CLI Reference Guide
Unified Services Router
D-Link Corporation
Copyright © 2015.
http://www.dlink.com
CLI Reference Guide
DSR-500/500AC/1000/1000AC
Unified Services Router
Version 1.10
Copyright © 2015
Copyright Notice
This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the material contained herein, may be reproduced without written consent of the author.
Disclaimer
The information in this document is subject to change without notice. The manufacturer makes no representations or warranties with respect to the contents hereof and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose. The manufacturer reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of the manufacturer to notify any person of such revision or changes.
Limitations of Liability
UNDER NO CIRCUMSTANCES SHALL D-LINK OR ITS SUPPLIERS BE LIABLE FOR DAMAGES OF ANY CHARACTER (E.G. DAMAGES FOR LOSS OF PROFIT, SOFTWARE RESTORATION, WORK STOPPAGE, LOSS OF SAVED DATA OR ANY OTHER COMMERCIAL DAMAGES OR LOSSES) RESULTING FROM THE APPLICATION OR IMPROPER USE OF THE D-LINK PRODUCT OR FAILURE OF THE PRODUCT, EVEN IF D-LINK IS INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. FURTHERMORE, D-LINK WILL NOT BE LIABLE FOR THIRD-PARTY CLAIMS AGAINST CUSTOMER FOR LOSSES OR DAMAGES. D-LINK WILL IN NO EVENT BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE AMOUNT D-LINK RECEIVED FROM THE END-USER FOR THE PRODUCT.
2
Table of Contents
Chapter |
1. |
Introduction ........................................................................................................................... |
10 |
|
|
|
1.1 |
Accessing the CLI ................................................................................................... |
10 |
Chapter |
2. |
Basic commands available on the CLI ............................................................................. |
11 |
|
|
|
2.1 |
Context Sensitive Help........................................................................................... |
11 |
|
|
2.2 |
Auto-Completion ..................................................................................................... |
11 |
|
|
2.3 |
Movement Keys....................................................................................................... |
11 |
|
|
2.4 |
Deletion Keys .......................................................................................................... |
11 |
|
|
2.5 |
Escape Sequences................................................................................................. |
12 |
Chapter 3. |
Command Hierarchy in CLI ................................................................................................ |
13 |
||
|
|
3.1 |
CLI Commands ....................................................................................................... |
13 |
|
|
3.2 |
Router Configuration .............................................................................................. |
13 |
Chapter 4. |
Global commands used in CLI........................................................................................... |
14 |
||
Chapter 5. |
Show commands used in CLI ............................................................................................ |
15 |
||
Chapter 6. |
Configuration commands under branch VPN .................................................................. |
46 |
||
|
|
6.1 |
vpn gre_tunnel add ................................................................................................. |
46 |
|
|
6.2 |
vpn gre_tunnel edit <row_id>................................................................................ |
47 |
|
|
6.3 |
vpn gre_tunnel delete <row_id> ........................................................................... |
47 |
|
|
6.4 |
vpn l2tp client configure ......................................................................................... |
48 |
|
|
6.5 |
vpn l2tp client_action <action>.............................................................................. |
48 |
|
|
6.6 |
vpn l2tp server configure ....................................................................................... |
48 |
|
|
6.7 |
vpn openvpn config................................................................................................. |
50 |
|
|
6.8 |
vpn openvpn remote_network add ....................................................................... |
52 |
|
|
6.9 |
vpn openvpn remote_network edit <row_id>...................................................... |
52 |
|
|
6.10 |
vpn openvpn remote_network delete <row_id> ................................................. |
53 |
|
|
6.11 |
vpn openvpn local_network add ........................................................................... |
53 |
|
|
6.12 |
vpn openvpn local_network edit <row_id> .......................................................... |
53 |
|
|
6.13 |
vpn openvpn local_network delete <row_id>...................................................... |
54 |
|
|
6.14 |
vpn openvpn cert_upload ca <fileName> <ipAddr> .......................................... |
54 |
|
|
6.15 |
vpn openvpn cert_upload server_client_cert <fileName> <ipAddr> ............... |
54 |
|
|
6.16 |
vpn openvpn cert_upload client_key <fileName> <ipAddr> ............................. |
54 |
|
|
6.17 |
vpn openvpn cert_upload dh_Key <fileName> <ipAddr> ................................. |
55 |
|
|
6.18 |
vpn openvpn cert_upload tls_Authkey <fileName> <ipAddr> .......................... |
55 |
|
|
6.19 |
vpn openvpn cert_upload crl_cert <fileName> <ipAddr>.................................. |
55 |
|
|
6.20 |
vpn openvpn cert_upload config <fileName> <ipAddr> .................................... |
55 |
|
|
6.21 |
vpn pptp client configure ........................................................................................ |
56 |
|
|
6.22 |
vpn pptp client_action <action> ............................................................................ |
56 |
|
|
6.23 |
vpn pptp server configure ...................................................................................... |
56 |
|
|
6.24 |
vpn sslvpn portal-layouts add................................................................................ |
58 |
3
6.25 |
vpn sslvpn portal-layouts edit <row_id> .............................................................. |
59 |
6.26 |
vpn sslvpn portal-layouts delete <row_id> .......................................................... |
60 |
6.27 |
vpn sslvpn portforwarding appconfig add............................................................ |
60 |
6.28 |
vpn sslvpn portforwarding appconfig delete <row_id> ...................................... |
60 |
6.29 |
vpn sslvpn portforwarding hostconfig add........................................................... |
60 |
6.30 |
vpn sslvpn portforwarding hostconfig delete <row_id> ..................................... |
61 |
6.31 |
vpn sslvpn resource add ........................................................................................ |
61 |
6.32 |
vpn sslvpn resource configure add <resource_name> ..................................... |
61 |
6.33 |
vpn sslvpn resource configure delete <row_id> ................................................. |
62 |
6.34 |
vpn sslvpn resource delete <row_id> .................................................................. |
62 |
6.35 |
vpn sslvpn policy add ............................................................................................. |
62 |
6.36 |
vpn sslvpn policy edit <row_id> ............................................................................ |
63 |
6.37 |
vpn sslvpn policy delete <row_id>........................................................................ |
64 |
6.38 |
vpn sslvpn client ...................................................................................................... |
64 |
6.39 |
vpn sslvpn route add .............................................................................................. |
64 |
6.40 |
vpn sslvpn route delete <row_id>......................................................................... |
65 |
6.41 |
vpn ipsec policy configure <name>...................................................................... |
65 |
6.42 |
vpn ipsec dhcp configure ....................................................................................... |
74 |
6.43 |
vpn ipsec policy enable <name> .......................................................................... |
74 |
6.44 |
vpn ipsec policy disable <name>.......................................................................... |
74 |
6.45 |
vpn ipsec policy delete <name> ........................................................................... |
74 |
6.46 |
vpn ipsec policy connect <name> ........................................................................ |
75 |
6.47 |
vpn ipsec policy drop <name> .............................................................................. |
75 |
Chapter 7. Configuration commands under branch DOT11 ............................................................. |
76 |
|
7.1 |
dot11 profile add <profile_name>......................................................................... |
76 |
7.2 |
dot11 profile edit <profile_name> ......................................................................... |
76 |
7.3 |
dot11 wmm edit <profile_name> .......................................................................... |
77 |
7.4 |
dot11 radius configure............................................................................................ |
79 |
7.5 |
dot11 profile delete <profile_name>..................................................................... |
80 |
7.6 |
dot11 accesspoint add <ap_name> ..................................................................... |
81 |
7.7 |
dot11 accesspoint edit <ap_name> ..................................................................... |
81 |
7.8 |
dot11 accesspoint delete <ap_name>................................................................. |
82 |
7.9 |
dot11 wds enable <radio_no>............................................................................... |
82 |
7.10 |
dot11 wds disable <radio_no> .............................................................................. |
82 |
7.11 |
dot11 wds add_peer <radio_no> <mac_addr> .................................................. |
83 |
7.12 |
dot11 wds delete_peer <radio_no> <mac_addr> .............................................. |
83 |
7.13 |
dot11 accesspoint disable <ap_name> ............................................................... |
83 |
7.14 |
dot11 accesspoint enable <ap_name>................................................................ |
83 |
7.15 |
dot11 radio configure <radio_no> ........................................................................ |
83 |
7.16 |
dot11 radio advanced configure <radio_no> ...................................................... |
84 |
7.17 |
dot11 accesspoint wps configure ......................................................................... |
85 |
7.18 |
dot11 accesspoint ACL configure <ap_name> .................................................. |
85 |
7.19 |
dot11 accesspoint acl delete_mac_address <rowid>........................................ |
86 |
4
Chapter 8. |
Configuration commands under branch SYSTEM.......................................................... |
87 |
|
|
8.1 |
System NT-Domain-Settings................................................................................. |
87 |
|
8.2 |
system Active-Directory-Settings.......................................................................... |
88 |
|
8.3 |
system LDAP_Settings .......................................................................................... |
