpserver -release={BLACKLIST}Release a specific types of IPs.
dhcpserver -releaseip <Interface> <IP address>Release an active IP.
Options
Display information about DHCPv6-enabled interfaces or modify/update their leases.
Description
Display information about a DHCPV6-enabled interface.Usage
dhcpv6List DHCPv6 enabled interfaces.
dhcpv6 -listList DHCPv6 enabled interfaces.
dhcpv6 -show [<interface>]Show information about DHCPv6 enabled interface.
dhcpv6 -lease={RENEW | RELEASE} <interface>Modify interface lease.
Options
Show content of the DHCPv6 server ruleset.
Description
Show the content of the DHCPv6 server ruleset and various information about active/inactive leases.Display filter filters leases based on interface/mac/ip (example: if1 2001:DB8::*)
Usage
dhcpv6serverShow DHCPv6 server leases.
dhcpv6server -releaseip <interface> <IPv6 address>Release an active IP6.
dhcpv6server -show [-rules] [-leases] [-num=<Integer>] [-fromentry=<Integer>] [<display filter>]...Show DHCP server ruleset.
Options
DNS client and queries.
Description
Show status of the DNS client and manage pending DNS queries.Usage
dns -cache [<FQDNAddress>] [-num=<n>]Show contents of DNS cache.
dns -flushFlush the contents of DNS cache.
dnsShow status of the DNS client.
dns -query <domain name> [-type={A | AAAA}]Resolve domain name.
dns -listList pending DNS queries.
dns -removeRemove all pending DNS queries.
Options
DNSBL.
Description
Show status of DNSBL.Usage
dnsbl [-show] [<SMTP ALG>] [-clean]
Options
DNS Control ALG commands.
Description
Show status for DNS Control ALG sessions.Usage
dnscontrolList DNS Control Sessions.
dnscontrol -list [-num[=<Integer>]] [-verbose]List DNS Control Sessions (Advanced).
dnscontrol -statsShow DNS control statistics.
Options
Show dynamic routing policy.
Description
Show the dynamic routing policy filter ruleset and current exports.In the "Flags" field of the dynrouting exports, the following letters are used:
Usage
dynroute [-rules] [-exports]
Options
Ethernet address OUI lookup.
Description
Ethernet address OUI lookup.Usage
enetvendor -hw=<Ethernet Address>
Options
Manage and show status for fallback policy.
Description
Display fallback policy status and preform various related actionsUsage
fallbackDisplay status for all policies.
fallback -status <String>Display status for specific policy.
fallback -suspend <String> <ip address>Suspend load distribution to primary server.
fallback -resume <String> <ip address>Resume load distribution to primary server.
Options
File download stats.
Description
Show statistics of the File Download engine.Usage
filedownloadShow active downloads.
filedownload -inactiveShow inactive downloads.
filedownload -activeShow active downloads.
Options
Show active fragment reassemblies.
Description
List active fragment reassemblies.More detailed information can optionally be obtained for specific reassemblies:
Usage
frags [{NEW | ALL | <reassembly id>}] [-free] [-done] [-num=<n>]
Options
Show and change HA status.
Description
Show current HA status.Usage
ha [-activate] [-deactivate]
Options
Show Host Monitor statistics.
Description
Show active Host Monitor sessions.Usage
hostmon [-verbose] [-num=<n>]
Options
Commands related to the HTTP Application Layer Gateway.
Description
Show information about the WCF cache or list the overridden WCF hosts.Usage
httpalg -override [-flush]List or flush hosts that have overridden the wcf filter.
httpalg -wcfcache [-show] [-url=<String>] [-flush] [-verbose] [-count] [-server[={STATUS | CONNECT | DISCONNECT}]] [-num=<n>]Display URL cache information.
Options
Display HTTP Poster status.
Description
Display configuration and status of configured HTTPPoster_URLx targets.Usage
httpposter [-repost=<Integer>]
Options
Show hardware monitor sensor status.
Description
Show hardware monitor sensor status.Usage
hwm [-all] [-verbose]
Options
Show and remove hosts that are piped by IDP.
Description
Show list of currently piped hosts.Usage
idppipesList all idppipes.
idppipes -show [-host=<ip addr>]Lists hosts for which new connections are piped by IDP.
idppipes -unpipe [-all] [-host=<ip addr>]Remove piping for the specified host.
Options
Show interface statistics.
Description
Show list of attached interfaces, or in-depth information about a specific interface.Usage
ifstat [<Interface>] [-filter=<expr>] [-pbr=<table name>] [-num=<n>] [-type={ETHERNET | IFACEGROUP | ZONE | ALL}] [-restart] [-allindepth] [-maclist] [-snmpnewindexes]
Options
IGMP Interfaces.
Description
Show information about the current state of the IGMP interfaces.Send simulated messages to test configuration of the interface.
Usage
igmpPrints the current IGMP state.
igmp -state [<Interface>]Prints the current IGMP state. If an interface is specified, more details are provided.
igmp -query <Interface> [<MC address> [<router address>]]Simulate an incoming IGMP query message.
igmp -join <Interface> <MC address> [<host address>]Simulate an incoming IGMP join message.
igmp -leave <Interface> <MC address> [<host address>]Simulate an incoming IGMP leave message.
Options
Initiate/delete/show IKE negotiated SAs.
Description
Command to do various operations on IKE negotiated Security Associations.Usage
ike -stat [<IPsecTunnelBase>] [-cfgmode]Show global or interface statistics about IKE SAs.
ike -memShow memory statistics about the IKE enigne.
ike -delete [<ip address>] [-srcif=<Interface>] [-tunnel=<IPsecTunnelBase>] [-force]Delete IKE SAs.
ike -connect [<IPsecTunnelBase>]Setup IKE and IPsec SAs for a specified tunnel.
ike -tunnels [<IPsecTunnelBase>] [-num={ALL | <Integer>}] [-force]Show configured tunnels.
ike -show [<ip address>] [-num={ALL | <Integer>}] [-srcif=<Interface>] [-verbose] [-force] [-tunnel=<IPsecTunnelBase>]Show current IKE SAs.
ike -snoop [<ip address>] [-match] [-brief] [-off]Enable/disable IKE snooping.
ike -ha [-clear]Shows statistics about IKE/IPsec SAs synchronized and how many that failed to import. Sent statistics shows how many packets that has been sent to the other cluster member when this node was active and receive statistics show how many packets/failures it got as inactive.
ikeShow current IKE SAs.
Options
Show IP pool information.
Description
Show information about the current state of the configured IP pools.Usage
ippoolShow IP pool information.
ippool -release [<ip address>] [-all]Forcibly free IP assigned to subsystem.
ippool -renew [<ip address>] [-all]Try to renew IP leases through DHCP Server.
ippool -show [-verbose] [-num=<n>]Show IP pool information.
Options
IP Reputation stats.
