This appendix contains a categorized listing of Command Line Interface (CLI) commands for SonicOS Enhanced firmware. Each command is described, and where appropriate, an example of usage is included.
This appendix contains the following sections:
The table below describes the data formats acceptable for most commands. H represents one or more hexadecimal digit (0-9 and A-F). D represents one or more decimal digit.
Table 4
|
Bold text indicates a command executed by interacting with the user interface.
Note
|
Though a command string may be displayed on multiple lines in this guide, it must be
entered on a single line with no carriage returns except at the end of the complete command.
|
You can use individual keys and control-key combinations to assist you with the CLI. The table below describes the key and control-key combination functions.
Table 5
|
Most configuration commands require completing all fields in the command. For commands with several possible completing commands, the Tab or ? key display all options.
The Tab key can also be used to finish a command if the command is uniquely identified by user input.
myDevice> show al [TAB]
Additionally, commands can be abbreviated as long as the partial commands are unique. The following text:
myDevice> sho int inf
The CLI configuration manager allows you to control hardware and firmware of the appliance through a discreet mode and submode system. The commands for the appliance fit into the logical hierarchy shown below.
To configure items in a submode, activate the submode by entering a command in the mode above it.
For example, to set the default LAN interface speed or duplex, you must first enter configure , then interface x0 lan . To return to the higher Configuration mode, simply enter end or finished .
SonicWALL Internet Security appliances allow easy, flexible configuration without compromising the security of their configuration or your network.
The SonicWALL CLI currently uses the administrator’s password to obtain access. SonicWALL devices are shipped with a default password of password . Setting passwords is important in order to access the SonicWALL and configure it over a network.
If you are unable to connect to your device over the network, you can use the command restore to reset the device to factory defaults during a serial configuration session.
You can configure the SonicWALL appliance using one of three methods:
–
|
In IP address must have been assigned to the appliance for management or use the
default of 192.168.168.168.
|
Serial Management and IP Address Assignment
Follow the steps below to initiate a management session via a serial connection and set an IP address for the device.
Note
|
The default terminal settings on the SonicWALL and modules is 80 columns by 25 lines. To
ensure the best display and reduce the chance of graphic anomalies, use the same settings with
the serial terminal software. The device terminal settings can be changed, if necessary. Use the
standard ANSI setting on the serial terminal software.
|
1.
|
Attach the included null modem cable to the appliance port marked
CONSOLE
. Attach the other end of the null modem cable to a serial port on the configuring computer.
|
2.
|
Launch any terminal emulation application that communicates with the serial port
connected to the appliance. Use these settings:
|
3.
|
Initiating an SSH Management Session via Ethernet
Note
|
This option works for customers administering a device that does not have a cable for
console access to the CLI.
|
Follow the steps below to initiate an SSH management session through an Ethernet connection from a client to the appliance.
1.
|
Attach an Ethernet cable to the interface port marked
XO
. Attach the other end of the Ethernet cable to an Ethernet port on the configuring computer.
|
2.
|
Launch any terminal emulation application (such as PuTTY) that communicates via the
Ethernet interface connected to the appliance.
|
3.
|
Within the emulation application, enter the
IP destination address
for the appliance and enter 22
as the port number.
|
4.
|
Select
SSH
as the connection type and open a connection.
|
When the connection is established, log in to the security appliance:
1.
|
At the
User
prompt enter the Admin’s username. Only the admin user will be able to login from the CLI. The default Admin username is admin
. The default can be changed.
|
2.
|
At the
Password
prompt, enter the Admin’s password. If an invalid or mismatched username or password is entered, the CLI prompt will return to User
:, and a “CLI administrator login denied due to bad credentials” error message will be logged. There is no lockout facility on the CLI.