89 |
|
8.4 |
system POP3_Settings POP3_Server_Configuration....................................... |
90 |
|
8.5 |
system POP3_Settings POP3_Trusted_CA ....................................................... |
91 |
|
8.6 |
system logging ipv4 configure............................................................................... |
91 |
|
8.7 |
system logging facility configure <facility> .......................................................... |
93 |
|
8.8 |
system logging remote configure.......................................................................... |
93 |
|
8.9 |
system logging ipv6 configure............................................................................... |
97 |
|
8.10 |
system Radius-Settings ......................................................................................... |
97 |
|
8.11 |
system remote_management https configure .................................................... |
98 |
|
8.12 |
system remote_management telnet configure ................................................... |
99 |
|
8.13 |
system sessionSettings admin configure .......................................................... |
100 |
|
8.14 |
system sessionSettings guest configure ........................................................... |
100 |
|
8.15 |
system snmp trap configure <agent_ip> ........................................................... |
100 |
|
8.16 |
system snmp trap delete <agent_ip>................................................................. |
101 |
|
8.17 |
system snmp users configure <user> ................................................................ |
101 |
|
8.18 |
system snmp sys configure ................................................................................. |
102 |
|
8.19 |
system snmp access add .................................................................................... |
102 |
|
8.20 |
system snmp access edit <rowid> ..................................................................... |
103 |
|
8.21 |
system snmp access delete <rowid> ................................................................. |
104 |
|
8.22 |
system switch_settings power_saving configure ............................................. |
104 |
|
8.23 |
system switch_settings jumbo_frame configure............................................... |
104 |
|
8.24 |
system admin_setting configure ......................................................................... |
105 |
|
8.25 |
system time configure .......................................................................................... |
105 |
|
8.26 |
system traffic_meter configure............................................................................ |
106 |
|
8.27 |
system usb usb1 configure.................................................................................. |
106 |
|
8.28 |
system usb usb2 configure.................................................................................. |
107 |
|
8.29 |
system usb shareport_vlan configure <row_id>............................................... |
107 |
|
8.30 |
system group add ................................................................................................. |
108 |
|
8.31 |
system group edit <row_id> ................................................................................ |
108 |
|
8.32 |
system group delete <row_id> ............................................................................ |
109 |
|
8.33 |
system users add.................................................................................................. |
109 |
|
8.34 |
system users edit <row_id>................................................................................. |
110 |
|
8.35 |
system users delete <row_id> ............................................................................ |
110 |
|
8.36 |
system group groupaccesscontrol configure <group_id> ............................... |
110 |
|
8.37 |
system group access_control_browser add...................................................... |
111 |
|
8.38 |
system group access_control_browser delete <row_id> ................................ |
111 |
|
8.39 |
system group access_control_ip add................................................................. |
111 |
|
8.40 |
system group access_control_ip delete <row_id> ........................................... |
112 |
Chapter 9. |
Configuration commands under branch UTIL ............................................................... |
113 |
|
|
9.1 |
util system_check ping <ip_address> ................................................................ |
113 |
5
9.2 |
util system_check dns_lookup <dns> ................................................................ |
113 |
9.3 |
util system_check traceroute <ip_address> ..................................................... |
113 |
9.4 |
util system_check capturePackets start <interface> ....................................... |
113 |
9.5 |
util system_check capturePackets download <fileName> <ipAddr>............. |
113 |
9.6 |
util dbglog_download <fileName> <ipAddr> ..................................................... |
113 |
9.7 |
util usb_test <ipAddr> <fileName> ..................................................................... |
114 |
9.8 |
util firmware_upgrade <IpAddr> <FileName>................................................... |
114 |
9.9 |
util enable_auto_backup <status>...................................................................... |
114 |
9.10 |
util enable_config_encryp <status>.................................................................... |
114 |
9.11 |
util watchdog_disable <status>........................................................................... |
114 |
Chapter 10. Configuration commands under branch LICENSE ....................................................... |
115 |
|
10.1 |
license list............................................................................................................... |
115 |
10.2 |
license activate <activationKey> ........................................................................ |
115 |
Chapter 11. Configuration commands under branch NET ................................................................ |
116 |
|
11.1 |
net ipv6_tunnel six_to_four configure ................................................................ |
116 |
11.2 |
net bandwidth profile enable <enable>.............................................................. |
116 |
11.3 |
net bandwidth profile add..................................................................................... |
116 |
11.4 |
net bandwidth profile edit <row_id> ................................................................... |
117 |
11.5 |
net bandwidth profile delete <row_id> ............................................................... |
118 |
11.6 |
net bandwidth traffic_selector add...................................................................... |
118 |
11.7 |
net bandwidth traffic_selector edit <row_id> .................................................... |
119 |
11.8 |
net bandwidth traffic_selector delete <row_id> ................................................ |
119 |
11.9 |
net ddns wan1 configure...................................................................................... |
120 |
11.10 |
net ddns wan2 configure...................................................................................... |
120 |
11.11 |
net lan dhcp reserved_ip configure <mac_address> ...................................... |
121 |
11.12 |
net lan dhcp reserved_ip delete <mac_address> ............................................ |
121 |
11.13 |
net dmz dhcp reserved_ip configure <mac_address> .................................... |
122 |
11.14 |
net dmz dhcp reserved_ip delete <mac_address> .......................................... |
122 |
11.15 |
net ethernet configure <interface_name> ......................................................... |
122 |
11.16 |
net lan ipv4 configure ........................................................................................... |
123 |
11.17 |
net lan ipv6 configure ........................................................................................... |
125 |
11.18 |
net lan ipv6 pool configure <ipv6PoolStartAddr> ............................................. |
126 |
11.19 |
net lan ipv6 pool delete <ipv6PoolStartAddr> .................................................. |
127 |
11.20 |
net igmp configure ................................................................................................ |
127 |
11.21 |
net intel_Amt server configure ............................................................................ |
127 |
11.22 |
net intel_Amt_Reflector configure ...................................................................... |
128 |
11.23 |
net ip_Aliasing server add ................................................................................... |
129 |
11.24 |
net ip_Aliasing server edit <row_id> .................................................................. |
129 |
11.25 |
net ip_Aliasing server delete <row_id>.............................................................. |
130 |
11.26 |
net mode configure ............................................................................................... |
130 |
11.27 |
net ipv6_tunnel isatap add................................................................................... |
131 |
11.28 |
net ipv6_tunnel isatap edit <row_id> ................................................................. |
131 |
6
11.29 |
net ipv6_tunnel isatap delete <row_id> ............................................................. |
132 |
11.30 |
net routing mode configure.................................................................................. |
132 |
11.31 |
net wan wan1 ipv4 configure............................................................................... |
133 |
11.32 |
net wan wan2 ipv4 configure............................................................................... |
145 |
11.33 |
net wan wan3 threeG configure.......................................................................... |
158 |
11.34 |
net wan mode configure....................................................................................... |
159 |
11.35 |
net wan port_setup configure.............................................................................. |
162 |
11.36 |
net wan vlan_setup configure ............................................................................. |
162 |
11.37 |
net wan vlan_setup vlanId_Add.......................................................................... |
162 |
11.38 |
net wan vlan_setup vlanId_Delete ..................................................................... |
163 |
11.39 |
net wan configurable_port configure.................................................................. |
163 |
11.40 |
net wan wan1 ipv6 configure............................................................................... |
163 |
11.41 |
net wan wan2 ipv6 configure............................................................................... |
165 |
11.42 |
net routing ospfv2 configure <interface> ........................................................... |
166 |
11.43 |
net routing ospfv3 configure <interface> ........................................................... |
168 |
11.44 |
16.44 net routing protocol_binding add ............................................................. |
169 |
11.45 |
net routing protocol_binding edit <row_id> ....................................................... |
169 |
11.46 |