Description
Show IP Reputation engine information and perform IP Reputation operations.Usage
ipreputation -query <ip address> [-category[={ALL | SPAM_SOURCES | WINDOWS_EXPLOITS | WEB_ATTACKS | BOTNETS | SCANNERS | DOS | REPUTATION | PHISHING | PROXY | NETWORK | CLOUD_PROVIDERS | MOBILE_THREATS | <String>}]] [-lookup[={ALLMETHODS | LOCAL | CLOUD | CACHE}]]Perform an advanced IP Reputation Query.
ipreputation -query <ip address>Perform an IP Reputation Query.
ipreputation -show [-updates] [-verbose]Show IP Reputation update information.
ipreputation -updates [-update] [-verbose]Update IP Reputation Database.
ipreputationShow engine information.
ipreputation -cache [-show] [-flush] [-num=<n>] [-verbose]IP Reputation cache.
ipreputation -subsystems [-verbose]Show subsystem information.
ipreputation -statistics[={TOTAL | 24H | 2M | 30D}]Show IP Reputation statistics.
Options
Show the IPsec SAs in use.
Description
List the currently active IPsec SAs, optionally only showing SAs matching the pattern given for the argument "iface".Usage
ipsec -stat [<IPsecTunnelBase>]Show global or interface statistics about IPsec SAs.
ipsec -show [<IPsecTunnelBase>] [-verbose] [-num={ALL | <Integer>}] [-srcif=<Interface>] [-force] [-usage]Show SA information.
ipsec -globalstats [-verbose]Show global IPsec statistics.
ipsec -definesShow IPsec system defines.
ipsecShow SA information.
Options
Show statistics about HA synchronization for IPsec.
Description
Shows statistics about IKE/IPsec SAs synchronized and how many that failed to import. Sent statistics shows how many packets that has been sent to the other cluster member when this node was active and receive statistics show how many packets/failures it got as inactive.Usage
ipsechastat [-clear]
Options
Show L2TP information.
Description
Shows L2TP information and statistics.Usage
l2tp -state={ALL | ACTIVE | LISTENING} [-child] [-num=<Integer>]Show all L2TP sessions.
l2tp -l2tpserver=<PPTP/L2TP Server> [-l2tpv3server=<L2TPv3 Server>] [-l2tpv3client=<L2TPv3 Client>] [-l2tpclient=<PPTP/L2TP Client>] [-state={ALL | ACTIVE | LISTENING}] [-child] [-num=<Integer>]List L2TP sessions.
l2tp -l2tpv3server=<L2TPv3 Server> [-l2tpserver=<PPTP/L2TP Server>] [-state={ALL | ACTIVE | LISTENING}] [-child] [-num=<Integer>]List L2TP sessions.
l2tp -l2tpclient=<PPTP/L2TP Client> [-l2tpv3client=<L2TPv3 Client>] [-state={ALL | ACTIVE | LISTENING}] [-child] [-num=<Integer>]List L2TP sessions.
l2tp -l2tpv3client=<L2TPv3 Client> [-l2tpclient=<PPTP/L2TP Client>] [-state={ALL | ACTIVE | LISTENING}] [-child] [-num=<Integer>]List L2TP sessions.
Options
Manage language files on disk.
Description
Manage language files on diskUsage
languagefilesShow all language files on disk.
languagefiles -remove=<String>Remove a language file from disk.
Options
LDAP information.
Description
Status and statistics for the configured LDAP databases.Usage
ldapList all LDAP databases.
ldap -listList all LDAP databases.
ldap -show [<LDAP Server>]Show LDAP database status and statistics.
ldap -reset [<LDAP Server>]Reset LDAP database.
Options
License management.
Description
Manage the contents of the current license.Usage
licenseShow the contents of the current license.
license -showShow the contents of the current license.
license -activate [-request] [-username=<String>] [-password=<String>]Activates a license.
license -myclavister [-username=<String>] [-password=<String>] [-disconnect]Manages the MyClavister connection.
license -downloadlicenseDownloads the latest license from MyClavister.
license -checkdatePerform a check to see if a newer license exists from MyClavister.
license -removeRemove the installed license. Unit will enter 2h demo mode.
license -updateInitiate a license update.
license -secaas_add <String> <String>Add SECaaS configuration.
license -secaas_removeRemove SECaaS configuration and license.
Options
Display link montitoring statistics.
Description
If link monitor hosts have been configured, linkmon will monitor host reachability to detect link/NIC problems.Usage
linkmon
Simple tool to test connection to external server.
Description
Verifies connection using Measurement Lab NDT7 protocol or HTTP(S) server.Usage
linktestShow test results.
linktest -abort [-clear]Aborts currently running test.
linktest -clearClear results from previous test.
linktest -show [-verbose]Show test results.
linktest -start [-host=<IPAddress>] [-port=<1...65535>] [-ssl={TRUE | FALSE}] [-pbr=<table>] [-clients[=<1...15>]]Speed test using Measurement Lab NDT7.
linktest -start_http {GET | PUT | POST} <String> [-limit[=<MB>]] [-timeout[=<seconds>]] [-pbr=<table>] [-clients[=<1...15>]]Speed test using HTTP(S) server.
Options
Note | |
---|---|
Requires Administrator privileges. |
Commands related to the Light-Weight HTTP inspection engine.
Description
The lwhttp CLI command prints information about the Light-Weight HTTP inspection engine a.k.a. LW-HTTP ALG.The LW-HTTP inspection engine is automaticlaly enabled for IP policies with HTTP protocol validation or a web profile configured.
Compared to the ordinary HTTP-ALG, the LW-HTTP inspector provides better throughput performance without affecting network security.
Usage
lwhttp
The MAC address storage.
Description
The mac address storage keeps mac addresses persistent for SR-IOV interfaces when used in virtual environments.Usage
macstorage
Show remote management status.
Description
Show remote management status and informationUsage
managementList remote management.
management -type=InCenterShow InCenter remote management.
management -type=InControlShow InControl remote management.
management -type={REST | SNMP | SSH | WEBUI} [<String>]Show info for specific remote management.
Options
Show memory information.
Description
Show core memory consumption. Also show detailed memory use of some components and lists.Usage
memory [-sort={DESC | TOTAL | NUM}]
Options
Show current NAT Pools.
Description
Show current NAT Pools and in-depth information.Usage
natpool [-num=<Integer>] [<pool name> [<IPv4 Address>]]
Options
Show Neighbor Discovery entries for given interface.
Description
List the Neighbor Discovery cache entries of specified interfaces.If no interface is given the Neighbor Discovery cache entries of all interfaces will be presented.
The presented list can be filtered using the ip
and hw
options.
Usage
nd -routerdiscovery [<Interface>] [-num=<n>]Show Router Discovery enabled interfaces.
ndShow all Neighbor Discovery entries.
nd -show [<Interface>] [-ip=<pattern>] [-hw=<pattern>] [-num=<n>]Show Neighbor Discovery entries.
nd -hashinfo [<Interface>]Show information on hash table health.
nd -flush [<Interface>]Flush Neighbor Discovery cache of specified interface.
nd -query=<ip> <Interface>Send Neighbor Solicitation for IP.
nd -del=<ip> <Interface>Delete ND cache entry.
Options
Toggle snooping and displaying of ARP requests.
Description
Toggle snooping and displaying of Neighbor Discovery queries and responses on-screen.The snooped messages are displayed before the access section validates the sender IP addresses in the ARP data.
Usage
ndsnoopShow snooped interfaces.
ndsnoop {ALL | NONE | <interface>} [-verbose]Snoop specified interface.
Options
Note | |
---|---|
Requires Administrator privileges. |
Shows the default contents of the neighbor cache.
