D-link DSR-500AC, DSR-1000AC User Manual [ru]

CLI Reference Guide
Unified Services Router
D-Link Corporation
Copyright © 2015.
http://www.dlink.com
CLI Reference Guide
DSR-500/500AC/1000/1000AC Unified Services Router
Version 1.10
Copyright © 2015
Copyright Notice
This publication, including all photographs, illustrat ions and soft ware, is protected under internat ional copyright laws, with all rights reserved. Neither this manual, nor any of the material cont ained herein, may be reproduc ed without written consent of the author.
Disclaimer
The inf ormation in this document is subject to change without notice. The manufacturer makes no representations or warranties with respect to the contents hereof and specific ally disclaim any implied warranties of merchantability or fitness for any particular purpose. The manufacturer reserves the right to revise t his publication and to make changes from time to time in the content hereof without obligation of the manuf acturer to notify any person of suc h revision or changes.
Limitations of Liability
UNDER NO CIRCUMSTANCES SHALL D-LINK OR ITS SUPPLIERS BE LIABL E FOR DAMAGES OF ANY CHARACTER (E.G. DAMAGES FOR LOSS OF PROFIT, SOFTWARE RESTORATION, WORK STOPPAGE, LOSS OF SAVED DATA OR AN Y OTHER COMMERCIAL DAMAG ES OR LOSSES) RESULTING FROM THE APPLICATION OR IMPROPER USE OF THE D-LINK PRODUCT OR FAILURE OF THE PRODUCT, EVEN IF D-LINK IS INFORMED OF THE PO SSIBILITY OF SUCH DAMAG ES. FURTHERMORE, D-LINK WILL NOT BE LIABLE FOR T HIRD-PART Y CLAIMS AGAINST CUSTOMER FOR LOSSES OR DAMAG ES. D-LINK WILL IN NO EVENT BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE AMOUNT D-LINK R ECEIVED FROM THE END- USER FOR THE PRODUCT.
2
able of Contents
T
Chapter 1. Introduction ........................................................................................................................... 10
1.1 Accessing the CLI ................................................................................................... 10
Chapter 2. Basic commands available on the CLI ............................................................................. 11
2.1 Context Sensitive Help ........................................................................................... 11
2.2 Auto-Completion ..................................................................................................... 11
2.3 Movement Keys....................................................................................................... 11
2.4 Deletion Keys .......................................................................................................... 11
2.5 Escape Sequences ................................................................................................. 12
Chapter 3. Command Hierarchy in CLI ................................................................................................ 13
3.1 CLI Commands ....................................................................................................... 13
3.2 Router Configuration .............................................................................................. 13
Chapter 4. Global commands used in CLI ........................................................................................... 14
Chapter 5. Show commands used in CLI ............................................................................................ 15
Chapter 6. Configuration commands under branch VPN .................................................................. 46
6.1 vpn gre_tunnel add ................................................................................................. 46
6.2 vpn gre_tunnel edit <row_id> ................................................................................ 47
6.3 vpn gre_tunnel delete <row_id> ........................................................................... 47
6.4 vpn l2tp client configure ......................................................................................... 48
6.5 vpn l2tp client_action <action> .............................................................................. 48
6.6 vpn l2tp server configure ....................................................................................... 48
6.7 vpn openvpn config................................................................................................. 50
6.8 vpn openvpn remote_network add ....................................................................... 52
6.9 vpn openvpn remote_network edit <row_id> ...................................................... 52
6.10 vpn openvpn remote_network delete <row_id> ................................................. 53
6.11 vpn openvpn local_network add ........................................................................... 53
6.12 vpn openvpn local_network edit <row_id> .......................................................... 53
6.13 vpn openvpn local_network delete <row_id>...................................................... 54
6.14 vpn openvpn cert_upload ca <fileName> <ipAddr> .......................................... 54
6.15 vpn openvpn cert_upload server_client_cert <fileName> <ipAddr> ............... 54
6.16 vpn openvpn cert_upload client_key <fileName> <ipAddr> ............................. 54
6.17 vpn openvpn cert_upload dh_Key <fileName> <ipAddr> ................................. 55
6.18 vpn openvpn cert_upload tls_Authkey <fileName> <ipAddr> .......................... 55
6.19 vpn openvpn cert_upload crl_cert <fileName> <ipAddr> .................................. 55
6.20 vpn openvpn cert_upload config <fileName> <ipAddr> .................................... 55
6.21 vpn pptp client configure ........................................................................................ 56
6.22 vpn pptp client_action <action> ............................................................................ 56
6.23 vpn pptp server configure ...................................................................................... 56
6.24 vpn sslvpn portal-layouts add................................................................................ 58
3
.25 vpn sslvpn portal-layouts edit <row_id> .............................................................. 59
6
6.26 vpn sslvpn portal-layouts delete <row_id> .......................................................... 60
6.27 vpn sslvpn portforwarding appconfig add ............................................................ 60
6.28 vpn sslvpn portforwarding appconfig delete <row_id> ...................................... 60
6.29 vpn sslvpn portforwarding hostconfig add ........................................................... 60
6.30 vpn sslvpn portforwarding hostconfig delete <row_id> ..................................... 61
6.31 vpn sslvpn resource add ........................................................................................ 61
6.32 vpn sslvpn resource configure add <resource_name> ..................................... 61
6.33 vpn sslvpn resource configure delete <row_id> ................................................. 62
6.34 vpn sslvpn resource delete <row_id> .................................................................. 62
6.35 vpn sslvpn policy add ............................................................................................. 62
6.36 vpn sslvpn policy edit <row_id> ............................................................................ 63
6.37 vpn sslvpn policy delete <row_id> ........................................................................ 64
6.38 vpn sslvpn client ...................................................................................................... 64
6.39 vpn sslvpn route add .............................................................................................. 64
6.40 vpn sslvpn route delete <row_id> ......................................................................... 65
6.41 vpn ipsec policy configure <name> ...................................................................... 65
6.42 vpn ipsec dhcp configure ....................................................................................... 74
6.43 vpn ipsec policy enable <name> .......................................................................... 74
6.44 vpn ipsec policy disable <name> .......................................................................... 74
6.45 vpn ipsec policy delete <name> ........................................................................... 74
6.46 vpn ipsec policy connect <name> ........................................................................ 75
6.47 vpn ipsec policy drop <name> .............................................................................. 75
Chapter 7. Configuration commands under branch DOT11 ............................................................. 76
7.1 dot11 profile add <profile_name> ......................................................................... 76
7.2 dot11 profile edit <profile_name> ......................................................................... 76
7.3 dot11 wmm edit <profile_name> .......................................................................... 77
7.4 dot11 radius configure ............................................................................................ 79
7.5 dot11 profile delete <profile_name>..................................................................... 80
7.6 dot11 accesspoint add <ap_name> ..................................................................... 81
7.7 dot11 accesspoint edit <ap_name> ..................................................................... 81
7.8 dot11 accesspoint delete <ap_name> ................................................................. 82
7.9 dot11 wds enable <radio_no> ............................................................................... 82
7.10 dot11 wds disable <radio_no> .............................................................................. 82
7.11 dot11 wds add_peer <radio_no> <mac_addr> .................................................. 83
7.12 dot11 wds delete_peer <radio_no> <mac_addr> .............................................. 83
7.13 dot11 accesspoint disable <ap_name> ............................................................... 83
7.14 dot11 accesspoint enable <ap_name> ................................................................ 83
7.15 dot11 radio configure <radio_no> ........................................................................ 83
7.16 dot11 radio advanced configure <radio_no> ...................................................... 84
7.17 dot11 accesspoint wps configure ......................................................................... 85
7.18 dot11 accesspoint ACL configure <ap_name> .................................................. 85
7.19 dot11 accesspoint acl delete_mac_address <rowid> ........................................ 86
4
hapter 8. Configuration commands under branch SYSTEM .......................................................... 87
C
8.1 System NT-Domain-Settings ................................................................................. 87