net routing protocol_binding enable <row_id>.................................................. |
170 |
11.47 |
net routing protocol_binding disable <row_id> ................................................. |
171 |
11.48 |
net routing protocol_binding delete <row_id>................................................... |
171 |
11.49 |
net radvd configure ............................................................................................... |
172 |
11.50 |
net radvd pool add ................................................................................................ |
173 |
11.51 |
net radvd pool edit <row_id> ............................................................................... |
174 |
11.52 |
net radvd pool delete <row_id> .......................................................................... |
175 |
11.53 |
net routing dynamic configure............................................................................. |
175 |
11.54 |
net routing static ipv4 configure <name> .......................................................... |
177 |
11.55 |
net routing static ipv6 configure <name> .......................................................... |
178 |
11.56 |
net routing static ipv4 delete <name> ................................................................ |
179 |
11.57 |
net routing static ipv6 delete <name> ................................................................ |
179 |
11.58 |
net tahi add-default-route <ip_address> ........................................................... |
179 |
11.59 |
net tahi add-route <ip_address> <gw> .............................................................. |
179 |
11.60 |
net tahi del-route <ip_address> <gw> ............................................................... |
179 |
11.61 |
net tahi ipv6-Alias-Add(LAN) <ip6_address>.................................................... |
180 |
11.62 |
net tahi ipv6-Alias-Del(LAN) <ip6_address>..................................................... |
180 |
11.63 |
net tahi ipv6-Alias-Add(WAN) <ip6_address> .................................................. |
180 |
11.64 |
net tahi ipv6-Alias-Del(WAN) <ip6_address> ................................................... |
180 |
11.65 |
net tahi reachable-time <time> ........................................................................... |
181 |
11.66 |
net tahi ping6 <ip> <size> ................................................................................... |
181 |
11.67 |
net tahi mping6 <mip>.......................................................................................... |
181 |
11.68 |
net tahi bping6 <bip> <psize> ............................................................................. |
181 |
11.69 |
net tahi pmtu-route-add <ipAdd> ........................................................................ |
181 |
11.70 |
net tahi interface-down <interface> .................................................................... |
182 |
11.71 |
net tahi interface-up <interface> ......................................................................... |
182 |
11.72 |
net tahi start-RA-custom <fileName> <ipAddr>................................................ |
182 |
7
11.73 |
net tahi RA-Start.................................................................................................... |
182 |
11.74 |
net ipv6_tunnel teredo configure ........................................................................ |
183 |
11.75 |
net upnp configure ................................................................................................ |
184 |
11.76 |
net port-vlan lan_edit <portnamew>................................................................... |
184 |
11.77 |
net port-vlan wlan_edit <ssidName>.................................................................. |
184 |
11.78 |
net vlan-membership lan_edit <portw> ............................................................. |
185 |
11.79 |
net vlan-membership wlan_edit <ssidName>................................................... |
185 |
11.80 |
net multiVlan subnet edit <vlanID>..................................................................... |
186 |
11.81 |
net vlan config add <vlan_id> ............................................................................. |
187 |
11.82 |
net vlan config edit <vlan_Id> ............................................................................. |
188 |
11.83 |
net vlan config delete <VlanId> .......................................................................... |
188 |
11.84 |
net dmz configure ................................................................................................. |
188 |
Chapter 12. Configuration commands under branch SECURITY .................................................... |
190 |
|
12.1 |
security advanced_network attack_checks configure ..................................... |
190 |
12.2 |
security advanced_network ips setup................................................................ |
191 |
12.3 |
security application_rules add............................................................................. |
191 |
12.4 |
security application_rules edit <row_id> ........................................................... |
192 |
12.5 |
security application_rules delete <row_id> ....................................................... |
193 |
12.6 |
security firewall custom_service add ................................................................. |
193 |
12.7 |
security firewall custom_service edit <row_id> ................................................ |
194 |
12.8 |
security firewall custom_service delete <row_id> ............................................ |
194 |
12.9 |
security firewall ipv4 configure ............................................................................ |
195 |
12.10 |
security firewall ipv4 default_outbound_policy <default_outbound_policy>.196 |
|
12.11 |
security firewall ipv4 edit <row_id>..................................................................... |
197 |
12.12 |
security firewall ipv4 enable <row_id> ............................................................... |
198 |
12.13 |
security firewall ipv4 disable <row_id> .............................................................. |
199 |
12.14 |
security firewall ipv4 delete <row_id> ................................................................ |
199 |
12.15 |
security firewall ipv4 move <row_id> ................................................................. |
199 |
12.16 |
security firewall algs ............................................................................................. |
199 |
12.17 |
security firewall ipv6 configure ............................................................................ |
200 |
12.18 |
security firewall ipv6 edit <row_id>..................................................................... |
201 |
12.19 |
security firewall ipv6 enable <row_id> ............................................................... |
202 |
12.20 |
security firewall ipv6 disable <row_id> .............................................................. |
202 |
12.21 |
security firewall ipv6 delete <row_id> ................................................................ |
202 |
12.22 |
security firewall ipv6 move <row_id> ................................................................. |
202 |
12.23 |
security firewall ipv6 default_outbound_policy <default_outbound_policy>.203 |
|
12.24 |
security ids configure............................................................................................ |
203 |
12.25 |
security session_settings configure ................................................................... |
203 |
12.26 |
security schedules add......................................................................................... |
204 |
12.27 |
security schedules edit <row_id> ....................................................................... |
205 |
12.28 |
security schedules delete <row_id> ................................................................... |
207 |
12.29 |
security firewall smtpAlg configure ..................................................................... |
207 |
12.30 |
security firewall smtpAlg approvedMailId add .................................................. |
207 |
8
12.31 |
security firewall smtpAlg approvedMailId edit <row_id> ................................. |
208 |
12.32 |
security firewall smtpAlg approvedMailId delete <row_id> ............................. |
208 |
12.33 |
security firewall smtpAlg blockedMailId add ..................................................... |
208 |
12.34 |
security firewall smtpAlg blockedMailId edit <row_id> .................................... |
209 |
12.35 |
security firewall smtpAlg blockedMailId delete <row_id>................................ |
209 |
12.36 |
security firewall smtpAlg subjectList add........................................................... |
209 |
12.37 |
security firewall smtpAlg subjectList edit <row_id>.......................................... |
210 |
12.38 |
security firewall smtpAlg subjectList delete <row_id> ..................................... |
210 |
12.39 |
security mac_filter configure................................................................................ |
210 |
12.40 |
security mac_filter source add ............................................................................ |
211 |
12.41 |
security mac_filter source edit <row_id> ........................................................... |
211 |
12.42 |
security mac_filter source delete <row_id>....................................................... |
211 |
12.43 |
security ip_or_mac_binding add ......................................................................... |
212 |
12.44 |
security ip_or_mac_binding edit <row_id>........................................................ |
212 |
12.45 |
security ip_or_mac_binding delete <row_id> ................................................... |
213 |
12.46 |
security firewall vpn_passthrough configure..................................................... |
213 |
12.47 |
security webAccess status <status> .................................................................. |
213 |
12.48 |
security webAccess add ...................................................................................... |
213 |
12.49 |
security webAccess edit <row_id> ..................................................................... |
214 |
12.50 |
security webAccess delete <row_id>................................................................. |
214 |
12.51 |
security website_filter content_filtering configure ............................................ |
215 |
12.52 |
security website_filter approved_urls add ......................................................... |
215 |
12.53 |
security website_filter approved_urls edit <row_id> ........................................ |
215 |
12.54 |
security website_filter approved_urls delete <row_id> ................................... |
216 |
12.55 |
security website_filter blocked_keywords add.................................................. |
216 |
12.56 |
security website_filter blocked_keywords edit <row_id> ................................ |
216 |
12.57 |
security website_filter blocked_keywords delete <row_id> ............................ |
217 |
12.58 |
security website_filter blocked_keywords enable <row_id> ........................... |
217 |
12.59 |
security website_filter blocked_keywords disable <row_id> .......................... |
217 |
9
Chapter 1. Introduction
This document describes the Command Line Interface (CLI) for managing D-Link's DSR-500/500AC/1000/1000AC router.