Description
Contains information such as hostname, configured name, hardware address and ip4 address, for the firewall's network neighbors.Usage
neighborcacheShow neighbor cache.
neighborcache -show [-names] [-users] [-ipv6] [-devinfo] [-filter={INACTIVE | ACTIVE}]Show neighbor cache.
neighborcache -devinfo [-filter={INACTIVE | ACTIVE}]Show device intelligence information for neighbor cache entries.
Options
Show runtime values of network objects.
Description
Displays named network objects and their contents.Usage
netobjects [<String>] [-num=<num>]
Options
OIDC command.
Description
OIDC functions.Usage
oidcShow OIDC objects.
oidc -manualShow manual OIDC objects.
oidc -discovery [-url=<String>]Manual discovery download.
oidc -memoryShow OIDC memory usage.
oidc -refreshRefresh OIDC contexts.
oidc -verboseVerbose output.
Options
OneConnect tunnels.
Description
List running OneConnect configurations, OneConnect active tunnels and call information.Usage
oneconnect -num=<n> [-verbose]Show sessions.
Options
Show runtime OSPF information.
Description
Show runtime information about the OSPF router process(es).Note: -process
is only required if there are >1 OSPF router processes.
Usage
ospfShow runtime information.
ospf -iface [<interface>] [-process=<OSPF Router Process>]Show interface information.
ospf -area [<OSPF Area>] [-process=<OSPF Router Process>]Show area information.
ospf -neighbor [<OSPF Neighbor>] [-process=<OSPF Router Process>]Show neighbor information.
ospf -route [{HA | ALT}] [-process=<OSPF Router Process>]Show the internal OSPF process routingtable.
ospf -database [-verbose] [-process=<OSPF Router Process>]Show the LSA database.
ospf -lsa <lsaID> [-process=<OSPF Router Process>]Show details for a specified LSA.
ospf -snoop={ON | OFF} [-process=<OSPF Router Process>]Show troubleshooting messages on the console.
ospf -ifacedown <interface> [-process=<OSPF Router Process>]Take specified interface offline.
ospf -ifaceup <interface> [-process=<OSPF Router Process>]Take specified interface online.
ospf -execute={STOP | START | RESTART} [-process=<OSPF Router Process>]Start/stop/restart OSPF process.
Options
Packet capturing.
Description
Packet capture engineUsage
pcapdumpShow capture status.
pcapdump -start [<interface(s)>] [-size=<value>] [-snaplen=<value>] [-count=<value>] [-out] [-out-nocap] [-eth=<Ethernet Address>] [-ethsrc=<Ethernet Address>] [-ethdest=<Ethernet Address>] [-ip=<IPv4 Address>] [-ipsrc=<IPv4 Address>] [-ipdest=<IPv4 Address>] [-port=<String>] [-srcport=<String>] [-destport=<String>] [-proto=<0...255>] [-icmp] [-tcp] [-udp] [-promisc] [-ipversion=<1...15>]Start capture.
pcapdump -stop [<interface(s)>]Stop capture.
pcapdump -statusShow capture status.
pcapdump -show [<interface(s)>] [-num={ALL | <Integer>}]Show a captured packets brief.
pcapdump -write [<interface(s)>] [-filename=<String>]Write the captured packets to disk.
pcapdump -wipeRemove all captured packets from memory.
pcapdump -cleanupRemove all captured packets, release capture mode and delete all written capture files from disk.
Options
Note | |
---|---|
Requires Administrator privileges. |
Show detected PCI devices.
Description
Usage
pciscanShow identified ethernet devices.
pciscan -allShow all detected devices.
pciscan -ethernetShow all detected ethernet devices.
pciscan -cfgupdateUpdates the config with detected devices.
pciscan -force_driver <Integer> {BROADCOM | BNE2 | E100 | E1000 | R8139 | R8169 | MARVELL | NITROXII | ST201 | TULIP | VIRTIO | X3C905}Force a certain driver to a device.
Options
Show pipes information.
Description
Show list of configured pipes / pipe details / pipe users.Note: The "pipes" command is not executed right away; it is queued until the end of the second, when pipe values are calculated.
Usage
pipesList all pipes.
pipes -users [<Pipe>] [-expr=<String>]List users of a given pipe.
pipes -show [<Pipe>] [-expr=<String>]Show pipe details.
Options
Show PPTP information.
Description
Shows PPTP information and statistics.Usage
pptp -state={ALL | ACTIVE | LISTENING | CHILDONLY} [-child] [-num=<Integer>]Show all PPTP sessions.
pptp -pptpserver=<PPTP/L2TP Server> [-state={ALL | ACTIVE | LISTENING | CHILDONLY}] [-child] [-num=<Integer>]List PPTP sessions.
pptp -pptpclient=<PPTP/L2TP Client> [-state={ALL | ACTIVE | LISTENING | CHILDONLY}] [-child] [-num=<Integer>]List PPTP sessions.
Options
Show PPTP ALG information.
Description
Shows information and statistics of the PPTP ALGs.Usage
pptpalgShow all configured PPTP ALGs.
pptpalg -sessions <PPTP ALG> [-verbose] [-num=<Integer>]List all PPTP sessions.
pptpalg -services <PPTP ALG>List all services attached to PPTP ALG.
Options
Initiates a configuration re-read.
Description
Restart the firewall using the currently active configuration.Usage
Note | |
---|---|
Requires Administrator privileges. |
Rekey IPsec or IKE SAs established with given remote peer.
Description
Rekey IPsec or IKE SAs associated with a given remote IKE peer, or optionally all IPsec or IKE SAs in the system.Usage
rekeysa -ike <ip address>Rekey IKE SAs.
rekeysa -ipsec <ip address>Rekey IPsec SAs.
rekeysa <ip address>Rekey IPsec SAs.
Options
Note | |
---|---|
Requires Administrator privileges. |
List the currently monitored interfaces and gateways.
Description
List the currently monitored interfaces and/or gateways.Usage
routemon
Display routing lists.
Description
Display information about the routing table(s):Note that "core" routes for interface IP addresses are not normally shown.
Use the -all
switch to show core routes also.
Use the -switched
switch to show only switched routes.
Explanation of Flags field of the routing tables:
Usage
routes [-all] [<table name>] [-switched] [-flushl3cache] [-num=<n>] [-nonhost] [-tables] [-lookup=<ip address>] [-verbose]
Options
Real-time monitor information.
Description
Show information about real-time monitor objects, and real-time monitor alerts.All objects matching the specified filter are displayed. The filter can be the name of an object, or the beginning of a name. If no filter is specified, all objects are displayed.
If the option "monitored" is specified, only objects that have an associated real-time monitor alert are displayed.
Usage
rtmonitor [<filter>] [-terse] [-monitored] [-num={ALL | <Integer>}]
Options
Show rules lists.
Description
Shows the content of the various types of rules, i.e. main ruleset, pipe ruleset, etc.Usage
rules -type=IP [-ruleset={* | MAIN | <IP Rule Set>}] [-verbose] [-schedule] [-usageless=<usageless>] [-usagemore=<usagemore>] [<rules>]...Show IP rules.
rules -type={ROUTING | PIPE | IDP | THRESHOLD | IGMP} [-verbose] [-schedule] [-usageless=<usageless>] [-usagemore=<usagemore>] [<rules>]...Show a specific type of rules.
Options
Run appliance self tests.
Description
The appliance self tests are used to verify the correct function of hardware components.IMPORTANT: In order for a selftest result to be reliable the test must be run using a default configuration and having the firewall disconnected from any networks.