8.2 system Active-Directory-Settings .......................................................................... 88
8.3 system LDAP_Settings .......................................................................................... 89
8.4 system POP3_Settings POP3_Server_Configuration ....................................... 90
8.5 system POP3_Settings POP3_Trusted_CA ....................................................... 91
8.6 system logging ipv4 configure ............................................................................... 91
8.7 system logging facility configure <facility> .......................................................... 93
8.8 system logging remote configure .......................................................................... 93
8.9 system logging ipv6 configure ............................................................................... 97
8.10 system Radius-Settings ......................................................................................... 97
8.11 system remote_management https configure .................................................... 98
8.12 system remote_management telnet configure ................................................... 99
8.13 system sessionSettings admin configure .......................................................... 100
8.14 system sessionSettings guest configure ........................................................... 100
8.15 system snmp trap configure <agent_ip> ........................................................... 100
8.16 system snmp trap delete <agent_ip> ................................................................. 101
8.17 system snmp users configure <user> ................................................................ 101
8.18 system snmp sys configure ................................................................................. 102
8.19 system snmp access add .................................................................................... 102
8.20 system snmp access edit <rowid> ..................................................................... 103
8.21 system snmp access delete <rowid> ................................................................. 104
8.22 system switch_settings power_saving configure ............................................. 104
8.23 system switch_settings jumbo_frame configure ............................................... 104
8.24 system admin_setting configure ......................................................................... 105
8.25 system time configure .......................................................................................... 105
8.26 system traffic_meter configure ............................................................................ 106
8.27 system usb usb1 configure .................................................................................. 106
8.28 system usb usb2 configure .................................................................................. 107
8.29 system usb shareport_vlan configure <row_id> ............................................... 107
8.30 system group add ................................................................................................. 108
8.31 system group edit <row_id> ................................................................................ 108
8.32 system group delete <row_id> ............................................................................ 109
8.33 system users add .................................................................................................. 109
8.34 system users edit <row_id> ................................................................................. 110
8.35 system users delete <row_id> ............................................................................ 110
8.36 system group groupaccesscontrol configure <group_id> ............................... 110
8.37 system group access_control_browser add...................................................... 111
8.38 system group access_control_browser delete <row_id> ................................ 111
8.39 system group access_control_ip add ................................................................. 111
8.40 system group access_control_ip delete <row_id> ........................................... 112
Chapter 9. Configuration commands under branch UTIL ............................................................... 113
9.1 util system_check ping <ip_address> ................................................................ 113
5
.2 util system_check dns_lookup <dns> ................................................................ 113
9
9.3 util system_check traceroute <ip_address> ..................................................... 113
9.4 util system_check capturePackets start <interface> ....................................... 113
9.5 util system_check capturePackets download <fileName> <ipAddr>............. 113
9.6 util dbglog_download <fileName> <ipAddr> ..................................................... 113
9.7 util usb_test <ipAddr> <fileName> ..................................................................... 114
9.8 util firmware_upgrade <IpAddr> <FileName> ................................................... 114
9.9 util enable_auto_backup <status> ...................................................................... 114
9.10 util enable_config_encryp <status> .................................................................... 114
9.11 util watchdog_disable <status> ........................................................................... 114
Chapter 10. Configuration commands under branch LICENSE ....................................................... 115
10.1 license list ............................................................................................................... 115
10.2 license activate <activationKey> ........................................................................ 115
Chapter 11. Configuration commands under branch NET ................................................................ 116
11.1 net ipv6_tunnel six_to_four configure ................................................................ 116
11.2 net bandwidth profile enable <enable> .............................................................. 116
11.3 net bandwidth profile add ..................................................................................... 116
11.4 net bandwidth profile edit <row_id> ................................................................... 117
11.5 net bandwidth profile delete <row_id> ............................................................... 118
11.6 net bandwidth traffic_selector add ...................................................................... 118
11.7 net bandwidth traffic_selector edit <row_id> .................................................... 119
11.8 net bandwidth traffic_selector delete <row_id> ................................................ 119
11.9 net ddns wan1 configure ...................................................................................... 120
11.10 net ddns wan2 configure ...................................................................................... 120
11.11 net lan dhcp reserved_ip configure <mac_address> ...................................... 121
11.12 net lan dhcp reserved_ip delete <mac_address> ............................................ 121
11.13 net dmz dhcp reserved_ip configure <mac_address> .................................... 122
11.14 net dmz dhcp reserved_ip delete <mac_address> .......................................... 122
11.15 net ethernet configure <interface_name> ......................................................... 122
11.16 net lan ipv4 configure ........................................................................................... 123
11.17 net lan ipv6 configure ........................................................................................... 125
11.18 net lan ipv6 pool configure <ipv6PoolStartAddr> ............................................. 126
11.19 net lan ipv6 pool delete <ipv6PoolStartAddr> .................................................. 127
11.20 net igmp configure ................................................................................................ 127
11.21 net intel_Amt server configure ............................................................................ 127
11.22 net intel_Amt_Reflector configure ...................................................................... 128
11.23 net ip_Aliasing server add ................................................................................... 129
11.24 net ip_Aliasing server edit <row_id> .................................................................. 129
11.25 net ip_Aliasing server delete <row_id> .............................................................. 130
11.26 net mode configure ............................................................................................... 130
11.27 net ipv6_tunnel isatap add ................................................................................... 131
11.28 net ipv6_tunnel isatap edit <row_id> ................................................................. 131
6
1.29 net ipv6_tunnel isatap delete <row_id> ............................................................. 132
1
11.30 net routing mode configure .................................................................................. 132
11.31 net wan wan1 ipv4 configure ............................................................................... 133
11.32 net wan wan2 ipv4 configure ............................................................................... 145
11.33 net wan wan3 threeG configure .......................................................................... 158
11.34 net wan mode configure ....................................................................................... 159
11.35 net wan port_setup configure .............................................................................. 162
11.36 net wan vlan_setup configure ............................................................................. 162
11.37 net wan vlan_setup vlanId_Add .......................................................................... 162
11.38 net wan vlan_setup vlanId_Delete ..................................................................... 163
11.39 net wan configurable_port configure .................................................................. 163
11.40 net wan wan1 ipv6 configure ............................................................................... 163
11.41 net wan wan2 ipv6 configure ............................................................................... 165
11.42 net routing ospfv2 configure <interface> ........................................................... 166
11.43 net routing ospfv3 configure <interface> ........................................................... 168
11.44 16.44 net routing protocol_binding add ............................................................. 169
11.45 net routing protocol_binding edit <row_id> ....................................................... 169