|
The following section displays all commands available for the SonicWALL:
Table 6
|
Table 7
|
Allows configuration of access rules
between one zone and another
|
||
<
add>
commands
|
||
Sets the action to allow, deny, or
discard an access rule
|
||
Allows configuration of advanced
access rule settings
|
||
[
no]
allow-fragments
|
Allows/Disallows fragmented packets
to be transferred
|
|
Allows administrators to record
comments related to this access rule
|
||
Configures an address object
destination for an access rule
|
||
[
no]
logging
|
||
Configures maximum number of
connections in a pool
|
||
Sets 802.1p Ethernet packet header
markings
|
||
[
no]
reflexive
|
||
Configures the schedule object for an
access rule
|
||
Configures the service object for an
access rule
|
||
Configures an address object source
for an access rule
|
||
Configures the user object for an
access rule
|
||
Displays one access rule whose index
matches the specified value input. If
index is not available, all access rules
in the current zone to zone context will
display
|
||
<
modify>
commands
|
||
<
index>
|
||
Modifies an allow, deny, or discard
action relating to a specific access rule
|
||
[
no]
allow-fragments
|
Modifies whether fragmented packets
are to be transferred
|
|
Modifies the destination address object
for a specific access rule
|
||
Displays current or modifying access
rule settings
|
||
[
no]
logging
|
Modifies whether packet logging is
enabled for a specific access rule
|
|
Modifies DSCP packet header
markings
|
||
Modifies 802.1p Ethernet packet
header markings
|
||
Modifies maximum number of
connections in a pool
|
||
Modifies a schedule object connected
to an access rule
|
||
Modifies the service object connected
to an access rule
|
||
Modifies the source address object
connected to an access rule
|
||
Modifies the user-object connected
with an access rule
|
||
Displays all currently configured
access rules
|
||
Exits to top-level menu and cancels
changes where needed
|
||
Exits to top-level and applies changes
where needed
|
||
Configures the host IP address for the
specific address object
|
||
Displays current address group
configuration
|
||
Configures network subnet and
netmask
|
||
Defines address range for the address
group or address object
|
||
Configures a zone for the specified
address object or group
|
||
Adds or removes arp entries for
specified interface(s)
|
||
<
gms>
|
||
set the 16-hex/48-hex encryption key
to communicate with the GMS server
|
||
Sets the public NAT IP address that the
GMS server resides behind
|
||
Enables or disables the High
Availability function
|
||
Accesses sub-commands to configure
NAT policies
|
||
<
add>
commands
|
||
Sets the translated source object for
this policy
|
||
Sets the original destination source
object for this policy
|
||
Sets the translated service name for
this policy
|
||
[
no]
enable
|
Enables/Disables a NAT policy once it
has been created
|
|
[
no]
reflexive
|
Creates/Removes a reflexive NAT
policy once it has been saved
|
|
Allows administrator to leave
comments relating to a NAT policy
|
||
Displays currently configured NAT
element settings
|
||
<
delete>
commands
|
||
<
modify>
commands
|
||
<
item-number>
|
||
[
no]
enable
|
||
Modifies the original source object for
this policy
|
||
Modifies the translated source object
for this policy
|
||
Modifies the original destination
address object for this policy
|
||
Modifies the translated destination-
address object for this policy
|
||
Configures the Advanced Routing
Suite for the NSM module
|
||
Configures the Advanced Routing
Suite for the OSPF module
|
||
Configures the Advanced Routing
Suite for the RIP module
|
||
Accesses sub-commands to configure
individual services
|
||
<
add>
commands
|
||
<
service name>
|
Allows configuration of a new service
type to be associated to the appliance
|
|
<
group name>
|
Allows configuration of a new service
group name
|
|
Allows/Removes configuration of
service type
|
||
Allows additional values to be added
for the specific service