IMPORTANT: Normal firewall operations might be disrupted during the test(s).
The outcome of the throughput crypto accelerator tests are dependent on configuration values. If the number of large buffers (LocalReassSettings->LocalReass_NumLarge) too low, it might lower throughput result. In the field 'Drop/Fail', the 'Drop' column contains the number of packets that were dropped before ever reaching the crypto accelerator and the 'Fail' column contains the number of packets that for some reason failed encryption. The 'Pkt In/Out' field shows the total number of packets sent to, and returned from the accelerator.
The interface tests 'traffic' and 'throughput' are dependent on the settings for the NIC ring sizes and possibly also license limitations. The 'traffic' test uses a uniform random distribution of six packet sizes between 60 and 1518 bytes. The content of each received packet is validated. The 'throughput' test uses only the largest packet size, and does not validate the contents of the received packets.
Example 2.14. Interface ping test between interfaces 'if1' and 'if2'
selftest -ping -interfaces=if1,if2
Example 2.15. Start 30 min burn-in, testing RAM, storage media and crypto accelerator
selftest -burnin -minutes 30 -media -memory -cryptoaccel
Usage
selftest -memory [-num=<Integer>]Check the sanity of the RAM.
selftest -sslValidation and Performance test for SSL.
selftest -media [-size=<Integer>]Check the sanity of the disk drive.
selftest -macCheck if there are MAC address collisions on the interfaces.
selftest -ping [-interfaces=<Interface>]Run a ping test over the interfaces.
selftest -throughput [-interfaces=<Interface>]Run a throughput test over the interfaces.
selftest -traffic [-interfaces=<Interface>] [-verbose]Run a traffic test over the interfaces.
selftest -latency [-interfaces=<Interface>]Run a latency test over the interfaces.
selftest -cryptoaccelVerify the correct functioning of the accelerator cards.
selftest -burnin [-hours[=<Integer>]] [-minutes[=<Integer>]] [-memory] [-media] [-ping] [-throughput] [-traffic] [-cryptoaccel] [-size=<Integer>]Run burn-in tests for a set of sub tests. If no sub tests are specified the following are included: -memory, -ping, -traffic, -cryptoaccel.
selftest -abortAbort a running self test.
selftestShow the status of a running test.
Options
Note | |
---|---|
Requires Administrator privileges. |
Show runtime values of configured services.
Description
Shows the runtime values of all configured services.Usage
servicesList services.
services <String>Show services.
services -policy [<String>]Show IP Policy generated services.
Options
Session Manager.
Description
Show information about the Session Manager, and list currently active users.Explanation of Timeout flags for sessions:
Usage
sessionmanagerShow Session Manager status.
sessionmanager -statusShow Session Manager status.
sessionmanager -list [-num=<n>]List active sessions.
sessionmanager -info <session name> <database>Show in-depth information about session(s).
sessionmanager -message <session name> <database> <message text>Send message to session with console.
sessionmanager -disconnect <session name> <database> [<IP Address> [{LOCAL | SSH | NETCON | HTTP | HTTPS}]]Forcibly terminate session(s).
Options
Show settings.
Description
Show the contents of the settings section, category by category.Usage
settingsShow list of categories.
settings <category>Show settings in category.
Options
Initiate core or system shutdown.
Description
Initiate restart of the core/system.Usage
shutdown [<seconds>] [-normal] [-reboot]
Options
Note | |
---|---|
Requires Administrator privileges. |
SIP ALG.
Description
List running SIP-ALG configurations, SIP registration and call information.The -flags option with -snoop allows any combination of the following values:
Flags can be added in the usual way. The default value is 0x00000003 (GENERAL and ERRORS).
NOTE: 'verbose' option outputs a lot of information on the console which may lead to system instability. Use with caution.
Usage
sipalg -definition [<alg>]Show running ALG configuration parameters.
sipalg -registration[={SHOW | FLUSH}] <alg>Show or flush current registration table.
sipalg -calls <alg>Show active calls table.
sipalg -session <alg>Show active SIP sessions.
sipalg -connection <alg> [-num=<n>]Show SIP connections.
sipalg -statistics[={SHOW | FLUSH}] <alg>Show or flush SIP counters.
sipalg -snoop={ON | OFF | VERBOSE} [<ipaddr>] [-flags=<String>]Control SIP snooping. Useful for troubleshooting SIP transactions. NOTE: 'verbose' option outputs a lot of information on the console which may lead to system instability. Use with caution.
Options
Manage and show status for SLB.
Description
Display SLB status and preform various related actionsUsage
slbDisplay status for all policies.
slb -status <String>Display status for specific policy.
slb -suspend <String> <ip address>Suspend load distribution to server.
slb -resume <String> <ip address>Resume load distribution to server.
Options
List SMTP LogReceiver sessions and send test mail.
Description
List SMTP sessions for configured SMTP LogReceivers and CLI SMTP sessions created when using "sendmail" to send test mail to SMTP LogReceiver. The temporary CLI sessions, marked with (CLI), has a lifetime of 300s.Usage
smtp -list [-num[=<1...1000>]] [-verbose]Show SMTP sessions.
smtp -verboseShow SMTP sessions with verbose output.
smtp -statShow SMTP statistics.
smtp -sendmail -logreceiver=<Mail Alerting> [-message=<String>]Send mail to specified SMTP LogReceiver.
Options
Show SNMP information.
Description
Show SNMP statusUsage
snmp [-engineId]
Options
SSH Server.
Description
Show SSH Server status, or start/stop/restart SSH Server.Usage
sshserverShow server status and list all connected clients.
sshserver -status [-verbose]Show server status and list all connected clients.
sshserver -keygen <Local System SSH Host Key>Generate SSH Server private keys.
sshserver -restart <ssh server>Restart SSH Server.
Options
Note | |
---|---|
Requires Administrator privileges. |
SSLVPN tunnels.
Description
List running SSLVPN configurations, SSLVPN active tunnels and call information.Usage
sslvpn [-num=<n>]
Options
Display various general firewall statistics.
Description
Display general information about the firewall, such as uptime, CPU load, resource consumption and other performance data.Usage
Technical Support information.
Description
Generate information useful for technical support.Due to the large amount of output, this command might show a truncated result when execute from the local console.
Usage
techsupport
Display current system time.
Description
Display/set the system date and time.Usage
timeDisplay current system time.
time -verboseDisplay current system time.
time -set <date> <time>Set system local time: <YYYY-MM-DD> <HH:MM:SS>.
time -sync [-force]Synchronize time with timeserver(s) (specified in settings).
Options
Show user authentication rules.
Description
Displays the contents of the user authentication ruleset.Usage
uarules [-verbose] [<Integer Range>]
Options
Show status and manage autoupdate information.
Description
Show autoupdate mechanism status or force an update.Usage
updatecenterShow update status and database information.
updatecenter -status[={ANTIVIRUS | IDP | IPREPUTATION | ALL}]Show update status and database information.
updatecenter -update[={ANTIVIRUS | IDP | IPREPUTATION | ALL}]Initiate an update check of the specified database.
updatecenter -removedb={ANTIVIRUS | IDP | IPREPUTATION}Remove the specified signature database.
updatecenter -serversShow status of update servers.
Options
Show logged-on users.
Description
Show currently logged-on users and other information. Also allows logged-on users to be forcibly logged out.Note: In the user listing -list
, only privileges actually used by
the policy are displayed.