The CLI user requires advanced knowledge about the configuration of the system, and it should be used only by those users who are familiar with CLI-based configuration.
Note that the following features in the DSR Unified Services Router cannot be managed by the CLI:
•Firmware Upgrade
•Configuration Backup/Restore
•Certificate Generate/Upload
•Power Savings mode configuration
•System Dashboard/Resource Utilization
Please access the web browser based UI of the DSR router for managing these features.
1.1 Accessing the CLI
The CLI can be accessed by logging in with the same user credentials used to access the web browser based UI.
*****************************************************
Welcome to the DSR Command Line Interface
****************************************************
D-Link DSR>
Note: D-Link DSR> is the CLI prompt.
10
Chapter 2. Basic commands available on the CLI
2.1 Context Sensitive Help
[?] - Displays context sensitive help. This is either a list of possible command completions with summaries, or the full syntax of the current command. A subsequent repeat of this key, when a command has been resolved, will display a detailed reference.
2.2 Auto-Completion
The following keys both perform auto-completion for the current command line. If the command prefix is not unique a subsequent repeat of the key will display possible completions.
•[enter] - Auto-completes, syntax-checks then executes a command. If there is a syntax error then offending part of the command line will be highlighted and explained.
•[space] - Auto-completes, or if the command is already resolved, inserts a space.
2.3 Movement Keys
•[CTRL-A] - Moves to the start of the line.
•[CTRL-E] - Moves to the end of the line.
•[up] - Moves to the previous command line held in history.
•[down] - Moves to the next command line held in history.
•[left] - Moves the insertion point left one character.
•[right] - Moves the insertion point right one character.
2.4 Deletion Keys
•[CTRL-C] - Deletes the whole line.
•[CTRL-D] - Deletes the character to the right on the insertion point.
•[CTRL-K] - Deletes all the characters to the right of the insertion point.
•[Backspace] - Deletes the character to the left of the insertion point.
11
2.5 Escape Sequences
•!! - Substitutes the last command line.
•!N - Substitutes the Nth command line (absolute as per 'history' command).
•!-N - Substitutes the command line entered N lines before (relative).
12
Chapter 3. Command Hierarchy in CLI
3.1 CLI Commands
The CLI commands are divided into 4 categories:
•Global commands
•Show commands
•Utility commands
•Configuration commands
3.2Router Configuration
The router configuration is divided into 5 branches:
•Net: Network Settings
•Security: Security Settings
•System: Admin Settings
•Dot11: Wireless Settings
•Vpn: VPN Settings
•Radius: RADIUS Settings
13
Chapter 4. Global commands used in CLI
The global commands that are used in CLI are given below:
•.exit: Exit this session
•.help: Displays an overview of the CLI syntax
•.top: Returns to the default mode
•.reboot: Reboots the system.
•.history: Displays the current session's command line history. Number of commands in history list can be controlled by setting limit argument; by default it is unbounded.
14
Chapter 5. Show commands used in CLI
The show commands for all the above mentioned branches are outlined in this section.
The command show activeDirectory-serverCheck? at the CLI prompt would give the description of all the show commands in the branch activeDirectory-serverCheck, which is as follows:
show activeDirectory-
1 Displays status of Active Directory servers. serverCheck
The command show NT-Domain-Settings? at the CLI prompt would give the description of all the show commands in the branch NT-Domain-Settings, which is as follows:
1 |
show NT-Domain-Settings |
Displays NT Domain configuration. |
The command show vpn? at the CLI prompt would give the description of all the show commands in the branch vpn, which is as follows:
1 |
show vpn gre_tunnels |
gre tunnels display mode. |
|
2 |
show vpn l2tp client |
Shows l2tp client details. |
|
3 |
show vpn l2tp client setup |
Displays l2tp client setup. |
|
4 |
show vpn l2tp client status |
Displays l2tp client status. |
|
|
|
|
|
5 |
show vpn l2tp |
Shows l2tp server details. |
|
6 |
show vpn l2tp server |
Shows l2tp server details. |
|
7 |
show vpn l2tp server setup |
Displays l2tp server setup. |
|
8 |
show vpn l2tp server |
Displays l2tp server stats. |
|
connections |
|||
|
|
||
9 |
show vpn openvpn |
Displays openvpn commands. |
|
10 |
show vpn openvpn config |
Displays openvpn configuration. |
|
11 |
show vpn openvpn |
Displays all openvpn remote network on |
|
remote_network_all |
system. |
||
|
|||
12 |
show vpn openvpn |
Displays all openvpn local network on system. |
|
local_network_all |
|||
|
|
||
13 |
show vpn openvpn |
Displays openvpn certificate status. |
|
cert_upload_status |
|||
|
|
||
14 |
show vpn pptp client |
Shows pptp client details. |
|
15 |
show vpn pptp client setup |
Displays pptp client setup. |
|
16 |
show vpn pptp client_status |
Shows pptp client status details. |
|
17 |
show vpn pptp client_status |
Displays pptp client status setup. |
|
|
setup |
|
15
18 |
show vpn pptp |
Shows pptp server details. |
|
19 |
show vpn pptp server |
Shows pptp server details. |
|
20 |
show vpn pptp server setup |
Displays pptp server setup. |
|
21 |
show vpn pptp server |
Displays pptp server stats. |
|
connections |
|||
|
|
||
22 |
show vpn sslvpn |
Shows sslvpn settings. |
|
23 |
show vpn sslvpn |
Shows sslvpn active connections. |
|
connections |
|||
|
|
||
24 |
show vpn sslvpn client |
Shows sslvpn client settings. |
|
25 |
show vpn sslvpn route |
Shows route settings. |
|
26 |
show vpn sslvpn policy |
Shows sslvpn policy settings. |
|
27 |
show vpn sslvpn portal- |
Shows sslvpn portal-layouts settings. |
|
layouts |
|||
|
|
||
28 |
show vpn sslvpn |
Shows sslvpn portforwarding settings. |
|
portforwarding |
|||
|
|
||
29 |
show vpn sslvpn |
Shows sslvpn portforwarding appconfig |
|
portforwarding appconfig |
settings. |
||
|
|||
30 |
show vpn sslvpn |
Shows sslvpn portforwarding hostconfig |
|
portforwarding hostconfig |
settings. |
||
|
|||
31 |
show vpn sslvpn resource |
Shows sslvpn resource settings. |
|
32 |
show vpn sslvpn resource- |
Shows sslvpn resource object settings. |
|
object <resource_name> |
|||
|
|
||
33 |
show vpn ipsec |
Shows vpn policy. |
|
34 |
show vpn ipsec policy |
Shows vpn policy. |
|
35 |
show vpn ipsec policy setup |
Shows vpn policy. |
|
36 |
show vpn ipsec policy status |
Shows vpn status. |
|
37 |
show vpn ipsec policy |
Shows a list of backup policies. |
|
backup_policies |
|||
|
|
||
38 |
show vpn ipsec dhcp |
Shows vpn ipsec dhcp setup. |
|
39 |
show vpn ipsec dhcp setup |
Shows vpn ipsec dhcp setup. |
The command show LDAP-Settings? at the CLI prompt would give the description of all the show commands in the branch LDAP-Settings, which is as follows:
1 |
show LDAP-Settings |
Displays LDAP configuration. |
The command show dot11? at the CLI prompt would give the description of all the show commands in the branch dot11, which is as follows:
1 |
show dot11 |
Displays 802.11 configuration |
|
|
|
Displays Access Point configuration. This |
|
|
show dot11 |
command displays the list of configured Access |
|
2 |
Points for the device. From this summary list, |
||
accesspoint<ap_name> |
|||
|
status and parameters of each AP are available |
||
|
|
||
|
|
for display. |
16
ap_name: This is an AP identifier which uniquely identifies an AP in the list of configured APs. Enabled: An AP can be disabled if not in use and enabled as needed. The AP is disabled if this field has the value 'N' and it is enabled if it has the value 'Y'. Disabling an AP does not delete the configuration, but stops the AP. Enabling the AP creates a wireless network where computers and other devices can join and communicate with the devices connected to the access point or the devices on the Local Area Network (LAN). SSID: The name or Service Set Identifier (SSID) is the name of the wireless network serviced by this AP. Note that since a given wireless profile can be common to multiple APs, the SSID is not unique to an AP. In order for computers or devices to communicate via this wireless network serviced by this AP, all devices must select the same SSID from the list of wireless networks in the area.Broadcast: The field indicates whether SSID is broadcasted or not in the beacon frames transmitted by the AP. If SSID is not broadcasted, the wireless devices will not be able to see the network name (SSID). If this field has the value 'Y', it indicates that the AP's SSID is broadcasted to the public. If it is 'N' it indicates the SSID is not to be broadcasted and a device would have to specify the SSID exactly to connect to this AP.