|
||
<
delete>
commands
|
||
<
group name>
|
||
<
service name>
|
||
<
modify>
commands
|
||
<
service name>
|
||
<
group name>
|
Modifies the name of a specified
service group
|
|
[
info]
|
Optional, displays service values for
service name, protocol, and port range
|
|
<
sonicpoint>
|
<
string>
|
|
Sets applicable country code for a
SonicPoint
|
||
[
no]
delete
|
Deletes an operational SonicPoint from
a deployment
|
|
[
no]
enable
|
Enables or disables a configured
SonicPoint
|
|
Exits to top-level and applies changes
where needed
|
||
Displays information on a specific
SonicPoint
|
||
[
no]
radio-a enable
|
Enables or disables 802.11a radio
band wireless connections
|
|
Adds a specific MAC address to the
Access Control List (ACL) to allow
802.11a radio band wireless
connections to a SonicPoint
|
||
Adds a specific MAC address to the
denied Access Control List, preventing
802.11a radio band wireless
connections to a SonicPoint
|
||
[
no]
radio-acl enable
|
Enables or disables the Access Control
List feature on 802.11a radio
|
|
Sets 802.11a radio ACL to allow list
object handle
|
||
Sets the radio channel the SonicPoint
will operate on
|
||
Sets the data rate at which data is
transmitted and received to either the
best possible rate, or a specified rate
|
||
Sets 802.11a radio DTIM, which is the
numbers of beacon frames that must
occur before the radio sends buffered
multicast frames
|
||
[
no]
radio-a hide-ssid
|
||
Sets the on/off schedule string for
802.11a radio
|
||
Sets a convenient time to schedule an
Intrusion Detection Scan (IDS)
|
||
Sets Service Set Identifier (SSID)
identifying a particular SonicPoint
|
||
Sets Transmit Power Control level
strength
|
||
Sets the 802.11a radio WEP key value
for each encryption key slot
|
||
Sets WEP key mode, establishing
character length of encryption
|
||
Sets the cipher type system used by
the WPA to either AES, AUTO, or TKIP
|
||
Sets the length of time between
re-keying the WPA key
|
||
Sets WiFi Protected Access
Pre-shared key passphrase
|
||
[
no]
radio-g enable
|
Enables or disables 802.11g radio
band wireless connections
|
|
[
no]
radio-g acl enable
|
||
Adds a specific MAC address to the
Access Control List (ACL) to allow
802.11g radio band wireless
connections to a SonicPoint
|
||
Adds a specific MAC address to the
denied Access Control List, preventing
802.11g radio band wireless
connections to a SonicPoint
|
||
Sets 802.11g radio ACL to allow list
object handle
|
||
Sets which antenna the SonicPoint
uses to send and receive data
|
||
radio-g datarate
<
b1|
b11|
b2|
b5|
best|
g1|
g11|
g12|
g18|
g2|
g24|
g36|
g48|
g5|
g54|
g6|
g9|
super108|
super12|
super18|
super24|
super36|
super48|
super72|
super96>
|
Sets the data rate at which data is
transmitted and received
|
|
Sets 802.11g radio DTIM, which is the
numbers of beacon frames that must
occur before the radio sends buffered
multicast frames
|
||
[
no]
radio-g g-only
|
||
[
no]
radio-g hide-ssid
|
||
[
no]
radio-g preamble-long
|
||
Sets the speed for CTS or RTS
protection
|
||
Sets Service Set Identifier identifying a
particular SonicPoint
|
||
Sets the on/off schedule string for
802.11g radio
|
||
Sets a convenient time to schedule an
Intrusion Detection Scan (IDS)
|
||
[
no]
radio-g short-slot
|
Allows clients to disassociate and
re-associate more quickly
|
|
Sets the IP address location of the
RADIUS authentication server
|
||
Sets the port for authentication through
the RADIUS server
|
||
Sets the secret passcode for the
RADIUS authentication server
|
||
Sets the IP address for the backup
RADIUS authentication server
|
||
Sets the port for authentication through
the backup RADIUS server
|
||
Sets the secret passcode for the
backup RADIUS authentication server
|
||
Enables SSH management for the
specified interface
|
||
Assigns the SSH port or resets to the
default port
|
||
Restores SSH management settings to
defaults
|
||
Stops all SSH sessions, disables all
SSH management, and resets the port
|
||
Configures or modifies SSL VPN
client settings
|
||