Usage
userauthList all authenticated users.
userauth -list [-num=<n>] [-blocked] [-verbose]List all authenticated users.
userauth -privilegeList all known privileges (usernames and groups).
userauth -user [<user ip>]Show all information for user(s) with this IP address.
userauth -remove [<user ip> [<Interface>]] [-all]Forcibly log out an authenticated user.
Options
Show information about VLAN.
Description
Show list of attached Virtual LAN Interfaces, or in-depth information about a specified VLAN.Usage
vlanList attached VLANs.
vlan -num=<n> [-page[=<n>]] [-verbose]Set number of display lines per page and display page.
vlan <Interface>Display in-depth information about a VLAN interface, and/or the VLAN interfaces that are based on a specific interface.
vlan -verboseShow more details, eg zone and PBR table, for the configured VLAN interfaces.
Options
Zonedefense.
Description
Block/unblock IP addresses/net and ethernet addresses.Usage
zonedefense [-save] [-blockip=<ip address>] [-blockenet=<ethernet address>] [-eraseip=<ip address>] [-eraseenet=<ethernet address>] [-status] [-show]
Options
Display GeoIP information.
Description
Display status of GeoIP database and perform manual lookups.Usage
geoipDisplay statistics.
geoip -filters [-num=<n>]Display filter information.
geoip -statusDisplay statistics.
geoip -query <IPAddress>Lookup IP address to GeoIP location.
Options
Ping host.
Description
Sends one or more ICMP ECHO, TCP SYN or UDP datagrams to the specified IP address of a host. All datagrams are sent preloaded-style (all at once).The data size -length
given is the ICMP or UDP data size.
1472 bytes of ICMP data results in a 1500-byte IP datagram (1514 bytes ethernet).
Usage
ping [<String>] [-srcif=<interface>] [-srcip=<ip address>] [-pbr=<table>] [-count=<1...10>] [-length=<2...8192>] [-port=<0...65535>] [-srcport=<0...65535>] [-udp] [-tcp] [-tos=<0...255>] [-verbose] [-6]
Options
Trace route.
Description
Print the route packets take to a network host.Usage
traceroute <host> [-starthop=<1...255>] [-maxhops=<1...255>] [-timeout=<1...60000>] [-count=<1...10>] [-size=<0...32768>] [-pbr=<table>] [-srcip=<ip address>] [-noresolve] [-nodelay] [-6]Trace using ICMP.
traceroute -tcp <host> [-port=<1...65535>] [-starthop=<1...255>] [-maxhops=<1...255>] [-timeout=<1...60000>] [-count=<1...10>] [-pbr=<table>] [-srcip=<ip address>] [-noresolve] [-nodelay] [-6]Trace using TCP.
traceroute -udp <host> [-port=<1...65535>] [-starthop=<1...255>] [-maxhops=<1...255>] [-timeout=<1...60000>] [-count=<1...10>] [-size=<0...32768>] [-pbr=<table>] [-srcip=<ip address>] [-noresolve] [-nodelay] [-6]Trace using UDP.
traceroute -stopStop trace.
Options
Print text.
Description
Print text to the console.Usage
echo [<String>]...
Options
Show help for selected topic.
Description
The help system contains information about commands and configuration object types.The fastest way to get help is to simply type help followed by the topic that you want help with. A topic can be for example a command name (e.g. set) or the name of a configuration object type (e.g. User).
When you don't know the name of what you are looking for you
can specify the category of the wanted topic with the -category
option and use tab-completion to display a list
of matching topics.
Usage
helpList commands alphabetically.
help <Topic>Display help about selected topic from any category.
help -category={COMMANDS | TYPES} [<Topic>]Display help from a specific topic category.
Options
Dump history to screen.
Description
List recently typed commands that have been stored in the command history.Usage
history
Show management status and enable local configuration.
Description
Show management status, and regain local configuration control if the centralized management system has it.If the centralized management system has taken control of the system, any single user may not do configuration changes to the system. In order to regain local configuration control to single users this command is used. Once local configuration is enabled, centralized management control can only be enabled by the centralized management system.
Usage
localconfiguration [-enable]
Options
Note | |
---|---|
Requires Administrator privileges. |
Display and filter system log messages.
Description
The logsnoop command can be used to display system log events. The source of the log events can be MemLog, real-time or both MemLog followed by real-time logs.MemLog searching will only be functioning if a LogReceiverMemory object has been configured.
Since the system log rate may be high, displaying real time logs must be done with some caution. For this purpose, it is possible to limit the real time log display rate.
When filtering for log messages to display, there are many parameters that can be filtered on. The most powerful filtering tool is the wildcard matching in which the charcter '*' is interpreted as none/many characters and '?' as any single character.
It should be noted that all log filtering will have a negative effect on system performance.
Example 2.19. Show log message having 'warning' followed by 'udp' somewhere in the message
:/> logsnoop -on -pattern=*warning*udp*
Usage
logsnoop -on [-source={MEMLOG | REALTIME | BOTH}] [-category=<String>] [-logid=<Integer>] [-event=<String>] [-action={NONE | DROP | ALLOW | BLOCK | REJECT | <String>}] [-severity={EMERGENCY | ALERT | CRITICAL | ERROR | WARNING | NOTICE | INFO | DEBUG}] [-starttime=<DateTime>] [-endtime=<DateTime>] [-pattern=<String>] [-srcip=<IPAddress>] [-destip=<IPAddress>] [-srcport=<0...65535>] [-destport=<0...65535>] [-srcif=<Interface>] [-destif=<Interface>] [-ipproto={TCP | UDP | ICMP | <String>}] [-rate=<Integer>] [-num=<Integer>]Start log session.
logsnoop -offStop log session.
logsnoopShow log snoop status.
Options
Note | |
---|---|
Requires Administrator privileges. |
Lists device data accessible by SCP.
Description
Lists device data which are available through SCP.Example 2.24. Transfer script files to and from the device
Upload: scp myscript user@fw-ip:script/myscript Download: scp user@fw-ip:script/myscript ./myscript
In addition to the files listed it is possible to upload license, certificates and ssh public key files.
Certificates and ssh client key objects are created if they do not exist.
Example 2.26. Upload certificate data
scp certificate.cer user@fw-ip:certificate/certificate_name scp certificate.key user@fw-ip:certificate/certificate_name
Usage
Options
Handle CLI scripts.
Description
Run, create, show, store or delete script files.Script files are transferred to and from the device by the SCP protocol. On the device they are stored in the "/script" folder.
Example 2.28. Execute script
"script.sgs": add IP4Address Name=$1 Address=$2 Comment="$0: \$100". :/> script -execute -name=script.sgs ip_test 127.0.0.1 is executed as line: add IP4Address Name=ip_test Address=127.0.0.1 Comment="script.sgs: $100"
Usage
script -create [[<Category>] <Type> [<Identifier>]] [-name=<Name>]Create configuration script from specified object, class or category.
script -execute [-verbose] [-force] [-quiet] -name=<Name> [<Parameters>]...Execute script.
script -show [-all] [-name=<Name>]Show script in console window.
script -store [-all] [-name=<Name>]Store a script to persistent storage.
script -remove [-all] [-name=<Name>]Remove script.
scriptList script files.