Profile: This field has a brief description of the security, encryption and authentication combination assigned to the AP. A Profile is not necessarily unique to an AP, rather this grouping of wireless settings can be used on more than one AP at the same time.
Radio: The physical radio(s) on which this AP is running on. An AP can run on multiple radios at the same time for load-balancing and better throughput.
VLAN: The AP can be a part of a logical network defined by the VLAN id. This allows devices connected to the VLAN through this AP to exchange data with one another as in a LAN. If the optional argument ap_name is specified, the following configuration information is displayed for the access point.
Beacon Interval: The amount of time in milliseconds between beacon transmissions. DTIM Interval: Interval for delivery of traffic
17
indication message. It is related to beacon interval.
RTS Threshold: The Request to Send (RTS) threshold is the value the AP checks against its transmitting frames to determine if the RTS/Clear To Send (CTS) handshake is required with the receiving client. Using a small value causes RTS packets to be sent more often, consuming more of the available bandwidth, therefore reducing the apparent throughput of the network packet. The default is 2346, which effectively disables RTS. Frag Threshold: This is the maximum length of the frame, beyond which packets must be broken up (fragmented) into two or more frames. Collisions occur more often for long frames because sending them occupies the channel for a longer time. The default is 2346, which effectively disables Fragmentation. Preamble Mode: 802.11b requires that a preamble be prepended to every frame before it is transmitted to the air. The preamble may be either the traditional long preamble, which requires 192 micro second for transmission, or it may be an optional short preamble that requires only 96 micro second. Long preamble is needed for the compatibility with legacy 802.11 systems operating at 1 and 2 Mbps. The default is 'long'. RTS/CTS Protection: If selected the AP always performs RTS/CTS handshake before transmitting a packet. It is generally used to minimize collisions among hidden stations Transmit Power Gain: Defines the relative amplification (gain) in dbm for transmitted packets which is added to the TX power configured on the physical radio. Retry Limit: The number of retries the AP will use when a frame transmission fails. It is used for both long and short frames, of size less than or equal to the RTS threshold. Supported Rate: The rate or rates (in Mbps) which the AP will advertise in the beacon frames.
Displays Profile configuration. If no profile name is specified, this command will display a
show dot11
summary of the details of all the profiles
configured in the system. If a profile name is 3 profile<profile_name><displ specified, this command will display a detailed
ay_qos>
configuration of the profile. If the argument 'DisplayQosInfo' is set to 'Y', the profile details will include the QoS details as well.
18
|
|
Displays access point and radio statistics. This |
||||||||
|
|
table shows a cumulative total of relevant |
||||||||
|
|
wireless statistics for the APs and radios; the |
||||||||
|
|
counter is reset when the device is rebooted. |
||||||||
|
|
Radio Statistics: |
This |
table |
displays |
|||||
|
|
transmit/receive data for each radio. It has the |
||||||||
|
|
following fields: Pkt(Tx/Rx): The number of |
||||||||
|
|
transmitted/received |
wireless |
|
packets. |
|||||
|
|
Byte(Tx/Rx): |
The |
number |
|
of |
||||
|
|
transmitted/received |
bytes |
of |
information. |
|||||
|
|
Err(TRx/Rx): |
The |
number |
|
of |
||||
|
|
transmitted/received packet errors reported |
to |
|||||||
|
|
the |
radio. |
|
Drop(Tx/Rx): |
The |
number |
of |
||
|
|
transmitted/received packet drops between the |
||||||||
|
|
radio and client. Mcast: The number of multicast |
||||||||
4 |
show dot11 statistics |
packets sent over this radio. Coll: The number |
||||||||
|
|
of packet collisions reported to the radio. AP |
||||||||
|
|
Statistics: This table displays transmit/receive |
||||||||
|
|
data for each AP. An AP can have multiple |
||||||||
|
|
entries if it is running on multiple radios. It has |
||||||||
|
|
the following fields: Pkt(Tx/Rx): The number of |
||||||||
|
|
transmitted/received |
wireless |
|
packets |
|||||
|
|
Byte(Tx/Rx): |
The |
number |
|
of |
||||
|
|
transmitted/received |
bytes |
of |
information |
|||||
|
|
Err(TRx/Rx): |
The |
number |
|
of |
||||
|
|
transmitted/received packet errors reported |
to |
|||||||
|
|
the |
AP. |
Drop(Tx/Rx): |
The |
number |
of |
|||
|
|
transmitted/received packet dropped by the AP. |
||||||||
|
|
Mcast: The number of multicast packets sent |
||||||||
|
|
over this AP. Coll: The number of packet |
||||||||
|
|
collisions reported to the AP |
|
|
|
|
||||
5 |
show dot11 acl<ap_name> |
Displays access control list information for the |
||||||||
specified access point. |
|
|
|
|
||||||
6 |
show dot11 accesspoint |
Displays wireless stats. |
|
|
|
|
||||
status<ap_name> |
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
7 |
show dot11 |
Displays wireless stats. |
|
|
|
|
||||
wmm<profile_name> |
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
8 |
show dot11 radius |
Displays radius Information. |
|
|
|
|
||||
9 |
show dot11 wps |
Displays WPS Information. |
|
|
|
|
||||
10 |
show dot11 wds<radio_no> |
Displays WDS Information. |
|
|
|
|
||||
11 |
show dot11 |
Displays wireless_statistics Information. |
|
|||||||
wireless_statistics |
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
Displays Radio configuration. Available Radios |
||||||||
|
|
This table shows the list of available radios that |
||||||||
12 |
show dot11 radio<radio_no> |
an AP may use. It has the following fields: |
||||||||
Radio: The |
radio |
number. Card: This field |
||||||||
|
|
indicates which card the radio is using. Path: |
||||||||
|
|
This |
field |
indicates |
which |
path |
the |
radio |
is |
19
mapped to. RogueAP Enabled: If this field has value 'Y' it indicates that RogueAP detection is enabled on this radio. If it is 'N' it indicates that RogueAP detection is disabled on this radio. If the optional argument radioNum is given, the following cofiguration information is displayed for the given radio. Radio Settings Radio: The radio number. Card Name: This field indicates which card the radio is using. Path: This field indicates which path the radio is mapped to. Current Channel: The channel used by the radio. RogueAP Enabled: If this field has the value 'Yes', it indicates that RogueAP detection is enabled on this radio. TX Power: Value in dBm is the default transmitted power level for all APs that use this radio. RX Diversity: Enable receive diversity (use multiple antennas to receive packets) List of Access Points for Radio This table shows all the APs that are configured for a particular radio. AP Name: This is the name of the AP. BSSID: The BSSID of the AP SSID: The SSID serviced by AP Profile: This field has a brief description of the security, encryption and authentication combination assigned to the AP.