Configures or modifies SSL VPN
settings
|
||
Exits to top-level menu and cancels
changes where needed
|
||
Enable or disable translation of the
local and/or remote networks
communicating with this VPN tunnel
|
||
[
no]
advanced auto-add-rule
|
Enables or disables the auto-add
access rule
|
|
advanced bound-to
interface <interface>
|
||
advanced bound-to zone
<zone>
|
||
[
no]
advanced default-lan-gw <ip address>
|
Sets the default LAN domain gateway
for VPN tunnel traffic
|
|
[
no]
advanced keepalive
|
||
[
no]
advanced management http
|
||
[
no]
advanced management https
|
||
[
no]
advanced multicast
|
Enables IP multicasting traffic to pass
through the VPN tunnel
|
|
[
no]
advanced netbios
|
Enables or disables Windows
Networking (NetBIOS) Broadcast
|
|
Configures or removes the specified
user group for XAUTH users
|
||
[
no]
advanced user-login http
|
Enables or disables required user login
through HTTP
|
|
[
no]
advanced user-login https
|
Enables or disables required user login
through HTTPS
|
|
Exits to top-level and applies changes
where needed
|
||
Sets the name and IP address of the
local connection
|
||
Sets the name and IP address of the
remote connection
|
||
Sets a local network for the VPN
tunnel, or configures the network to
obtain IP addresses using DHCP
|
||
proposal ike
[<
main|
aggressive|
ikev2>]
[
encr <
des|
triple-des|
aes-128|
aes-192|
aes-256>]
[
auth <
md5|
sha1>]
[
dh <
1|
2|
5>]
[
lifetime <
seconds>]
|
Sets the desired IKE encryption suite
configurations for VPN tunnel traffic
|
|
proposal ipsec
[<
esp|
ah>]
[
encr <
des|
triple-des|
aes-128|
aes-192|
aes-256>]
[
auth <
md5|
sha1>]
[
dh <
1|
2|
5>] [
lifetime <
seconds>]
|
||
Sets the secondary gateway’s IP
address
|
||
Exits to top-level menu and cancels
changes where needed
|
||
Enable or disable translation of the
local and/or remote networks
communicating with this VPN tunnel
|
||
[
no]
advanced auto-add-rule
|
Enables or disables the auto-add
access rule
|
|
advanced bound-to
interface <interface>
|
||
advanced bound-to zone
<zone>
|
||
[
no]
advanced keepalive
|
||
[
no]
advanced management http
|
||
[
no]
advanced managment https
|
||
[
no]
advanced multicast
|
Enables IP multicasting traffic to pass
through the VPN tunnel
|
|
[
no]
advanced netbios
|
Enables or disables Windows
Networking (NetBIOS) Broadcast
|
|
Configures or removes the specified
user group for XAUTH users
|
||
[
no]
advanced user-login http
|
Enables or disables required user login
through HTTP
|
|
[
no]
advanced user-login https
|
Enables or disables required user login
through HTTPS
|
|
Exits to top-level and applies changes
where needed
|
||
Sets a local network for the VPN
tunnel, or configures the network to
obtain IP addresses using DHCP
|
||
proposal ipsec
[<
esp|
ah>]
[
encr <
des|
triple-des|
aes-128|
aes-192|
aes-256>]
[
auth <
md5|
sha1>]
[
dh <
1|
2|
5>]
[
lifetime <
seconds>]
|
Sets encryption settings for IPSec
proposal
|
|
sa
[
in-spi <
Incoming SPI>]
[
out-spi <
Outgoing SPI>]
[
encr-key <
Encryption Key>]
[
auth-key <
Authentication Key>]
|
Sets hexidecimal incoming and
outgoing Security Parameter Index
(SPI) to allow the SonicWALL to
uniquely identify all security
associations
|
|
Exits to top-level menu and cancels
changes where needed
|
||
[
no]
advanced apply-nat
|
Enable or disable translation of the
local and/or remote networks
communicating with this VPN tunnel
|
|
[
no]
advanced auto-add-rule
|
Enables or disables the auto-add
access rule
|
|
Sets the default LAN gateway for VPN
tunnel traffic
|
||
[
no]
advanced keepalive
|
||
[
no]
advanced management http
|
||
[
no]
advanced managment https
|
||
[
no]
advanced multicast
|
Enables IP multicasting traffic to pass
through the VPN tunnel
|
|
[
no]
advanced netbios
|
Enables or disables Windows
Networking (NetBIOS) Broadcast
|
|
Enables use of Online Certificate
Status Protocol (OCSP) to check VPN
certificate status and specifies the URL
where to check the certificate status
|
||
Configures or removes the specified
user group for XAUTH users
|
||
[
no]