11.46 net routing protocol_binding enable <row_id>.................................................. 170
11.47 net routing protocol_binding disable <row_id> ................................................. 171
11.48 net routing protocol_binding delete <row_id> ................................................... 171
11.49 net radvd configure ............................................................................................... 172
11.50 net radvd pool add ................................................................................................ 173
11.51 net radvd pool edit <row_id> ............................................................................... 174
11.52 net radvd pool delete <row_id> .......................................................................... 175
11.53 net routing dynamic configure ............................................................................. 175
11.54 net routing static ipv4 configure <name> .......................................................... 177
11.55 net routing static ipv6 configure <name> .......................................................... 178
11.56 net routing static ipv4 delete <name> ................................................................ 179
11.57 net routing static ipv6 delete <name> ................................................................ 179
11.58 net tahi add-default-route <ip_address> ........................................................... 179
11.59 net tahi add-route <ip_address> <gw> .............................................................. 179
11.60 net tahi del-route <ip_address> <gw> ............................................................... 179
11.61 net tahi ipv6-Alias-Add(LAN) <ip6_address>.................................................... 180
11.62 net tahi ipv6-Alias-Del(LAN) <ip6_address> ..................................................... 180
11.63 net tahi ipv6-Alias-Add(WAN) <ip6_address> .................................................. 180
11.64 net tahi ipv6-Alias-Del(WAN) <ip6_address> ................................................... 180
11.65 net tahi reachable-time <time> ........................................................................... 181
11.66 net tahi ping6 <ip> <size> ................................................................................... 181
11.67 net tahi mping6 <mip> .......................................................................................... 181
11.68 net tahi bping6 <bip> <psize> ............................................................................. 181
11.69 net tahi pmtu-route-add <ipAdd> ........................................................................ 181
11.70 net tahi interface-down <interface> .................................................................... 182
11.71 net tahi interface-up <interface> ......................................................................... 182
11.72 net tahi start-RA-custom <fileName> <ipAddr> ................................................ 182
7
1.73 net tahi RA-Start .................................................................................................... 182
1
11.74 net ipv6_tunnel teredo configure ........................................................................ 183
11.75 net upnp configure ................................................................................................ 184
11.76 net port-vlan lan_edit <portnamew>................................................................... 184
11.77 net port-vlan wlan_edit <ssidName> .................................................................. 184
11.78 net vlan-membership lan_edit <portw> ............................................................. 185
11.79 net vlan-membership wlan_edit <ssidName> ................................................... 185
11.80 net multiVlan subnet edit <vlanID>..................................................................... 186
11.81 net vlan config add <vlan_id> ............................................................................. 187
11.82 net vlan config edit <vlan_Id> ............................................................................. 188
11.83 net vlan config delete <VlanId> .......................................................................... 188
11.84 net dmz configure ................................................................................................. 188
Chapter 12. Configuration commands under branch SECURITY .................................................... 190
12.1 security advanced_network attack_checks configure ..................................... 190
12.2 security advanced_network ips setup ................................................................ 191
12.3 security application_rules add ............................................................................. 191
12.4 security application_rules edit <row_id> ........................................................... 192
12.5 security application_rules delete <row_id> ....................................................... 193
12.6 security firewall custom_service add ................................................................. 193
12.7 security firewall custom_service edit <row_id> ................................................ 194
12.8 security firewall custom_service delete <row_id> ............................................ 194
12.9 security firewall ipv4 configure ............................................................................ 195
12.10 security firewall ipv4 default_outbound_policy <default_outbound_policy>. 196
12.11 security firewall ipv4 edit <row_id>..................................................................... 197
12.12 security firewall ipv4 enable <row_id> ............................................................... 198
12.13 security firewall ipv4 disable <row_id> .............................................................. 199
12.14 security firewall ipv4 delete <row_id> ................................................................ 199
12.15 security firewall ipv4 move <row_id> ................................................................. 199
12.16 security firewall algs ............................................................................................. 199
12.17 security firewall ipv6 configure ............................................................................ 200
12.18 security firewall ipv6 edit <row_id>..................................................................... 201
12.19 security firewall ipv6 enable <row_id> ............................................................... 202
12.20 security firewall ipv6 disable <row_id> .............................................................. 202
12.21 security firewall ipv6 delete <row_id> ................................................................ 202
12.22 security firewall ipv6 move <row_id> ................................................................. 202
12.23 security firewall ipv6 default_outbound_policy <default_outbound_policy>. 203
12.24 security ids configure ............................................................................................ 203
12.25 security session_settings configure ................................................................... 203
12.26 security schedules add ......................................................................................... 204
12.27 security schedules edit <row_id> ....................................................................... 205
12.28 security schedules delete <row_id> ................................................................... 207
12.29 security firewall smtpAlg configure ..................................................................... 207
12.30 security firewall smtpAlg approvedMailId add .................................................. 207
8
2.31 security firewall smtpAlg approvedMailId edit <row_id> ................................. 208
1
12.32 security firewall smtpAlg approvedMailId delete <row_id> ............................. 208
12.33 security firewall smtpAlg blockedMailId add ..................................................... 208
12.34 security firewall smtpAlg blockedMailId edit <row_id> .................................... 209
12.35 security firewall smtpAlg blockedMailId delete <row_id> ................................ 209
12.36 security firewall smtpAlg subjectList add ........................................................... 209
12.37 security firewall smtpAlg subjectList edit <row_id> .......................................... 210
12.38 security firewall smtpAlg subjectList delete <row_id> ..................................... 210
12.39 security mac_filter configure ................................................................................ 210
12.40 security mac_filter source add ............................................................................ 211
12.41 security mac_filter source edit <row_id> ........................................................... 211
12.42 security mac_filter source delete <row_id> ....................................................... 211
12.43 security ip_or_mac_binding add ......................................................................... 212
12.44 security ip_or_mac_binding edit <row_id> ........................................................ 212
12.45 security ip_or_mac_binding delete <row_id> ................................................... 213
12.46 security firewall vpn_passthrough configure ..................................................... 213
12.47 security webAccess status <status> .................................................................. 213
12.48 security webAccess add ...................................................................................... 213
12.49 security webAccess edit <row_id> ..................................................................... 214
12.50 security webAccess delete <row_id> ................................................................. 214
12.51 security website_filter content_filtering configure ............................................ 215
12.52 security website_filter approved_urls add ......................................................... 215
12.53 security website_filter approved_urls edit <row_id> ........................................ 215
12.54 security website_filter approved_urls delete <row_id> ................................... 216
12.55 security website_filter blocked_keywords add .................................................. 216
12.56 security website_filter blocked_keywords edit <row_id> ................................ 216
12.57 security website_filter blocked_keywords delete <row_id> ............................ 217
12.58 security website_filter blocked_keywords enable <row_id> ........................... 217
12.59 security website_filter blocked_keywords disable <row_id> .......................... 217
9
Chapter 1. Introduction
This document describes the Command Line Interface (CLI) for managing D-Link's DSR-500/500AC/1000/1000AC router.