The command show POP3-Settings? at the CLI prompt would give the description of all the show commands in the branch POP3-Settings, which is as follows:
1 |
show POP3-Settings |
Displays POP3 configuration. |
The command show POP3-Trusted-CA? at the CLI prompt would give the description of all the show commands in the branch POP3-Trusted-CA, which is as follows:
1 |
show POP3-Trusted-CA |
Displays POP3 Trusted Certificates. |
The command show system? at the CLI prompt would give the description of all the show commands in the branch system, which is as follows:
1 |
show system logging |
. |
2 |
show system logging remote |
. |
3 |
show system logging remote |
Displays remote logging configuration |
|
setup |
|
4 |
show system logging facility |
. |
5 |
show system logging facility |
Displays logging facility configuration |
|
setup <facility> |
|
6 |
show system logging ipv4 |
. |
20
7 |
show system logging ipv4 |
Displays logging configuration |
|
||
setup |
|
||||
|
|
|
|
||
8 |
show system logging ipv6 |
. |
|
|
|
9 |
show system logging ipv6 |
Displays ipv6 logs configuration |
|
||
setup |
|
||||
|
|
|
|
||
10 |
show system log |
Displays captured log messages of the router |
|||
activities |
|
|
|||
|
|
|
|
||
|
|
Displays all the captured log messages of the |
|||
11 |
show system log all |
router activities |
from Event Log. The |
logs |
|
displayed on this event viewer can be defined in |
|||||
|
|
||||
|
|
the Log Configuration commands |
|
||
|
|
Displays Page Wise, captured log messages of |
|||
12 |
show system log page |
the router activities from Event Log. The logs |
|||
displayed on this event viewer can be defined in |
|||||
|
|
||||
|
|
the Log Configuration commands |
|
||
13 |
show system |
. |
|
|
|
remote_management |
|
|
|||
|
|
|
|
||
14 |
show system |
Displays remote |
management over |
https |
|
remote_management setup |
configuration |
|
|
||
|
|
|
|||
15 |
show system |
Displays sessionSettings Configuration |
|
||
sessionSettings |
|
||||
|
|
|
|
||
16 |
show system |
Displays SNMP configuration |
|
||
snmp <agentIP> |
|
||||
|
|
|
|
||
17 |
show system switch_setting |
. |
|
|
|
18 |
show system switch_setting |
Displays power mode configuration |
|
||
|
power_mode |
|
|
|
|
19 |
show system switch_setting |
Displays jumbo frame configuration |
|
||
|
jumbo_frame |
|
|
|
|
20 |
show system status |
Displays system status |
|
||
21 |
show system dashboard |
Displays the resources being used in the system |
|||
currently |
|
|
|||
|
|
|
|
||
22 |
show system time |
. |
|
|
|
23 |
show system time setup |
Displays Timezone and NTP configuration |
|
||
24 |
show system traffic_meter |
. |
|
|
|
25 |
show system traffic_meter |
Displays traffic meter configuration |
|
||
setup |
|
||||
|
|
|
|
||
26 |
show system usb-status |
Displays USB Status |
|
||
27 |
show system users |
System group display mode |
|
||
28 |
show system group |
System user display mode |
|
||
29 |
show system group |
Displays information for given group |
|
||
specific<row_id> |
|
||||
|
|
|
|
||
30 |
show system group all |
Displays all groups on system |
|
||
31 |
show system users all |
Displays all users on system |
|
||
32 |
show system users |
Displays information for given user |
|
||
specific<row_id> |
|
||||
|
|
|
|
21
|
show system group |
Displays Group Access Control configuration for |
|
33 |
groupaccesscontrol <group_ |
||
|
id> |
the selected group |
|
|
|
||
34 |
show system group |
Displays Access Control browsers Policies |
|
access_control_browser |
|||
|
|
||
35 |
show system group |
Displays Access Control ips Policies |
|
access_control_ip |
|||
|
|
||
36 |
show system |
Displays the firmware Version. |
|
firmwareVersion |
|||
|
|
The command show ntDomain-serverCheck? at the CLI prompt would give the description of all the show commands in the branch ntDomain-serverCheck, which is as follows:
show ntDomain-
1 Displays status of NT Domain servers. serverCheck
The command show Active-Directory-Settings? at the CLI prompt would give the description of all the show commands in the branch Active-Directory-Settings, which is as follows:
show Active-Directory-
1 Displays Active Directory configuration. Settings
The command show pop3-serverCheck? at the CLI prompt would give the description of all the show commands in the branch pop3-serverCheck, which is as follows:
1 |
show pop3-serverCheck |
Displays status of Pop3 servers. |
The command show Radius-serverCheck? at the CLI prompt would give the description of all the show commands in the branch Radius-serverCheck, which is as follows:
1 |
show Radius-serverCheck |
Displays status of Radius servers. |
The command show Radius-Settings? at the CLI prompt would give the description of all the show commands in the branch Radius-Settings, which is as follows:
Displays RADIUS configuration.
A RADIUS server maintains a database of user accounts used in larger environments. If a RADIUS server already exists, it can be used for authenticating users that want to connect to the
1 show Radius-Settings wireless network provided by this device. When multiple RADIUS servers are configured, they are accessed in the same order as in the table. If first RADIUS server is not accessible, then system tries to contact to the next RADIUS server. Configured Radius Servers This table
22
displays the list of all configured RADIUS servers. If the optional argument ServerIP is specified, detailed configuration of the RADIUS server is displayed. Server IP: IP address of RADIUS authentication server Accounting Server IP: IP address of RADIUS accounting server Server Port: RADIUS authentication server port to send the RADIUS messages. Timeout: The time (in seconds) the device waits for a response from the RADIUS server Retries: The number of tries the router will make to the RADIUS server before giving up. Secret: RADIUS server secret. This field is only displayed if the argument ServerIP is specified.
The command show net? At the CLI prompt would give the description of all the show commands in the branch net, which is as follows:
1 |
show net ipv6_tunnel status |
Displays ipv6 tunnels status |
|
2 |
show net bandwidth |
. |
|
3 |
show net bandwidth profile |
. |
|
4 |
show net bandwidth profile |
Displays list of Available Bandwidth Profile(s). |
|
setup |
|||
|
|
||
5 |
show net bandwidth |
. |
|
traffic_selector |
|||
|
|
||
6 |
show net bandwidth |
Shows the list of Available Traffic Selector(s). |
|
traffic_selector setup |
|||
|
|
||
7 |
show net bandwidth profile |
Displays the list of interface for Inbound |
|
interface_list |
Bandwidth Profile. It includes Available VLANs |
||
|
|||
8 |
show net bandwidth |
Displays a list of available services |
|
traffic_selector services |
|||
|
|
||
9 |
show net ddns |
. |
|
10 |
show net ddns setup |
Show Dynamic DNS Configuration. |
|
11 |
show net lan dhcp |
. |
|
12 |
show net lan dhcp |
. |
|
reserved_ip |
|||
|
|
||
13 |
show net lan dhcp |
Shows a list of DHCP Reserved Addresses. |
|
reserved_ip setup |
|||
|
|
||
14 |
show net lan dhcp |
. |
|
leased_clients |
|||
|
|
||
15 |
show net lan dhcp |
Shows a list of Available DHCP Leased Clients. |
|
leased_clients list |
|||
|
|
||
16 |
show net dmz |
. |
|
17 |
show net dmz setup |
Shows DMZ Configuration. |