Options
Note | |
---|---|
Requires Administrator privileges. |
Description
Use an access rule to allow or block specific source IP addresses on a specific interface.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
ACME is a protocol that allows for automated issue of certificates, mostly used with Lets Encrypt.Properties
Description
An automated request certificate, using protocol ACME, that can be used as any regular certificate.Properties
This is a category that groups the following object types.
Description
An address folder can be used to group related address objects for better overview.Properties
Description
Use an Ethernet Address item to define a symbolic name for an Ethernet MAC address.Properties
Description
An Ethernet Address Group is used for combining several Ethernet Address objects for simplified management.Properties
Description
Use an IPv4 Address item to define a name for a specific IPv4 host, network or range.Properties
Description
An IPv4 Address Group is used for combining several IPv4 Address objects for simplified management.Properties
Description
Use an IPv4 HA Address item to define a name for a specific IPv4 host for each node in a high availability cluster.Properties
Description
Use an IPv6 Address item to define a name for a specific IPv6 host, network or range.Properties
Description
An IPv6 Address Group is used for combining several IPv6 Address objects for simplified management.Properties
Description
Use an IPv6 HA Address item to define a name for a specific IPv6 host, network or range for each node in a high availability cluster.Properties
Description
Use an FQDN Address item to define a name for a domain name.Properties
Description
An FQDN Address Group is used for combining several FQDN Address objects for simplified management.Properties
The definitions here are the same as in Section 3.3.1.2, EthernetAddressGroup .
Description
An advanced schedule profile contains definitions of occurrences used by various policies in the system.Properties
Description
An advanced schedule occurrence specifies an occurrence that should happen between certain times for days in month/weekProperties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
This is a category that groups the following object types.
Description
Use an FTP Application Layer Gateway to manage FTP traffic through the system.Properties
Description
Use an H.323 Application Layer Gateway to manage H.323 multimedia traffic.Properties
Description
Use an HTTP Application Layer Gateway to filter HTTP traffic.Properties
Description
Blacklist URLs to deny access to complete sites, to file types by extension, or to URLs with certain words in them.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Use an POP3 Application Layer Gateway to manage POP3 traffic through the system.Properties
Description
Use a PPTP Application Layer Gateway to manage PPTP traffic through the system.Properties
Description
Use a SIP ALG to manage SIP based multimedia sessions.Properties
Description
Use an SMTP Application Layer Gateway to manage SMTP traffic through the system.Properties
Description
Used to whitelist or blacklist an email sender/recipient.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Use an TFTP Application Layer Gateway to manage TFTP traffic through the system.Properties
Description
Use a TLS Application Layer Gateway to manage TLS traffic through the system.Properties
Description
An Anti-Virus Profile can be used by one or many IP Policies which has its service object configured with a protocol that supports anti-virus scanning (HTTP, FTP, POP3, SMTP, IMAP).Properties
Description
Settings related to the Application Control functionality.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
An Application Rule Set contains a list of Application Rules and some settings and can be used by one or more IP rules/IP Policies to configure Application Control on the traffic matching those IP Rules/IP Policies.Properties
Description
An application rule specifies what action to perform on applications that matches the specified filter criteria.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Use an ARP/Neighbor Discovery entry to publish additional IP addresses and/or MAC addresses on a specified interface.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Advanced ARP/Neighbor Discovery-table settings.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
The Authentication Agent collect user login and logout events on a network domain controller.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Settings related to Authentication and Accounting.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
This type lets you set up an IPsec tunnel to Microsoft Azure (IKEv2 tunnel with AES, AES-GCM, SHA-2, DH group 2, 14, 19, 20 (ECP256/384) and forward secrecy). Please note that the DH group 2 is considered insecure and shouldn't be used. Group 2 is however the default and only DH group set by default in Azure. It's recommended that you configure Azure to use the more secure DH group 14.Properties
Description
Hosts and networks added to this whitelist can never be blacklisted by IDP or Threshold Rules.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Broadcom NE2 Gigabit Ethernet.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Protect both inbound and outbound traffic from undesired communication with command and control servers as well as infected zombie machines. Detected botnet peers are automatically blacklisted for efficient blocking. Specific hosts can be excluded from Botnet Protection using the Whitelist.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Broadcom NE Gigabit Ethernet.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
An X.509 certificate can be used to authenticate IKE peers or HTTPS servers.Properties
Description
A serial communication port, that is used for accessing the CLI.Properties
Description
An IKE Config Mode Pool will dynamically assign the IP address, DNS server, WINS server etc. to the VPN client connecting to this firewall.Properties
Description
Timeout settings for various protocols.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A CRL distribution point list specifies one or more locations from where a certificate revocation list (CRL) can be obtained. It can be used to add distribution points to a certificate that does not provide any, or to override existing ones. Listed distribution points will be tried in order of occurance.Properties
Description
A CRL distribution point (CDP) specifies a location from where a certificate revocation list (CRL) can be obtained.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Set the date, time and time zone information for this system.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A special interface used to represent internal mechanisms in the system as well as an abstract "any" interface.Properties
Description
Global parameters for this device.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Use a DHCP Relay to dynamically alter the routing table according to relayed DHCP leases.Properties
Description
Advanced DHCP relay settings.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A DHCP Server determines a set of IP addresses and host configuration parameters to hand out to DHCP clients attached to a given interface.Properties
Description
Static DHCP Server host entryProperties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Extend the DHCP Server functionality by adding custom options that will be handed out to the DHCP clients.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Advanced DHCP server settings.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A DHCPv6 Server determines a set of IPv6 addresses and host configuration parameters to hand out to DHCPv6 clients attached to a given interface.Properties
Description
Static DHCPv6 Server host entryProperties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Advanced DHCPv6 server settings.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Control how anonymous usage statistics are automatically shared with Clavister to improve the quality of the product and the services. Sensitive information e.g. VPN keys or certificates are not shared. All communication is encrypted and no information is shared with 3rd parties. <br>Please note that the data is not sent anonymously when the My Clavister connection is activated.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Configure the DNS (Domain Name System) client settings.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A DNS Profile can be used by one or many IP Policies which has its service object configured with DNS as protocol.Properties
Description
DoS Protection protects servers behind the firewall from Denial of Service attacks. Detected DoS sources are automatically blacklisted for efficient blocking. Specific hosts can be excluded from DoS protection using the Whitelist. DoS Protection can also block traffic from configured geographical regions.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Settings related to DTLS (Datagram Transport Layer Security). Subsystems affected: OneConnect.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A Dynamic Routing Policy rule creates a filter to catch statically configured or OSPF learned routes. The matched routes can be controlled by the action rules to be either exported to OSPF processes or to be added to one or more routing tables.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
An OSPF action is used to manipulate and export new or changed routes to an OSPF Router Process.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
A routing action is used to manipulate and insert new or changed routes to one or more local routing tables.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Configure the parameters used to connect to the Duck DNS dynamic DNS service.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Configure the parameters used to connect to the dyn.com dynamic DNS service.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Configure the parameters used to connect to the dyns.cx dynamic DNS service.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Intel (E1000) Gigabit Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Intel (E100) Fast Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
An E-mail Control Profile can be used by one or many IP Policies which has its service object configured with a protocol that supports e-mail scanning (IMAP, POP3, SMTP).Properties
Description
Add an email filter to whitelist or blacklist an email source and/or destination combination. A whitelisted message will bypass all other anti-spam mechanisms. A blacklisted message is treated as spam.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
An Ethernet interface represents a logical endpoint for Ethernet traffic.Properties
Description
Hardware settings for an Ethernet interface.Properties
Description
Settings for Ethernet interface.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A SNMPv2c event receiver is used to receive SNMP events from the system.Properties
Description
A log message exception is used to override the severity filter in the log receiver.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
A SNMPv3 event receiver is used to receive SNMP events from the system.Properties
The definitions here are the same as in Section 3.47.1, LogReceiverMessageException .