The CLI user requires advanced knowledge about the configuration of the system, and it should be used only by those users who are familiar with CLI-based configuration.
Note that the following features in the DSR Unified Services Router cannot be managed by the CLI:
Firmware Upgrade
Configuration Backup/Restore
Certificate Generate/Upload
Power Savings mode configuration
System Dashboard/Resource Utilization
Please access the web browser based UI of the DSR router for managing these features.
1.1 Accessing the CLI
T
he CLI can be accessed by logging in with the same user credentials used to
access the web browser based UI.
*****************************************************
Welcome to the DSR Command Line Interface
****************************************************
D-Link DSR>
N
ote: D-Link DSR> is the CLI prompt.
10
hapter 2. Basic commands available
C
on the CLI
2.1 Context Sensitive Help
[?] - Displays context sensitive help. This is eithe completions with summaries, or the full syntax of the current command. A subsequent repeat of this key, when a command has been resolved, will display a detailed reference.
r a list of possible command
2.2 Auto-Completion
The following keys both perform auto-completion for the current command line. If the command prefix is not unique a subsequent repeat of the key will display possible completions.
[enter] - Auto-completes, syntax-checks then executes a command. If there
is a syntax error then offending part of the command line will be highlighted
and explained.
[space] - Auto-completes, or if the command is already resolved, inserts a
space.
2.3 Movement Keys
[CTRL-A] - Moves to the start of the line.
[CTRL-E] - Moves to the end of the line.
[up] - Moves to the previous command line held in history.
[down] - Moves to the next command line held in history.
[left] - Moves the insertion point left one character.
[right] - Moves the insertion point right one character.
2.4 Deletion Keys
[CTRL-C] - Deletes the whole line.
[CTRL-D] - Deletes the character to the right on the insertion point.
[CTRL-K] - Deletes all the characters to the right of the insertion point.
[Backspace] - Deletes the character to the left of the insertion point.
1
1
.5 Escape Sequences
2
!! - Substitutes the last command line.
!N - Substitutes the Nth command line (absolute as per 'history' command).
!-N - Substitutes the command line entered N lines before (relative).
1
2
hapter 3. Command Hierarchy in CLI
C
3.1 CLI Commands
The CLI commands are divided into 4 categories:
Global commands
Show commands
Utility commands
Configuration commands
3.2 Router Configuration
The router configuration is divided into 5 branches:
Net: Network Settings
Security: Security Settings
System: Admin Settings
Dot11: Wireless Settings
Vpn: VPN Settings
Radius: RADIUS Settings
1
3
hapter 4. Global commands used in
C
CLI
The global commands that are used in CLI are given b
.exit: Exit this session
.help:
.top: Returns to the default mode
.reboot: Reboots the system.
.history: Displays the current session's command line history. Number
of commands in history list can be controlled by setting limit argument;
by default it is unbounded.
Displays an overview of the CLI syntax
elow:
1
4
hapter 5. Show commands used in
C
CLI
The show commands for all the above mentioned branch section.
The command show activeDirectory-serverCheck? at the CLI description of all the show commands in the branch activeDirectory-serverCheck, which is as follows:
1
The command show NT-Domain-Settings? at the CLI prompt would give the description of all the show commands in the branch NT-Domain-Settings, which is as follows:
1 show NT-Domain-Settings Displays NT Domain configuration.
The command show vpn? at the CLI prompt would give the description of all the show commands in the branch vpn, which is as follows:
1 show vpn gre_tunnels gre tunnels display mode. 2 show vpn l2tp client Shows l2tp client details. 3 show vpn l2tp client setup Displays l2tp client setup.
show activeDirectory­serverCheck
Displays status of Active Directory servers.
es are outlined in this
prompt would give the
4 show vpn l2tp client status Displays l2tp client status.
5 show vpn l2tp Shows l2tp server details. 6 show vpn l2tp server Shows l2tp server details. 7 show vpn l2tp server setup Displays l2tp server setup.
8
9 show vpn openvpn Displays openvpn commands. 10 show vpn openvpn config Displays openvpn configuration.
11
12
13
14 show vpn pptp client Shows pptp client details. 15 show vpn pptp client setup Displays pptp client setup. 16 show vpn pptp client_status Shows pptp client status details.
17
show vpn l2tp server connections
show vpn openvpn remote_network_all
show vpn openvpn local_network_all
show vpn openvpn cert_upload_status
show vpn pptp client_status setup
Displays l2tp server stats.
Displays all openvpn remote network on system.
Displays all openvpn local network on system.
Displays openvpn certificate status.
Displays pptp client status setup.
1
5
8 show vpn pptp Shows pptp server details.
Access Point configuration. This
s the list of configured Access
Points for the device. From this summary list,
status and parameters of each AP are available
1 19 show vpn pptp server Shows pptp server details. 20 show vpn pptp server setup Displays pptp server setup.
21
show vpn pptp server connections
Displays pptp server stats.
22 show vpn sslvpn Shows sslvpn settings.
23
show vpn sslvpn connections
Shows sslvpn active connections.