advanced user-login http
|
Enables or disables required user login
through HTTP
|
|
[
no]
advanced user-login https
|
Enables or disables required user login
through HTTPS
|
|
Exits to top-level and applies changes
where needed
|
||
Sets a local network for the VPN
tunnel, or configures the network to
obtain IP addresses using DHCP
|
||
proposal ike
[<
main|
aggressive|
ikev2>]
[encr <
des|
triple-des|
aes-128|
aes-192|
aes-256>]
[
auth <
md5|
sha1>]
[
dh <
1|
2|
5>]
[
lifetime <
seconds>]
|
Sets the desired IKE encryption suite
configurations for VPN tunnel traffic
|
|
proposal ipsec
[<
esp|
ah>]
[
encr <
des|
triple-des|
aes-128|
aes-192|
aes-256>]
[
auth <
md5|
sha1>]
[
dh <
1|
2|
5>]
[
lifetime <
seconds>]
|
Sets encryption settings for IPSec
proposal
|
|
Sets the secondary gateway’s IP
address
|
||
Exits to top-level menu without
applying changes
|
||
[
no]
auto-update
|
Enables/Disables auto-update which
assists users in updating their NetEx
tender client when a newer version is
required to establish a connection
|
|
Exits from menu without applying
changes
|
||
[
no]
client-communicate
|
Enables/Disables traffic between hosts
connecting to server with NetExtender
|
|
[
no]
create-connection-profile
|
Enables/Disables NetExtender client’s
ability to create a connection profiles
|
|
Sets the DNS domain which is the
NetExtender client DNS-specific suffix
|
||
[
no]
exit-after-disconnect
|
||
Exits to top-level and applies changes
where needed
|
||
Displays available sub-commands for
SSL VPN client configuration
|
||
[
no]
uninstall-after-exit
|
Enables/Disables automatic uninstall
of NetExtender clients after exit
|
|
Sets the user domain to which all SSL
VPN users belong
|
||
Sets the primary WINS server IP
address
|
||
Exits to top-level menu without
applying changes
|
||
[
no]
auto-launch
|
||
[
no]
cache-control
|
||
Exits the menu without applying
changes
|
||
Sets a customized logo to be used on
the portal page. The URL entered must
be valid and reachable by the unit.
|
||
[
no]
default-logo
|
Enables/Disables the use of the default
SonicWALL logo on the portal page
|
|
[
no]
display-cert
|
||
Displays available subcommands for
SSL VPN portal settings
|
||
Displays current SSL VPN portal
settings
|
||
Sets the portal HTML page title that
displays in the browser window’s title
|
||
Exits to top-level menu without
applying changes
|
||
Adds an address object as a client
route entry
|
||
Exits from menu without applying
changes
|
||
Deletes specified SSL VPN client route
entry, identified as an address object
|
||
Displays available subcommands for
SSL VPN client routes settings
|
||
[
no]
tunnel-all
|
Enables/Disables tunnel all mode
which configures the NetExtender
client to tunnel all traffic over the SSL
VPN connection
|
|
[
no]
web-management otp enable
|
Configures one-time password for VPN
user access to the appliance
|
Table 8
|
[no] https-redirect
enable
|
Enables or disables https redirect on
the interface
|
|
Displays the configuration of all
interfaces
|
||
[no] user-login
<http|https>
|
Configures user-login protocol for the
interface
|
|
Table 9
|
This section describes how to create a VPN policy using the Command Line Interface. The examples used are a SonicWALL TZ 170 appliance with SonicOS Enhanced 3.2 firmware. You can configure all of the parameters using the CLI, and enable the VPN without using the Web management interface.
1.
|
•
|
3.
|
You may need to hit return two to three times to get to a command prompt, which will look
similar to the following:
|
If you have used any other CLI, such as Unix shell or Cisco IOS, this process should be relatively easy and similar. It has auto-complete so you do not have to type in the entire command.
4.
|
When a you need to make a configuration change, you should be in configure mode. To
enter configure mode, type configure.
|
The command prompt changes and adds the word config to distinguish it from the normal mode. Now you can configure all the settings, enable and disable the VPNs, and configure the firewall.
