CLIguide
Appendix A: CLI Guide
This appendix contains a categorized listing of Command Line Interface (CLI) commands for SonicOS Enhanced firmware. Each command is described, and where appropriate, an example of usage is included.
This appendix contains the following sections:
Input Data Format Specification
The table below describes the data formats acceptable for most commands. H represents one or more hexadecimal digit (0-9 and A-F). D represents one or more decimal digit.
Table 4 Input Data Formats
Text Conventions
Bold text indicates a command executed by interacting with the user interface.
Courier bold text indicates commands and text entered using the CLI.Italic text indicates the first occurrence of a new term, as well as a book title, and also emphasized text. In this command summary, items presented in italics represent user-specified information.
Note Though a command string may be displayed on multiple lines in this guide, it must be entered on a single line with no carriage returns except at the end of the complete command. Editing and Completion Features
You can use individual keys and control-key combinations to assist you with the CLI. The table below describes the key and control-key combination functions.
Table 5 Key Reference
Displays the previous command in the com mand history Displays the previous command in the com mand historyMost configuration commands require completing all fields in the command. For commands with several possible completing commands, the Tab or ? key display all options.
security-
servicesThe Tab key can also be used to finish a command if the command is uniquely identified by user input.
myDevice> show al [TAB]
Additionally, commands can be abbreviated as long as the partial commands are unique. The following text:
myDevice> sho int inf
myDevice> show interface infoCommand Hierarchy
The CLI configuration manager allows you to control hardware and firmware of the appliance through a discreet mode and submode system. The commands for the appliance fit into the logical hierarchy shown below.
To configure items in a submode, activate the submode by entering a command in the mode above it.
For example, to set the default LAN interface speed or duplex, you must first enter configure , then interface x0 lan . To return to the higher Configuration mode, simply enter end or finished .
Configuration Security
ADTRAN Internet Security appliances allow easy, flexible configuration without compromising the security of their configuration or your network.
Passwords
The ADTRAN CLI currently uses the administrator’s password to obtain access. ADTRAN devices are shipped with a default password of password . Setting passwords is important in order to access the ADTRAN and configure it over a network.
Factory Reset to Defaults
If you are unable to connect to your device over the network, you can use the command restore to reset the device to factory defaults during a serial configuration session.
Management Methods for the firewall
You can configure the ADTRAN appliance using one of three methods:
– In IP address must have been assigned to the appliance for management or use the default of 192.168.168.168. Initiating a Management Session using the CLI
Serial Management and IP Address Assignment
Follow the steps below to initiate a management session via a serial connection and set an IP address for the device.
Note The default terminal settings on the ADTRAN and modules is 80 columns by 25 lines. To ensure the best display and reduce the chance of graphic anomalies, use the same settings with the serial terminal software. The device terminal settings can be changed, if necessary. Use the standard ANSI setting on the serial terminal software.
1. Attach the included null modem cable to the appliance port marked CONSOLE . Attach the other end of the null modem cable to a serial port on the configuring computer.
2. Launch any terminal emulation application that communicates with the serial port connected to the appliance. Use these settings:
3. Press Enter/Return . Initial information is displayed followed by a DEVICE NAME> prompt. Initiating an SSH Management Session via Ethernet
Note This option works for customers administering a device that does not have a cable for console access to the CLI. Follow the steps below to initiate an SSH management session through an Ethernet connection from a client to the appliance.
1. Attach an Ethernet cable to the interface port marked XO . Attach the other end of the Ethernet cable to an Ethernet port on the configuring computer.
2. Launch any terminal emulation application (such as PuTTY) that communicates via the Ethernet interface connected to the appliance.
3. Within the emulation application, enter the IP destination address for the appliance and enter 22 as the port number.
4. Select SSH as the connection type and open a connection. Logging in to the SonicOS CLI
When the connection is established, log in to the security appliance:
1. At the User prompt enter the Admin’s username. Only the admin user will be able to login from the CLI. The default Admin username is admin . The default can be changed.