24 show vpn sslvpn client Shows sslvpn client settings. 25 show vpn sslvpn route Shows route settings. 26 show vpn sslvpn policy Shows sslvpn policy settings.
27
28
29
30
show vpn sslvpn portal­layouts
show vpn sslvpn portforwarding
show vpn sslvpn portforwarding appconfig
show vpn sslvpn portforwarding hostconfig
Shows sslvpn portal-layouts settings.
Shows sslvpn portforwarding settings.
Shows sslvpn portforwarding appconfig settings.
Shows sslvpn portforwarding hostconfig settings.
31 show vpn sslvpn resource Shows sslvpn resource settings.
32
show vpn sslvpn resource­object <resource_name>
Shows sslvpn resource object settings.
33 show vpn ipsec Shows vpn policy. 34 show vpn ipsec policy Shows vpn policy. 35 show vpn ipsec policy setup Shows vpn policy. 36 show vpn ipsec policy status Shows vpn status.
37
show vpn ipsec policy backup_policies
Shows a list of backup policies.
38 show vpn ipsec dhcp Shows vpn ipsec dhcp setup. 39 show vpn ipsec dhcp setup Shows vpn ipsec dhcp setup.
The command show LDAP-Settings? at the CLI prompt would give the description of all the show commands in the branch LDAP-Settings, which is as follows:
1 show LDAP-Settings Displays LDAP configuration.
The command show dot11? at the CLI prompt would give the description of all the show commands in the branch dot11, which is as follows:
1 show dot11 Displays 802.11 configuration
2
show dot11 accesspoint<ap_name>
Displays command display
for display.
1
6
ap_name:
This is an AP identifier which
quely identifies an AP in the list of configured
An AP can be disabled if not in
use and enabled as needed. The AP is disabled
if this field has the value 'N' and it is enabled if it
has the value 'Y'. Disabling an AP does not
iguration, but stops the AP.
Enabling the AP creates a wireless network
where computers and other devices can join and
communicate with the devices connected to the
access point or the devices on the Local Area
The name or Service Set
Identifier (SSID) is the name of the wireless
network serviced by this AP. Note that since a
given wireless profile can be common to multiple
APs, the SSID is not unique to an AP. In order
for computers or devices to communicate via
erviced by this AP, all
devices must select the same SSID from the list
The field indicates whether SSID is broadcasted
or not in the beacon frames transmitted by the
, the wireless
devices will not be able to see the network name
(SSID). If this field has the value 'Y', it indicates
that the AP's SSID is broadcasted to the public.
If it is 'N' it indicates the SSID is not to be
broadcasted and a device would have to specify
This field has a brief description of the
security, encryption and authentication
combination assigned to the AP. A Profile is not
necessarily unique to an AP, rather this
The physical radio(s) on which this AP is
running on. An AP can run on multiple radios at
balancing and better
part of a logical network
AN id. This allows devices
connected to the VLAN through this AP to
exchange data with one another as in a LAN. If
the optional argument ap_name is specified, the
following configuration information is displayed
amount of time in
milliseconds between beacon transmissions.
Interval for delivery of traffic
uni APs. Enabled:
delete the conf
Network (LAN). SSID:
this wireless network s
of wireless networks in the area.Broadcast:
AP. If SSID is not broadcasted
the SSID exactly to connect to this AP. Profile:
grouping of wireless settings can be used on more than one AP at the same time. Radio:
the same time for load­throughput. VLAN: The AP can be a defined by the VL
for the access point.
Beacon Interval: The
DTIM Interval:
17
indication message. It is related to beacon
The Request to Send (RTS)
threshold is the value the AP checks against its
ansmitting frames to determine if the
RTS/Clear To Send (CTS) handshake is
required with the receiving client. Using a small
value causes RTS packets to be sent more
often, consuming more of the available
bandwidth, therefore reducing the apparent
ut of the network packet. The default is
Frag
This is the maximum length of the
frame, beyond which packets must be broken up
(fragmented) into two or more frames. Collisions
because
. The default is 2346, which effectively
802.11b requires that a preamble be prepended
to every frame before it is transmitted to the air.
e either the traditional long
preamble, which requires 192 micro second for
transmission, or it may be an optional short
preamble that requires only 96 micro second.
Long preamble is needed for the compatibility
d
RTS/CTS
If selected the AP always performs
RTS/CTS handshake before transmitting a
packet. It is generally used to minimize collisions
n (gain) in dbm
for transmitted packets which is added to the TX
Retry
The number of retries the AP will use
when a frame transmission fails. It is used for
both long and short frames, of size less than or
The rate or rates (in Mbps) which the AP will
Profile configuration. If no profile name
ay a
summary of the details of all the profiles
configured in the system. If a profile name is
specified, this command will display a detailed
of the profile. If the argument
'DisplayQosInfo' is set to 'Y', the profile details
interval. RTS Threshold:
tr
throughp 2346, which effectively disables RTS. Threshold:
occur more often for long frames sending them occupies the channel for a longer time disables Fragmentation. Preamble Mode:
3
show dot11 profile<profile_name><displ ay_qos>
The preamble may b
with legacy 802.11 systems operating at 1 an 2 Mbps. The default is 'long'. Protection:
among hidden stations Transmit Power Gain: Defines the relative amplificatio
power configured on the physical radio. Limit:
equal to the RTS threshold. Supported Rate:
advertise in the beacon frames. Displays
is specified, this command will displ
configuration
will include the QoS details as well.
18
access point and radio statistics. This
table shows a cumulative total of relevant
wireless statistics for the APs and radios; the
counter is reset when the device is rebooted.
table displays
transmit/receive data for each radio. It has the
The number of
The number of
The number of
/received packet errors reported to
The number of
transmitted/received packet drops between the
: The number of multicast
The number
AP
This table displays transmit/receive
data for each AP. An AP can have multiple
entries if it is running on multiple radios. It has
the following fields: Pkt(Tx/Rx): The number of
transmitted/received wireless packets
ber of
transmitted/received bytes of information
The number of
transmitted/received packet errors reported to
The number of
The number of multicast packets sent
The number of packet
access control list information for the
Available Radios
This table shows the list of available radios that
an AP may use. It has the following fields:
This field
This field indicates which path the radio is
Displays
Radio Statistics: This
following fields: Pkt(Tx/Rx): transmitted/received wireless packets. Byte(Tx/Rx): transmitted/received bytes of information. Err(TRx/Rx): transmitted the radio. Drop(Tx/Rx):
radio and client. Mcast
4 show dot11 statistics
packets sent over this radio. Coll: of packet collisions reported to the radio.