|
18 |
show net dmz dhcp |
. |
23
19 |
show net dmz dhcp |
. |
|
reserved_ip |
|||
|
|
||
20 |
show net dmz dhcp |
Displays a list of DMZ DHCP Reserved |
|
reserved_ip setup |
Addresses. |
||
|
|||
21 |
show net dmz dhcp |
. |
|
leased_clients |
|||
|
|
||
22 |
show net dmz dhcp |
Shows a list of Available DMZ DHCP Leased |
|
leased_clients list |
Clients. |
||
|
|||
23 |
show net ethernet |
Displays Ethernet interfaces |
|
24 |
show net lan |
. |
|
25 |
show net lan ipv4 |
. |
|
26 |
show net lan ipv4 setup |
Displays LAN Configuration. |
|
27 |
show net lan ipv6 |
. |
|
28 |
show net lan ipv6 setup |
Shows IPv6 LAN Configuration. |
|
29 |
show net |
Shows Interface Statistics |
|
statistics <interface> |
|||
|
|
||
30 |
show net igmp |
Displays igmp configuration |
|
31 |
show net intel_Amt |
Shows IntelAmt details |
|
32 |
show net intel_Amt server |
Shows IntelAmt Server Configuration |
|
33 |
show net intel_Amt |
show IntelAmt Reflector Configuration |
|
Reflector |
|||
|
|
||
34 |
show net intel_Amt server |
Displays Intel_Amt server configuration. |
|
setup |
|||
|
|
||
35 |
show net intel_Amt |
Displays Intel_Amt Reflector setup. |
|
Reflector setup |
|||
|
|
||
36 |
show net Ip_Alias |
Shows Ip Alias configuration details. |
|
37 |
show net Ip_Alias server |
Shows Ip Alias configuration details. |
|
38 |
show net Ip_Alias server |
Displays net Intel_Amt server setup. |
|
setup |
|||
|
|
||
39 |
show net mode |
. |
|
40 |
show net mode setup |
Displays IP MODE configuration |
|
41 |
show net ipv6_tunnel |
. |
|
42 |
show net ipv6_tunnel setup |
Displays ipv6 tunnels configuration |
|
43 |
show net routing mode |
. |
|
44 |
show net routing mode |
Routing Mode between WAN and LAN |
|
setup |
|||
|
|
||
45 |
show net wan wan1 |
. |
|
46 |
show net wan wan1 ipv4 |
. |
|
47 |
show net wan wan1 ipv4 |
Displays ipv4 wan1 Information. |
|
status |
|||
|
|
||
48 |
show net wan wan1 ipv4 |
Displays Wan1 Setup Information. |
|
setup |
|||
|
|
||
49 |
show net wan wan2 |
. |
|
50 |
show net wan wan2 ipv4 |
. |
24
51 |
show net wan wan2 ipv4 |
Displays ipv4 wan2 Information. |
|
status |
|||
|
|
||
52 |
show net wan wan2 ipv4 |
Displays wan2 Setup Information. |
|
setup |
|||
|
|
||
53 |
show net wan wan3 |
Displays the wan3 configuration |
|
54 |
show net wan wan3 threeG |
Shows ThreeG information. |
|
55 |
show net wan wan3 threeG |
Displays ThreeG Configuration. |
|
|
setup |
|
|
56 |
show net wan wan3 threeG |
Displays wan3 ThreeG status. |
|
|
status |
|
|
57 |
show net wan |
. |
|
58 |
show net wan mode |
Displays wan mode Setup. |
|
59 |
show net wan port_setup |
Displays wan port Setup. |
|
60 |
show net wan vlan_setup |
Displays vlan port Information for wan. |
|
61 |
show net wan |
Displays configurable port Information. |
|
configurable_port |
|||
|
|
||
62 |
show net wan wan1 ipv6 |
. |
|
63 |
show net wan wan1 ipv6 |
Displays ipv6 wan1 Information. |
|
status |
|||
|
|
||
64 |
show net wan wan1 ipv6 |
Displays Wan1 Setup Information. |
|
setup |
|||
|
|
||
65 |
show net wan wan2 ipv6 |
. |
|
66 |
show net wan wan2 ipv6 |
Displays ipv6 wan2 Information. |
|
status |
|||
|
|
||
67 |
show net wan wan2 ipv6 |
Displays Wan2 Setup Information. |
|
setup |
|||
|
|
||
68 |
show net routing ospfv2 |
Shows OSPFv2 Configuration |
|
69 |
show net routing ospfv3 |
Shows OSPFv3 Configuration |
|
70 |
show net routing ospfv2 |
Displays OSPFv2 Configuration |
|
setup |
|||
|
|
||
71 |
show net routing ospfv3 |
Displays OSPFv3 Configuration |
|
setup |
|||
|
|
||
72 |
show net routing |
Shows protocol_binding rules |
|
protocol_binding |
|||
|
|
||
73 |
show net routing |
Displays protocol Binding Rules |
|
protocol_binding setup |
|||
|
|
||
74 |
show net radvd |
. |
|
75 |
show net radvd setup |
Displays RADVD configuration |
|
76 |
show net routing dynamic |
Shows dynamic routing setup |
|
77 |
show net routing dynamic |
Shows dynamic routing Setup. |
|
setup |
|||
|
|
||
78 |
show net routing |
Displays routing setup |
|
79 |
show net routing static |
Displays Static Routes Info |
|
80 |
show net routing static ipv4 |
Displays IPv4 Static Routes Info |
25
81 |
show net routing static ipv4 |
Shows all the configured IPV4 routes. |
|
|
setup |
|
|
82 |
show net routing static |
Shows all the interfaces on which static route |
|
interface_list |
can be configured |
||
|
|||
83 |
show net routing static ipv6 |
Displays IPv6 Static Routes Info |
|
84 |
show net routing static ipv6 |
Shows all the configured IPV6 Static routes. |
|
|
setup |
|
|
85 |
show net upnp |
Displays UPnP Information |
|
86 |
show net upnp portmap |
Displays UPnP portmap Table Information. |
|
87 |
show net upnp setup |
Displays UPnP Setup Information. |
|
88 |
show net vlan |
|
|
89 |
show net vlan configuration |
Displays VLAN Confgiuration. |
|
90 |
show net multivlan |
Shows vlan server status |
|
91 |
show net multivlan subnet |
Shows vlan server status |
|
92 |
show net multivlan subnet |
Displays multi vlan Subnet List. |
|
status |
|||
|
|
||
93 |
show net port-vlan |
Shows Port vlan status |
|
94 |
show net port-vlan status |
Displays Port vlan status. |
|
95 |
show net wireless_vlan |
Shows Port vlan status |
|
96 |
show net wireless_vlan |
Displays Port vlan status. |
|
status |
|||
|
|
The command show ldap-serverCheck? at the CLI prompt would give the description of all the show commands in the branch ldap-serverCheck, which is as follows:
1 |
show ldap-serverCheck |
Displays status of Ldap servers. |
The command show security? at the CLI prompt would give the description of all the show commands in the branch security, which is as follows:
1 |
show security |
Shows advanced firewall attack checks |
|
advanced_network |
|||
|
|
||
|
show security |
|
|
2 |
advanced_network |
Displays Security Checks configuration |
|
|
attack_checks |
|
|
3 |
show security |
Displays ips configuration |
|
advanced_network ips |
|||
|
|
||
4 |
show security |
. |
|
application_rules |
|||
|
|
||
5 |
show security |
Displays application rules configuration |
|
application_rules setup |
|||
|
|
||
6 |
show security |
Displays application rules status |
|
application_rules status |
|||
|
|
||
7 |
show security firewall |
. |
|
custom_service |
|||
|
|
26
8 |
show security firewall |
Displays a list of available Custom Service |
|
custom_service setup |
configuration |
||
|
|||
9 |
show security firewall |
Displays Firewall Rules |
|
10 |
show security firewall ipv4 |
Displays IPv4 Firewall Rules |
|
11 |
show security firewall ipv4 |
Displays IPv4 Firewall Rules |
|
setup |
|||
|
|
||
12 |
show security firewall algs |
Displays ALGs protocals status |
|
13 |
show security firewall ipv6 |
Displays IPv6 Firewall Rules |
|
14 |
show security firewall ipv6 |
Displays IPv6 Firewall Rules |
|
setup |
|||
|
|
||
15 |
show security ids |
. |
|
16 |
show security ids setup |
Displays IDS configuration |
|
17 |
show security |
Displays Session Settings configuration |
|
session_settings |
|||
|
|
||
18 |
show security schedules |
. |
|
19 |
show security schedules |
Displays Schedules configuration |
|
setup |
|||
|
|
||
20 |
show security firewall |
. |
|
smtpAlg |
|||
|
|
||
21 |
show security firewall |
. |
|
smtpAlg configure |
|||
|
|
||
22 |
show security firewall |