In this example, a site-to-site VPN is configured between two TZ 170 appliance, with the following settings:
Local TZ 170 (home):
WAN IP: 10.50.31.150
LAN subnet: 192.168.61.0
Mask 255.255.255.0
Remote TZ 170 (office):
WAN IP: 10.50.31.104
LAN subnet: 192.168.15.0
Mask: 255.255.255.0
Authentication Method: IKE using a Pre-Shared Key
Phase 1 Exchange: Main Mode
Phase 1 Encryption: 3DES
Phase 1 Authentication SHA1
Phase 1 DH group: 2
Phase 1 Lifetime: 28800
Phase 2 Protocol: ESP
Phase 2 Encryption: 3DES
Phase 2 Authentication: SHA1
Phase 2 Lifetime: 28800
No PFS
1.
|
In configure mode, create an
address object
for the remote network, specifying the name
, zone assignment
, type
, and address
. In this example, we use the name OfficeLAN
:
|
(config[TZ170]> address-object Office LAN
(config-address-object[OfficeLAN])>
(config-address-object[OfficeLAN])> zone VPN
(config-address-object[OfficeLAN])> network 192.168.15.0
255.255.255.0
(config-address-object[OfficeLAN])> finished
2.
|
To display the address object, type the command
show address-object [name]
:
|
TZ170 > show address-object OfficeLAN
The output will be similar to the following:
address-object OfficeLAN
network 192.168.15.0 255.255.255.0
zone VPN
(config[TZ170])> vpn policy OfficeVPN pre-shared
(config-vpn[OfficeVPN])>
Note
|
The prompt has changed to indicate the configuration mode for the VPN policy. All the
settings regarding this VPN will be entered here.
|
(config-vpn[OfficeVPN])> pre-shared-secret sonicwall
(config-vpn[OfficeVPN])> gw ip-address 10.50.31.104
(config-vpn[OfficeVPN])> network local address-object "LAN Primary
Subnet"
(config-vpn[OfficeVPN])> network remote address-object "OfficeLAN"
(config-vpn[OfficeVPN])> proposal ike main encr triple-des auth sha1
dh 2 lifetime 28800
(config-vpn[OfficeVPN])> proposal ipsec esp encr triple-des auth
sha1 dh no lifetime 28800
(config-vpn[OfficeVPN])> advanced keepalive
(config[TZ170])> vpn enable "OfficeVPN"
(config-vpn[OfficeVPN])> finished
(config[TZ170])>
The configuration is complete.
Use the following steps to configure the VPN policies.
1.
|
To view a list of all the configured VPN policies, type the command show vpn policy. The
output will be similar to the following:
|
(config[TZ170])> show vpn policy
Policy: WAN GroupVPN (Disabled)
Key Mode: Pre-shared
Pre Shared Secret: DE65AD2228EED75A
Proposals:
IKE: Aggressive Mode, 3DES SHA, DH Group 2, 28800 seconds
IPSEC: ESP, 3DES SHA, No PFS, 28800 seconds
Advanced:
Allow NetBIOS OFF, Allow Multicast OFF
Management: HTTP OFF, HTTPS OFF
Lan Default GW: 0.0.0.0
Require XAUTH: ON, User Group: Trusted Users
Client:
Cache XAUTH Settings: Never
Virtual Adapter Settings: None
Allow Connections To: Split Tunnels
Set Default Route OFF, Apply VPN Access Control List OFF
Require GSC OFF
Use Default Key OFF
Policy: OfficeVPN (Enabled)
Key Mode: Pre-shared
Primary GW: 10.50.31.104
Secondary GW: 0.0.0.0
Pre Shared Secret: sonicwall
IKE ID:
Local: IP Address
Peer: IP Address
Network:
Local: LAN Primary Subnet
Remote: OfficeLAN
Proposals:
IKE: Main Mode, 3DES SHA, DH Group 2, 28800 seconds
IPSEC: ESP, 3DES SHA, No PFS, 28800 seconds
Advanced:
Keepalive ON, Add Auto-Rule ON, Allow NetBIOS OFF
Allow Multicast OFF
Management: HTTP ON, HTTPS ON
User Login: HTTP ON, HTTPS ON
Lan Default GW: 0.0.0.0
Require XAUTH: OFF
Bound To: Zone WAN
2.