Statistics:
Byte(Tx/Rx): The num
Err(TRx/Rx):
the AP. Drop(Tx/Rx): transmitted/received packet dropped by the AP. Mcast: over this AP. Coll: collisions reported to the AP
5 show dot11 acl<ap_name>
6
7
show dot11 accesspoint status<ap_name>
show dot11 wmm<profile_name>
Displays specified access point.
Displays wireless stats.
Displays wireless stats.
8 show dot11 radius Displays radius Information. 9 show dot11 wps Displays WPS Information. 10 show dot11 wds<radio_no> Displays WDS Information.
11
show dot11 wireless_statistics
Displays wireless_statistics Information.
Displays Radio configuration.
12 show dot11 radio<radio_no>
Radio: The radio number. Card: indicates which card the radio is using. Path:
19
RogueAP Enabled:
If this field has
value 'Y' it indicates that RogueAP detection is
enabled on this radio. If it is 'N' it indicates that
RogueAP detection is disabled on this radio. If
the
following cofiguration information is displayed
The
This field indicates
This field
io is mapped to.
The channel used by the
If this field has the
it indicates that RogueAP detection
Value in
dBm is the default transmitted power level for all
Enable
receive diversity (use multiple antennas to
receive packets) List of Access Points for Radio
This table shows all the APs that are configured
This is the
ID of the AP
The SSID serviced by AP Profile: This
field has a brief description of the security,
encryption and authentication combination
show system logging remote
mapped to.
the optional argument radioNum is given,
for the given radio. Radio Settings Radio: radio number. Card Name: which card the radio is using. Path: indicates which path the rad Current Channel: radio. RogueAP Enabled: value 'Yes', is enabled on this radio. TX Power:
APs that use this radio. RX Diversity:
for a particular radio. AP Name: name of the AP. BSSID: The BSS SSID:
assigned to the AP.
The command show POP3-Settings? at the CLI prompt would give the description of all the show commands in the branch POP3-Settings, which is as follows:
1 show POP3-Settings Displays POP3 configuration.
The command show POP3-Trusted-CA? at the CLI prompt would give the description of all the show commands in the branch POP3-Trusted-CA, which is as follows:
1 show POP3-Trusted-CA Displays POP3 Trusted Certificates.
The command show system? at the CLI prompt would give the description of all the show commands in the branch system, which is as follows:
1 show system logging . 2 show system logging remote .
3
setup
Displays remote logging configuration
4 show system logging facility .
5
show system logging facility setup <facility>
Displays logging facility configuration
6 show system logging ipv4 .
20
captured log messages of the router
captured log messages of the
router activities from Event Log. The logs
displayed on this event viewer can be defined in
captured log messages of
vent Log. The logs
displayed on this event viewer can be defined in
remote management over https
jumbo_frame
s the resources being used in the system
7
show system logging ipv4 setup
Displays logging configuration
8 show system logging ipv6 .
9
10 show system log
show system logging ipv6 setup
Displays ipv6 logs configuration
Displays activities
Displays all the
11 show system log all
the Log Configuration commands Displays Page Wise,
12 show system log page
the router activities from E
the Log Configuration commands
13
14
15
16
show system remote_management
show system remote_management setup
show system sessionSettings
show system snmp <agentIP>
.
Displays configuration
Displays sessionSettings Configuration
Displays SNMP configuration
17 show system switch_setting .
18
19
show system switch_setting power_mode
show system switch_setting
Displays power mode configuration
Displays jumbo frame configuration
20 show system status Displays system status
21 show system dashboard
Display
currently 22 show system time . 23 show system time setup Displays Timezone and NTP configuration 24 show system traffic_meter .
25
show system traffic_meter setup
Displays traffic meter configuration
26 show system usb-status Displays USB Status 27 show system users System group display mode 28 show system group System user display mode
29
show system group specific<row_id>
Displays information for given group
30 show system group all Displays all groups on system 31 show system users all Displays all users on system
32
show system users specific<row_id>
Displays information for given user
21
s Group Access Control configuration for
A RADIUS server maintains a database of user
larger environments. If a
RADIUS server already exists, it can be used for
authenticating users that want to connect to the
wireless network provided by this device. When
they
e table.
If first RADIUS server is not accessible, then
the next RADIUS
This table
33
34
35
36
show system group groupaccesscontrol <group_ id>
show system group access_control_browser
show system group access_control_ip
show system firmwareVersion
Display
the selected group
Displays Access Control browsers Policies
Displays Access Control ips Policies
Displays the firmware Version.
The command show ntDomain-serverCheck? at the CLI prompt would give the description of all the show commands in the branch ntDomain-serverCheck, which is as follows:
1
show ntDomain­serverCheck
Displays status of NT Domain servers.
The command show Active-Directory-Settings? at the CLI prompt would give the description of all the show commands in the branch Active-Directory-Settings, which is as follows:
1
show Active-Directory­Settings
Displays Active Directory configuration.
The command show pop3-serverCheck? at the CLI prompt would give the description of all the show commands in the branch pop3-serverCheck, which is as follows:
1 show pop3-serverCheck Displays status of Pop3 servers.
The command show Radius-serverCheck? at the CLI prompt would give the description of all the show commands in the branch Radius-serverCheck, which is as follows:
1 show Radius-serverCheck Displays status of Radius servers.
The command show Radius-Settings? at the CLI prompt would give the description of all the show commands in the branch Radius-Settings, which is as follows:
Displays RADIUS configuration.
accounts used in
1 show Radius-Settings
multiple RADIUS servers are configured,
are accessed in the same order as in th
system tries to contact to
server. Configured Radius Servers
22
displays the list of all configured RADIUS
servers. If the optional argument ServerIP is
figuration of the RADIUS
IP address of
IP address of RADIUS accounting
RADIUS authentication
server port to send the RADIUS messages.
in seconds) the device waits
The number of tries the router will make to the
RADIUS server secret. This field is only
list of interface for Inbound
specified, detailed con
server is displayed. Server IP:
RADIUS authentication server Accounting
Server IP:
server Server Port:
Timeout: The time (
for a response from the RADIUS server Retries:
RADIUS server before giving up. Secret:
displayed if the argument ServerIP is specified.
The command show net? At the CLI prompt would give the description of all the show commands in the branch net, which is as follows:
1 show net ipv6_tunnel status Displays ipv6 tunnels status 2 show net bandwidth . 3 show net bandwidth profile .
4
5
6
7
8
show net bandwidth profile setup
show net bandwidth traffic_selector
show net bandwidth traffic_selector setup
show net bandwidth profile interface_list
show net bandwidth traffic_selector services
Displays list of Available Bandwidth Profile(s).
.
Shows the list of Available Traffic Selector(s).