Shows SmtpAlg Status. |
|
smtpAlg configure setup |
|||
|
|
||
23 |
show security firewall |
. |
|
smtpAlg approvedMailId |
|||
|
|
||
|
show security firewall |
|
|
24 |
smtpAlg approvedMailId |
Shows a List of Approved Mail_Id. |
|
|
setup |
|
|
25 |
show security firewall |
. |
|
smtpAlg blockedMailId |
|||
|
|
||
|
show security firewall |
|
|
26 |
smtpAlg blockedMailId |
Shows a List of Blocked Mail_Id. |
|
|
setup |
|
|
27 |
show security firewall |
. |
|
smtpAlg subjectList |
|||
|
|
||
28 |
show security firewall |
Shows a List of Subject, corresponding Mail_Id |
|
smtpAlg subjectList setup |
and Action. |
||
|
|||
29 |
show security mac_filter |
. |
|
30 |
show security mac_filter |
Displays Source Mac Filter configuration |
|
setup |
|||
|
|
||
31 |
show security |
. |
|
ip_or_mac_binding |
|||
|
|
||
32 |
show security |
Displays IP/MAC Binding configuration |
|
ip_or_mac_binding setup |
|||
|
|
27
33 |
show security firewall |
. |
|
vpn_passthrough |
|||
|
|
||
34 |
show security firewall |
Displays VPN passthrough Configuration |
|
vpn_passthrough setup |
|||
|
|
||
35 |
show security webAccess |
. |
|
|
|
Displays security webAccess configuration and |
|
36 |
show security webAccess |
rules |
|
setup |
Displays a list of Allowed IpAdrr/Network Web |
||
|
|||
|
|
Access |
|
37 |
show security website_filter |
. |
|
38 |
show security website_filter |
Displays content filtering configuration |
|
|
content_filtering |
|
|
39 |
show security website_filter |
Displays trusted domains configuration |
|
approved_urls |
Displays a list of available Approved URLs |
||
|
|||
40 |
show security website_filter |
Displays blocked keywords configuration |
|
|
blocked_keywords |
|
The command vpn? at the CLI prompt would give the description of all the configuration commands in the branch vpn, which is as follows:
1 |
vpn gre_tunnel |
GRE Tunnel. |
|
2 |
vpn gre_tunnel add |
GRE Tunnel add mode |
|
3 |
vpn gre_tunnel |
GRE Tunnel edit mode |
|
edit <row_id> |
|||
|
|
||
4 |
vpn gre_tunnel |
GRE Tunnel delete mode |
|
delete <row_id> |
|||
|
|
||
5 |
vpn l2tp client |
Vpn policy mode. |
|
6 |
vpn l2tp client configure |
l2tp client configuration mode |
|
7 |
vpn l2tp |
Vpn l2tp client action set. |
|
client_action <action> |
|||
|
|
||
8 |
vpn l2tp |
Vpn policy mode. |
|
9 |
vpn l2tp server |
Vpn policy mode. |
|
10 |
vpn l2tp server configure |
l2tp server configuration mode |
|
11 |
vpn openvpn |
Displays openvpn configure commands |
|
12 |
vpn openvpn config |
openvpn configuration mode |
|
13 |
vpn openvpn |
Opens vpn remote networks configuration |
|
remote_network |
commands. |
||
|
|||
14 |
vpn openvpn |
Adds a new remote network |
|
remote_network add |
|||
|
|
||
|
vpn openvpn |
|
|
15 |
remote_network |
Remote network edit mode. |
|
|
edit <row_id> |
|
|
|
vpn openvpn |
|
|
16 |
remote_network |
Openvpn remote network delete mode. |
|
|
delete <row_id> |
|
28
17 |
vpn openvpn local_network |
Opens vpn local networks configuration |
|
|
|
commands. |
|
18 |
vpn openvpn local_network |
Adds a new local network. |
|
|
add |
|
|
19 |
vpn openvpn local_network |
Local network edit mode. |
|
|
edit <row_id> |
|
|
20 |
vpn openvpn local_network |
Openvpn local network delete mode. |
|
|
delete <row_id> |
|
|
21 |
vpn openvpn cert_upload |
Openvpn local network display mode. |
|
22 |
vpn openvpn cert_upload |
Uploads the pem formatted CA Certificate. |
|
ca <fileName> <ipAddr> |
|||
|
|
||
|
vpn openvpn cert_upload |
Uploads the pem formatted Server / Client |
|
23 |
server_client_cert <fileNam |
||
Certificate. |
|||
|
e> <ipAddr> |
|
|
|
vpn openvpn cert_upload |
|
|
24 |
client_key <fileName> <ipA |
Uploads the pem formatted Server/Client key. |
|
|
ddr> |
|
|
|
vpn openvpn cert_upload |
|
|
25 |
dh_Key <fileName> <ipAddr |
Uploads the pem formatted Diffie Hellman key. |
|
|
> |
|
|
|
vpn openvpn cert_upload |
Uploads the pem formatted Tls Authentication |
|
26 |
tls_Authkey <fileName> <ip |
||
|
Addr> |
Key. |
|
|
|
||
|
vpn openvpn cert_upload |
|
|
27 |
crl_cert <fileName> <ipAddr |
Uploads the pem formatted CRL Certificate. |
|
|
> |
|
|
28 |
vpn openvpn cert_upload |
Uploads the pem formatted config file. |
|
config <fileName> <ipAddr> |
|||
29 |
vpn pptp client |
Vpn policy mode. |
|
30 |
vpn pptp client configure |
PPTP client configuration mode. |
|
31 |
vpn pptp |
Vpn pptp client action set. |
|
client_action <action> |
|||
|
|
||
32 |
vpn pptp |
Vpn policy mode. |
|
33 |
vpn pptp server |
Vpn policy mode. |
|
34 |
vpn pptp server configure |
pptp server configuration mode |
|
35 |
vpn sslvpn |
sslvpn configuration commands |
|
36 |
vpn sslvpn portal-layouts |
sslvpn portal layout configuration commands |
|
37 |
vpn sslvpn portal-layouts |
Adds sslvpn portal layout. |
|
add |
|||
|
|
||
38 |
vpn sslvpn portal-layouts |
Edits sslvpn portal layout. |
|
edit <row_id> |
|||
|
|
||
39 |
vpn sslvpn portal-layouts |
Deletes sslvpn portal layout. |
|
delete <row_id> |
|||
|
|
||
40 |
vpn sslvpn portforwarding |
Sslvpn portforwarding configuration commands. |
|
|
|||
|
|
|
29
41 |
vpn sslvpn portforwarding |
Sslvpn portforwarding application configuration |
|
appconfig |
commands. |
||
|
|||
42 |
vpn sslvpn portforwarding |
Adds an application configuration rule. |
|
appconfig add |
|||
|
|
||
43 |
vpn sslvpn portforwarding |
Deletes an application configuration rule. |
|
appconfig delete <row_id> |
|||
|
|
||
44 |
vpn sslvpn portforwarding |
Sslvpn portforwarding host configuration |
|
hostconfig |
commands. |
||
|
|||
45 |
vpn sslvpn portforwarding |
Adds a host configuration rule. |
|
hostconfig add |
|||
|
|
||
46 |
vpn sslvpn portforwarding |
Deletes a host configuration rule. |
|
hostconfig delete <row_id> |
|||
|
|
||
47 |
vpn sslvpn resource |
Sslvpn resource configuration commands. |
|
48 |
vpn sslvpn resource add |
Adds an sslvpn resource. |
|
49 |
vpn sslvpn resource |
Configures an sslvpn resource. |
|
configure |
|||
|
|
||
|
vpn sslvpn resource |
|
|
50 |
configure |
Adds an sslvpn resource object. |
|
|
add <resource_name> |
|
|
51 |
vpn sslvpn resource |
Deletes an sslvpn resource object. |
|
configure delete <row_id> |
|||
|
|
||
52 |
vpn sslvpn resource |
Deletes an sslvpn resource. |
|
delete <row_id> |
|||
|
|
||
53 |
vpn sslvpn policy |
Sslvpn policy configuration commands. |
|
54 |
vpn sslvpn policy add |
Adds an sslvpn policy. |
|
55 |
vpn sslvpn policy |
Edits an sslvpn policy. |
|
edit <row_id> |
|||
|
|
||
56 |
vpn sslvpn policy |
Deletes an sslvpn policy. |
|
delete <row_id> |
|||
|
|
||
57 |
vpn sslvpn client |
Sslvpn client configuration commands. |
|
58 |
vpn sslvpn route |
Sslvpn route configuration commands. |
|
59 |
vpn sslvpn route add |
Adds sslvpn client route. |
|
60 |
vpn sslvpn route |
Deletes sslvpn client route. |
|
delete <row_id> |
|||
|
|
||
61 |
vpn ipsec |
Vpn policy mode. |
|
62 |
vpn ipsec policy |
Vpn policy mode. |
|
63 |
vpn ipsec policy |
Vpn policy configuration mode. |
|
configure <name> |
|||
|
|
||
64 |
vpn ipsec dhcp |
Vpn ipsec over dhcp mode. |
|
65 |
vpn ipsec dhcp configure |
vpn dhcp over ipsec policy configuration mode |
|
66 |
vpn ipsec policy |
Enables a vpn policy. |
|
enable <name> |
|||
|
|
||
67 |
vpn ipsec policy |
Disables a vpn policy. |
|
disable <name> |
|||
|
|
30