|
(config[TZ170])> show vpn policy "OfficeVPN"
The output will be similar to the following:
Policy: OfficeVPN (Enabled)
Key Mode: Pre-shared
Primary GW: 10.50.31.104
Secondary GW: 0.0.0.0
Pre Shared Secret: sonicwall
IKE ID:
Local: IP Address
Peer: IP Address
Network:
Local: LAN Primary Subnet
Remote: OfficeLAN
Proposals:
IKE: Main Mode, 3DES SHA, DH Group 2, 28800 seconds
IPSEC: ESP, 3DES SHA, No PFS, 28800 seconds
Advanced:
Keepalive ON, Add Auto-Rule ON, Allow NetBIOS OFF
Allow Multicast OFF
Management: HTTP ON, HTTPS ON
User Login: HTTP ON, HTTPS ON
Lan Default GW: 0.0.0.0
Require XAUTH: OFF
Bound To: Zone WAN
3. Type the command show vpn sa “name” to see the active SA:
(config[TZ170])> show vpn sa "OfficeVPN"
Policy: OfficeVPN
IKE SAs
GW: 10.50.31.150:500 --> 10.50.31.104:500
Main Mode, 3DES SHA, DH Group 2, Responder
Cookie: 0x0ac298b6328a670b (I), 0x28d5eec544c63690 (R)
Lifetime: 28800 seconds (28783 seconds remaining)
GW: 10.50.31.150:500 --> 10.50.31.104:500
(192.168.61.0 - 192.168.61.255) --> (192.168.15.0 - 192.168.15.255)
ESP, 3DES SHA, In SPI 0xed63174f, Out SPI 0x5092a0b2
Lifetime: 28800 seconds (28783 seconds remaining)
The following section includes commands for the NetExtender Windows Client CLI (NEClient.exe):
-s server
-u user name
-p password
-d domain name
-clientcertificatethumb thumb(when server need client
certificate)
-clientcertificatename name(when server need client
certificate)
disconnect
createprofile [OPTIONS]
-s server
-u user name(optional)
-p password(optional)
-d domain name
-s server(optional)
-d domain(optional)
-u username(optional)
-s server
-d domain
-u username
showstatus
setproxy [OPTIONS]
-t 1 automatic detect setting; 2 configuration script;
3 proxy server
-s proxy address/URL of automatic configuration script
-o port
-u user name
-p password
-b bypass proxy
-save
queryproxy
reconnect
viewlog
-profile
servername: connect to server directly when password has been saved
NECLI connect -s 10.103.62.208 -d LocalDomain -u admin -p
password
NECLI connect -s 10.103.62.208 -d LocalDomain -u admin -p
password - clientcertificatethumb
cf3d20378ba7f2d9a79c536e230a2495d4a46734
NECLI connect -s 10.103.62.208 -d LocalDomain -u admin -p
password - clientcertificatename "Admin"
NECLI createprofile -s 10.103.62.208 -d LocalDomain -u admin
NECLI displayprofile -s 10.103.62.208
NECLI deleteprofile -s 10.103.62.208 -d LocalDomain -u admin
NECLI -t 3 -s 10.103.62.201 -o 808 -u user1 -p password -b
10.103.62.101;10.103.62.102
The following section includes the Mac and Linux CLI version, which is similar to the NetExtender Windows Client CLI in the previous section:
Usage: netExtender [OPTIONS] server[:port]
-u user
-p password
-d domain
-t timeout Login timeout in seconds, default is 30 sec.
-e encryption Encryption cipher to use. To see list use -e -h.
-m Use this option to not add remote routes.
-r filename Generate a diagnostic report.
-v Display NetExtender version information.
-h Display this usage information.
server: Specify the server either in FQDN or IP address.
The default port for server is 443 if not specified.
netExtender -u u1 -p p1 -d LocalDomain sslvpn.company.com
[root@linux]# netExtender -u demo sslvpn.demo.sonicwall.com
SUSE/Ubuntu compatibility mode off
User Access Authentication
Password:
Domain: Active Directory
Connecting to SSL-VPN Server "sslvpn.demo.sonicwall.com:443". . .
Connected.
Logging in...
Login successful.
Using SSL Encryption Cipher 'DHE-RSA-AES256-SHA'
Using new PPP frame encoding mechanism
You now have access to the following 5 remote networks:
NetExtender connected successfully. Type "Ctrl-c" to disconnect...
Disconnecting NetExtender...
Terminating pppd.......
SSL-VPN logging out...
SSL-VPN connection is terminated.
Exiting NetExtender client.