Description
A Fallback Policy translate the destination address like a SAT IP Policy but also have the possibility to specify a secondary address that will be used when, and only when, the primary address is unreachable.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
A File Control Profile can be used by one or many IP Policies which has its service object configured with a protocol that supports file control scanning (HTTP, FTP, POP3, SMTP, IMAP).Properties
Description
Settings related to fragmented packets.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A goto rule specifies what IP rule set to match IP rules in for traffic that matches the specified filter criteria.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
A GRE interface is a Generic Routing Encapsulation (no encryption, no authentication, only encapsulation) tunnel over an existing IP network.Properties
Description
Configure the High Availability cluster parameters for this system.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
HTTP banner files specifies the look and feel of HTTP ALG restriction web pages.Properties
Description
HTTP banner files specifies the look and feel of HTML authentication web pages.Properties
Description
Use the HTTP poster for dynamic DNS or automatic logon to services using web-based authentication.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Hardware Monitoring allows monitoring of hardware sensors.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
General settings for Hardware MonitoringProperties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Settings related to the ICMP protocol.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
An ID list contains IDs, which are used within the authentication process when establishing an IPsec tunnel.Properties
Description
An ID is used to define parameters that are matched against the subject field in an X.509 certificate when establishing an IPsec tunnel.Properties
Description
An IDP Rule defines a filter for matching specific network traffic. When the filter criterion is met, the IDP Rule Actions are evaluated and possible actions taken.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
An IDP Rule Action specifies what signatures to search for in the network traffic, and what action to take if those signatures are found.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
An IGMP rule specifies how to handle inbound IGMP reports and outbound IGMP queries.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
IGMP parameters can be tuned for one, or a group of interfaces in order to match the characteristics of a network.Properties
Description
Configure algorithms which are used in the IKE phase of an IPsec session.Properties
Description
Use an interface group to combine several interfaces for a simplified security policy.Properties
Description
A 6in4 tunnel (no encryption, no authentication, only encapsulation) allows tunneling of IPv6 packets over an existing IPv4 network.Properties
Description
An IP Policy specifies what action to perform on network traffic that matches the specified filter criteria.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
An IP Pool is a dynamic object which consists of IP leases that are fetched from a DHCP Server. The IP Pool is used as an address source by subsystems that may need to distribute addresses, e.g. by IPsec in Configuration mode.Properties
Description
An IP Rule specifies what action to perform on network traffic that matches specific filtering criteria. It is recommended to use an IP Policy instead of an IP Rule.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
An IP Rule Folder can be used to group IP Rules into logical groups for better overview and simplified management.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Multiplex Static Address Translation. The Multicast rule is used to achieve duplication and forwarding of packets through more than one interface.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Reverse Proxy Policy. The Reverse Proxy receives HTTP and HTTPS requests from outside networks and forwards them to the designated servers.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Maps URL to destination server IP or server nameProperties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
The URI filter is used deny access to certain areas of sites using the blacklist action.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Server Load Balancing using Static Address Translation. Allows distribution of client requests over a number of servers.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
No state is kept between packets which means it is less secure and slower than stateful forwarding.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
A return rule makes the IP rule scan resume from the goto rule that led to the current IP rule set. If there was no goto rule leading to the current IP rule set the connection is dropped and rule scanning stops.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
An IP Rule Set is a self-contained set of IP Rules. Default action is Drop.Properties
The definitions here are the same as in Section 3.71.4, ReverseProxyPolicy .
Description
Configure algorithms which are used in the IPsec phase of an IPsec session.Properties
Description
An IPsec tunnel item is used to define IPsec endpoint and will appear as a logical interface in the system.Properties
Description
Settings for the IPsec tunnel interfaces used for establishing IPsec VPN connections to and from this system.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Settings related to the IP protocol.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Intel (IXGBE) 10 Gigabit Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Intel (IXP4xxNPE) Fast Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A PPTP/L2TP client interface is a PPP (Point-to-Point Protocol) tunnel over an existing IP network. Its IP address and DNS servers are dynamically assigned.Properties
Description
A PPTP/L2TP server interface terminates PPP (Point to Point Protocol) tunnels set up over existing IP networks.Properties
Description
PPTP/L2TP server settings.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A L2TPv3 client interface terminates L2 (Ethernet and VLAN) tunnels set up over existing IP networks.Properties
Description
A L2TPv3 server interface terminates L2 (Ethernet and VLAN) tunnels set up over existing IP networks.Properties
Description
This type lets you setup an IPsec tunnel between gateways in an easy way with algorithms that are known to be secure. (IKEv2 tunnel with AES-GCM, AES-128 and SHA-256/512. DH group 14-16, 19-20 and forward secrecy.)Properties
Description
External LDAP server used to verify user names and passwords.Properties
Description
An LDAP server is used as a central repository of certificates and CRLs that the firewall can download when necessary.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Length limitations for various protocols.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A Link Aggregation interface combines multiple Ethernet interfaces into a single logical endpoint.Properties
Description
The Link Monitor allows the system to monitor one or more hosts and take action if they are unreachable.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Parameters use for local fragment reassembly.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A local user database contains user accounts used for authentication purposes.Properties
Description
User credentials may be used in User Authentication Rules, which in turn are used in e.g. PPP, IPsec XAuth, Web Authentication, etcProperties
Description
A FWLog receiver is used to receive log events from the system in the FWlog format.Properties
The definitions here are the same as in Section 3.47.1, LogReceiverMessageException .
Description
A memory log receiver is used to receive and keep log events in system RAM.Properties
The definitions here are the same as in Section 3.47.1, LogReceiverMessageException .
Description
Mail Alerting is used for sending important events via email.Properties
The definitions here are the same as in Section 3.47.1, LogReceiverMessageException .
Description
A Syslog receiver is used to receive log events from the system in the standard Syslog format.Properties
The definitions here are the same as in Section 3.47.1, LogReceiverMessageException .