Displays the
Bandwidth Profile. It includes Available VLANs
Displays a list of available services
9 show net ddns . 10 show net ddns setup Show Dynamic DNS Configuration. 11 show net lan dhcp .
12
13
14
15
show net lan dhcp reserved_ip
show net lan dhcp reserved_ip setup
show net lan dhcp leased_clients
show net lan dhcp leased_clients list
.
Shows a list of DHCP Reserved Addresses.
.
Shows a list of Available DHCP Leased Clients.
16 show net dmz . 17 show net dmz setup Shows DMZ Configuration. 18 show net dmz dhcp .
23
list of DMZ DHCP Reserved
list of Available DMZ DHCP Leased
19
20
21
22
show net dmz dhcp reserved_ip
show net dmz dhcp reserved_ip setup
show net dmz dhcp leased_clients
show net dmz dhcp leased_clients list
.
Displays a
Addresses.
.
Shows a
Clients. 23 show net ethernet Displays Ethernet interfaces 24 show net lan . 25 show net lan ipv4 . 26 show net lan ipv4 setup Displays LAN Configuration. 27 show net lan ipv6 . 28 show net lan ipv6 setup Shows IPv6 LAN Configuration.
29
show net statistics <interface>
Shows Interface Statistics
30 show net igmp Displays igmp configuration 31 show net intel_Amt Shows IntelAmt details 32 show net intel_Amt server Shows IntelAmt Server Configuration
33
34
35
show net intel_Amt Reflector
show net intel_Amt server setup
show net intel_Amt Reflector setup
show IntelAmt Reflector Configuration
Displays Intel_Amt server configuration.
Displays Intel_Amt Reflector setup.
36 show net Ip_Alias Shows Ip Alias configuration details. 37 show net Ip_Alias server Shows Ip Alias configuration details.
38
show net Ip_Alias server setup
Displays net Intel_Amt server setup.
39 show net mode . 40 show net mode setup Displays IP MODE configuration 41 show net ipv6_tunnel . 42 show net ipv6_tunnel setup Displays ipv6 tunnels configuration 43 show net routing mode .
44
show net routing mode setup
Routing Mode between WAN and LAN
45 show net wan wan1 . 46 show net wan wan1 ipv4 .
47
48
show net wan wan1 ipv4 status
show net wan wan1 ipv4 setup
Displays ipv4 wan1 Information.
Displays Wan1 Setup Information.
49 show net wan wan2 . 50 show net wan wan2 ipv4 .
24
51
52
show net wan wan2 ipv4 status
show net wan wan2 ipv4 setup
Displays ipv4 wan2 Information.
Displays wan2 Setup Information.
53 show net wan wan3 Displays the wan3 configuration 54 show net wan wan3 threeG Shows ThreeG information.
55
56
show net wan wan3 threeG setup
show net wan wan3 threeG status
Displays ThreeG Configuration.
Displays wan3 ThreeG status.
57 show net wan . 58 show net wan mode Displays wan mode Setup. 59 show net wan port_setup Displays wan port Setup. 60 show net wan vlan_setup Displays vlan port Information for wan.
61
show net wan configurable_port
Displays configurable port Information.
62 show net wan wan1 ipv6 .
63
64
show net wan wan1 ipv6 status
show net wan wan1 ipv6 setup
Displays ipv6 wan1 Information.
Displays Wan1 Setup Information.
65 show net wan wan2 ipv6 .
66
67
show net wan wan2 ipv6 status
show net wan wan2 ipv6 setup
Displays ipv6 wan2 Information.
Displays Wan2 Setup Information.
68 show net routing ospfv2 Shows OSPFv2 Configuration 69 show net routing ospfv3 Shows OSPFv3 Configuration
70
71
72
73
show net routing ospfv2 setup
show net routing ospfv3 setup
show net routing protocol_binding
show net routing protocol_binding setup
Displays OSPFv2 Configuration
Displays OSPFv3 Configuration
Shows protocol_binding rules
Displays protocol Binding Rules
74 show net radvd . 75 show net radvd setup Displays RADVD configuration 76 show net routing dynamic Shows dynamic routing setup
77
show net routing dynamic setup
Shows dynamic routing Setup.
78 show net routing Displays routing setup 79 show net routing static Displays Static Routes Info 80 show net routing static ipv4 Displays IPv4 Static Routes Info
25
static route
81
82
show net routing static ipv4 setup
show net routing static interface_list
Shows all the configured IPV4 routes.
Shows all the interfaces on which
can be configured 83 show net routing static ipv6 Displays IPv6 Static Routes Info
84
show net routing static ipv6 setup
Shows all the configured IPV6 Static routes.
85 show net upnp Displays UPnP Information 86 show net upnp portmap Displays UPnP portmap Table Information. 87 show net upnp setup Displays UPnP Setup Information. 88 show net vlan 89 show net vlan configuration Displays VLAN Confgiuration. 90 show net multivlan Shows vlan server status 91 show net multivlan subnet Shows vlan server status
92
show net multivlan subnet status
Displays multi vlan Subnet List.
93 show net port-vlan Shows Port vlan status 94 show net port-vlan status Displays Port vlan status. 95 show net wireless_vlan Shows Port vlan status
96
show net wireless_vlan status
Displays Port vlan status.
The command show ldap-serverCheck? at the CLI prompt would give the description of all the show commands in the branch ldap-serverCheck, which is as follows:
1 show ldap-serverCheck Displays status of Ldap servers.
The command show security? at the CLI prompt would give the description of all the show commands in the branch security, which is as follows:
1
show security advanced_network
Shows advanced firewall attack checks
show security
2
advanced_network
Displays Security Checks configuration
attack_checks
3
4
5
6
7
show security advanced_network ips
show security application_rules
show security application_rules setup
show security application_rules status
show security firewall custom_service
Displays ips configuration
.
Displays application rules configuration
Displays application rules status
.
26
8
show security firewall custom_service setup
Displays a list of available Custom Service
configuration 9 show security firewall Displays Firewall Rules 10 show security firewall ipv4 Displays IPv4 Firewall Rules
11
show security firewall ipv4 setup
Displays IPv4 Firewall Rules
12 show security firewall algs Displays ALGs protocals status 13 show security firewall ipv6 Displays IPv6 Firewall Rules
14
show security firewall ipv6 setup
Displays IPv6 Firewall Rules
15 show security ids . 16 show security ids setup Displays IDS configuration
17
show security session_settings
Displays Session Settings configuration
18 show security schedules .
19
20
21
22
23
show security schedules setup
show security firewall smtpAlg
show security firewall smtpAlg configure
show security firewall smtpAlg configure setup
show security firewall smtpAlg approvedMailId
Displays Schedules configuration
.
.
Shows SmtpAlg Status.
.
show security firewall
24
smtpAlg approvedMailId
Shows a List of Approved Mail_Id.
setup
25
show security firewall smtpAlg blockedMailId
.
show security firewall
26
smtpAlg blockedMailId
Shows a List of Blocked Mail_Id.
setup
27
28
show security firewall smtpAlg subjectList
show security firewall smtpAlg subjectList setup
.
Shows a List of Subject, corresponding Mail_Id
and Action. 29 show security mac_filter .
30
31
32
show security mac_filter setup
show security ip_or_mac_binding
show security ip_or_mac_binding setup
Displays Source Mac Filter configuration
.
Displays IP/MAC Binding configuration
27
configuration and
n
33
34
show security firewall vpn_passthrough
show security firewall vpn_passthrough setup
.
Displays VPN passthrough Configuration
35 show security webAccess .
Displays security webAccess
36
show security webAccess setup
rules
Displays a list of Allowed IpAdrr/Network Web
Access 37 show security website_filter .
38
39
40
show security website_filter content_filtering
show security website_filter approved_urls
show security website_filter blocked_keywords
Displays content filtering configuration
Displays trusted domains configuration
Displays a list of available Approved URLs
Displays blocked keywords configuration
The command vpn? at the CLI prompt would give the description of all the configuration commands in the branch vpn, which is as follows:
1 vpn gre_tunnel GRE Tunnel. 2 vpn gre_tunnel add GRE Tunnel add mode
3
4
vpn gre_tunnel edit <row_id>
vpn gre_tunnel delete <row_id>
GRE Tunnel edit mode
GRE Tunnel delete mode
5 vpn l2tp client Vpn policy mode. 6 vpn l2tp client configure l2tp client configuration mode
7
vpn l2tp client_action <action>
Vpn l2tp client action set.
8 vpn l2tp Vpn policy mode. 9 vpn l2tp server Vpn policy mode. 10 vpn l2tp server configure l2tp server configuration mode 11 vpn openvpn Displays openvpn configure commands 12 vpn openvpn config openvpn configuration mode
13
14
vpn openvpn remote_network
vpn openvpn remote_network add
Opens vpn remote networks configuratio
commands.
Adds a new remote network
vpn openvpn
15
remote_network
Remote network edit mode.
edit <row_id> vpn openvpn
16
remote_network
Openvpn remote network delete mode.
delete <row_id>
28
Opens vpn local networks configuration
rver / Client
the pem formatted Tls Authentication
17 vpn openvpn local_network
18
19
20
vpn openvpn local_network add
vpn openvpn local_network edit <row_id>
vpn openvpn local_network delete <row_id>
commands.
Adds a new local network.
Local network edit mode.
Openvpn local network delete mode.
21 vpn openvpn cert_upload Openvpn local network display mode.
22
23
vpn openvpn cert_upload ca <fileName> <ipAddr>
vpn openvpn cert_upload server_client_cert <fileNam e> <ipAddr>
Uploads the pem formatted CA Certificate.
Uploads the pem formatted Se
Certificate.
vpn openvpn cert_upload
24
client_key <fileName> <ipA
Uploads the pem formatted Server/Client key.
ddr> vpn openvpn cert_upload
25
26
dh_Key <fileName> <ipAddr> Uploads the pem formatted Diffie Hellman key.
vpn openvpn cert_upload tls_Authkey <fileName> <ip Addr>
Uploads
Key.
vpn openvpn cert_upload
27
crl_cert <fileName> <ipAddr> Uploads the pem formatted CRL Certificate.
28
vpn openvpn cert_upload config <fileName> <ipAddr>
Uploads the pem formatted config file.
29 vpn pptp client Vpn policy mode. 30 vpn pptp client configure PPTP client configuration mode.
31
vpn pptp client_action <action>
Vpn pptp client action set.
32 vpn pptp Vpn policy mode. 33 vpn pptp server Vpn policy mode. 34 vpn pptp server configure pptp server configuration mode 35 vpn sslvpn sslvpn configuration commands 36 vpn sslvpn portal-layouts sslvpn portal layout configuration commands
37
38
39
40
vpn sslvpn portal-layouts add
vpn sslvpn portal-layouts edit <row_id>
vpn sslvpn portal-layouts delete <row_id>
Adds sslvpn portal layout.
Edits sslvpn portal layout.
Deletes sslvpn portal layout.
vpn sslvpn portforwarding Sslvpn portforwarding configuration commands.
29
ortforwarding application configuration
slvpn portforwarding host configuration
41
42
43
44
45
46
vpn sslvpn portforwarding appconfig
vpn sslvpn portforwarding appconfig add
vpn sslvpn portforwarding appconfig delete <row_id>
vpn sslvpn portforwarding hostconfig
vpn sslvpn portforwarding hostconfig add
vpn sslvpn portforwarding hostconfig delete <row_id>
Sslvpn p
commands.
Adds an application configuration rule.
Deletes an application configuration rule.
S
commands.
Adds a host configuration rule.
Deletes a host configuration rule.
47 vpn sslvpn resource Sslvpn resource configuration commands. 48 vpn sslvpn resource add Adds an sslvpn resource.
49
vpn sslvpn resource configure
Configures an sslvpn resource.
vpn sslvpn resource
50
configure
Adds an sslvpn resource object.
add <resource_name>
51
52
vpn sslvpn resource configure delete <row_id>
vpn sslvpn resource delete <row_id>
Deletes an sslvpn resource object.
Deletes an sslvpn resource.
53 vpn sslvpn policy Sslvpn policy configuration commands. 54 vpn sslvpn policy add Adds an sslvpn policy.
55
56
vpn sslvpn policy edit <row_id>
vpn sslvpn policy delete <row_id>
Edits an sslvpn policy.
Deletes an sslvpn policy.
57 vpn sslvpn client Sslvpn client configuration commands. 58 vpn sslvpn route Sslvpn route configuration commands. 59 vpn sslvpn route add Adds sslvpn client route.
60
vpn sslvpn route delete <row_id>
Deletes sslvpn client route.
61 vpn ipsec Vpn policy mode. 62 vpn ipsec policy Vpn policy mode.
63
vpn ipsec policy configure <name>
Vpn policy configuration mode.
64 vpn ipsec dhcp Vpn ipsec over dhcp mode. 65 vpn ipsec dhcp configure vpn dhcp over ipsec policy configuration mode
66
67
vpn ipsec policy enable <name>
vpn ipsec policy disable <name>
Enables a vpn policy.
Disables a vpn policy.
30
Loading...
+ 187 hidden pages