Description
Advanced log settings.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Loopback interfaces will take all packets sent through them and pass them back up a different interface as newly received packets.Properties
Description
Marvell (88E8001,88E8053,88E8062) Fast and Gigabit Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Miscellaneous SettingsProperties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Advanced Multicast Settings.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A NAT Pool is used for NATing multiple concurrent connections to using different source IP addresses.Properties
Description
Hyper-V NetVSC DriverProperties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Null, non-existing Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
External OpenID Connect (OIDC) Provider used to authenticate users.Properties
Description
A OneConnect interface acts as a server for Clavister OneConnect Clients (version 3 or later). It creates an easy to use tunnel solution for roaming users. The protocol is compatible with the OpenConnect protocol, and third party OpenConnect compatible clients can be used.Properties
Description
An OSPF Router Process defines a group of routers exchanging routing information via the Open Shortest Path First routing protocol.Properties
Description
An OSPF area is a sub-domain within the OSPF process which collects OSPF interfaces, neighbors, aggregates and virtual links.Properties
Description
Select and define the properties of an interface that should be made a member of the Router Process.Properties
Description
For point-to-point and point-to-multipoint networks, specify the IP addresses of directly connected routers.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
An aggregate is used to replace any number of smaller networks belonging to the local (intra) area with one contiguous network which may then be advertised or hidden.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
An area that does not have a direct connection to the backbone must have at least one area border router with a virtual link to a backbone router, or to another router with a link to the backbone.Properties
Description
Phishing Protection protects the firewall from hosts involved in phishing activities. Detected phishing sources are automatically blacklisted. Specific hosts can be excluded from Phishing Protection using the Whitelist.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A pipe defines basic traffic shaping parameters. The pipe rules then determines which traffic goes through which pipes.Properties
Description
A Pipe Rule determines traffic shaping policy - which Pipes to use - for one or more types of traffic with the same granularity as the standard ruleset.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
A PPPoE interface is a PPP (point-to-point protocol) tunnel over an existing physical Ethernet interface. Its IP address is dynamically assigned.Properties
Description
Settings related to the PPP protocol.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
PSK (Pre-Shared Key) authentication is based on a shared secret that is known only by the parties involved.Properties
Description
RealTek (8139) Fast Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
RealTek (8169,8110) Gigabit Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
External RADIUS server used to collect user statistics.Properties
Description
RADIUS relay for intercepting packets from a user endpoint and sending packets to a remote RADIUS server.Properties
Description
External RADIUS server used to verify user names and passwords.Properties
Description
Monitors a statistical value. Log messages are generated if the value goes below the lower threshold or above the high threshold.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Configure HTTP/HTTPS management to enable remote management to the system.Properties
Description
Configure to enable InCenter remote management access to the system.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Configure Netcon management to enable remote management to the system.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Configure REST API management to enable API management to the system.Properties
Description
Setup and configure methods and permissions for remote management of this system.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Configure SNMP management to enable SNMP polling.Properties
Description
Configure a Secure Shell (SSH) Server to enable remote management access to the system.Properties
The definitions here are the same as in Section 3.71.4, ReverseProxyPolicy .
Description
This type of IPsec tunnel is used when you want to create VPN tunnels to roaming clients like mobile phones or laptops. The tunnel type is pre-configured to successfully connect with iOS, macOS and Windows clients using IKEv2 and EAP-MSCHAPv2. (IKEv2 and EAP-MSCHAPv2 is the default setting on most clients.)Properties
Description
A route balancing instance is associated with a routingtable and defines how to make use of multiple routes to the same destination.Properties
Description
Settings associated with the spillover algorithm.Properties
Description
Enabling Router Advertisement will answer Solicitations and periodically send out Advertisements. Stateless address autoconfiguration (SLAAC) will only work correctly if the configured network prefix is 64 (RFC4862).Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Specifies a Router Advertisement Prefix Information option.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
A Routing Rule forces the use of a routing table in the forward and/or return direction of traffic on a connection. The ordering parameter of the routing table determines if it is consulted before or after the main routing table.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Configure the routing capabilities of the system.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
The system has a predefined main routing table. Alternate routing tables can be defined by the user.Properties
Description
A route defines what interface and gateway to use in order to reach a specified network.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Specify a host and a monitoring method.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
A route defines what interface and gateway to use in order to reach a specified network.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
A switch route defines which interfaces the specified network can be reached on. Proxy ARP defines between which interfaces ARP is allowed.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Scanner Protection protects the firewall against various forms of scanning, probing and password brute force attacks. Detected scanner sources are automatically blacklisted for efficient blocking. Specific hosts can be excluded from Scanner Protection using the Whitelist.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A Schedule Profile defines days and dates and are then used by the various policies in the system.Properties
Description
A Service Group is a collection of service objects, which can then be used by different policies in the system.Properties
Description
An ICMP Service is an object definition representing ICMP traffic with specific parameters.Properties
Description
An ICMPv6 Service is an object definition representing ICMPv6 traffic with specific parameters.Properties
Description
An IP Protocol Service is a definition of an IP protocol with specific parameters.Properties
Description
A TCP/UDP Service is a definition of an TCP or UDP protocol with specific parameters.Properties
Description
Spam Protection protects servers behind the firewall from rogue SMTP server connection attempts, anomalous mail activity and IPs correlated with known email and forum spammers. Detected spam sources are automatically blacklisted. Specific hosts can be excluded from Spam Protection using the Whitelist.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Key used to authenticate the gateway to connecting SSH clients. The system host key is used by the Remote Management SSH Server and for InCenter Remote Management and cannot be deleted.Properties
Description
The public key of the client connecting to the SSH server.Properties
Description
Settings related to SSL (Secure Sockets Layer). Subsystems affected: RemoteMgmtHTTPS, SSLVPN (tunnels and portal page), TLS ALG, UserAuth, and LW-HTTPS ALG block pages.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
An SSL VPN interface, together with the bundled client, creates an easy to use tunnel solution for roaming users. It is recommended to use OneConnect SSL VPN instead of SSL VPN, since OneConnect removes several of the limitations of SSL VPN, is faster and has client support for more operating systems.Properties
Description
SSL VPN interface settings.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
D-Link (ST201) Fast Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Parameters for the state engine in the system.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A Syslog Profile can be used for securing and modifying syslog packets.Properties
Description
Settings related to the TCP protocol.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A Threshold Rule defines a filter for matching specific network traffic. When the filter criterion is met, the Threshold Rule Actions are evaluated and possible actions taken.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
A Threshold Rule Action specifies what thresholds to measure, and what action to take if those thresholds are reached.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
Tulip Fast Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Configure automatical updates.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
The User Authentication Ruleset specifies from where users are allowed to authenticate to the system, and how.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
VirtIO Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Use a VLAN to define a virtual interface compatible with the IEEE 802.1Q / 802.1ad Virtual LAN standard.Properties
Description
Settings for IEEE 802.1Q based Virtual LAN interfaces.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A VoIP Profile can be used by one or many IP Policies which has its service object configured with SIP or H.323 as protocol.Properties
Description
A Web Profile can be used by one or many IP Policies which has its service object configured with HTTP or HTTPS as protocol.Properties
Description
The URL filter is used for whitelisting URLs to bypass threat prevention mechanisms or to deny access to sites using the blacklist action. The redirect action allows HTTP requests to be redirected to alternative HTTP(S) destinations. The URL filter allows full match and wildcards filters.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
The user-agent filter is used for controlling which applications and versions that are allowed to communicate through the system. The Web profile's 'User-Agent Filter Mode' controls whether the list should block or allow configured user-agents.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
3com Fast Ethernet Adaptor.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
Use a Zone to group several interfaces for a simplified security policy.Properties
Description
Manually configured blocks are used to block a host/network on the switches either by default or based on schedule.Properties
Note | |
---|---|
If no Index is specified when creating an instance of this type, the object will be placed last in the list and the Index will be equal to the length of the list.
|
Description
The exclude list is used exclude certain hosts/networks from being blocked out by IDP/Threshold rule violations.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |
Description
A ZoneDefense switch will have its ACLs controlled and hosts/networks violating the IDP/Threshold rules will be blocked directly on the switch.Properties
Description
Advanced ZoneDefense Switch Settings.Properties
Note | |
---|---|
This object type does not have an identifier and is identified by the name of the type only. There can only be one instance of this type. |