2. At the Password prompt, enter the Admin’s password. If an invalid or mismatched username or password is entered, the CLI prompt will return to User :, and a “CLI administrator login denied due to bad credentials” error message will be logged. There is no lockout facility on the CLI. SonicOS Enhanced Command Listing
The following section displays all commands available for the ADTRAN:
Table 6 Top Level Commands
Table 7 Configure Level Commands
access-rules <from-zone> <to-zone> Allows configuration of access rules between one zone and another < add> commands action <allow|deny|discard> Sets the action to allow, deny, or discard an access rule Allows configuration of advanced access rule settings [ no] allow-fragments Allows/Disallows fragmented packets to be transferred comment <comments> Allows administrators to record comments related to this access rule destination <address object> Configures an address object destination for an access rule [ no] logging maxconns <percentage> Configures maximum number of connections in a pool qos dscp <none| preserve|explicit|map> [<arg>] qoa 802.1p <none| preserve|explicit|map> [<arg>] Sets 802.1p Ethernet packet header markings [ no] reflexive schedule <schedule object> Configures the schedule object for an access rule service <service object> Configures the service object for an access rule source <address object> Configures an address object source for an access rule tcptimeout <minutes> udptimeout <seconds> user <user object> Configures the user object for an access rule delete <index> list [<index>] Displays one access rule whose index matches the specified value input. If index is not available, all access rules in the current zone to zone context will display < modify> commands < index> action <allow|deny|discard> Modifies an allow, deny, or discard action relating to a specific access rule [ no] allow-fragments Modifies whether fragmented packets are to be transferred comment <comments> destination <address object> Modifies the destination address object for a specific access rule Displays current or modifying access rule settings [ no] logging Modifies whether packet logging is enabled for a specific access rule qos dscp <none| preserve|explicit|map> [<arg>] Modifies DSCP packet header markings qos 802.1p <none| preserve|explicit|map> [<arg>] Modifies 802.1p Ethernet packet header markings maxconns <percentage> Modifies maximum number of connections in a pool schedule <schedule object> Modifies a schedule object connected to an access rule service <service object> Modifies the service object connected to an access rule source <address object> Modifies the source address object connected to an access rule tcptimeout <minutes> udptimeout <seconds> user <user object> Modifies the user-object connected with an access rule Displays all currently configured access rules Exits to top-level menu and cancels changes where needed [ no] address-object <object name> [ no] address-group <group name> Exits to top-level and applies changes where needed host <ip address> Configures the host IP address for the specific address object Displays current address group configuration network <subnet> <netmask> Configures network subnet and netmask range <begin-address> <end address> Defines address range for the address group or address object zone <zone name> Configures a zone for the specified address object or group [ no ] arp < ip address > < MAC address > interface < lan | wan | dmz >[ perm ][ pub ] Adds or removes arp entries for specified interface(s) < gms> algorithm < des-md5 | frd3- sha > Sets GMS encryption and authentica tion algorithm [ no ] authentication-key < hex key > Sets the 32-hex or 40-hex authentica tion key to communicate with the GMS server [ no ] behind-nat bound-interface < x1 | x2 | x3 | x4 | x5 > [ no ] enable Enables GMS management on a ADTRAN encryption-key < hex key > set the 16-hex/48-hex encryption key to communicate with the GMS server help < command > [ no ] nat-address < IP Address > Sets the public NAT IP address that the GMS server resides behind [ no ] over-vpn [ no ] send-heartbeat [ no ] server < IP Address > [ no ] standby-management- sa Enables the backup SA for GMS man agement syslog-port < uvalue | (default) > ha <disable|enable> Enables or disables the High Availability function Accesses sub-commands to configure NAT policies < add> commands orig-src <original source object> trans-src <translated source object> Sets the translated source object for this policy orig-dst <original destination source object> Sets the original destination source object for this policy orig-svc <original service name> trans-svc <translated service name> Sets the translated service name for this policy inbound-interface <inbound interface> outbound-interface <outbound interface> [ no] enable Enables/Disables a NAT policy once it has been created [ no] reflexive Creates/Removes a reflexive NAT policy once it has been saved comment <comments> Allows administrator to leave comments relating to a NAT policy Displays currently configured NAT element settings < delete> commands delete <item-number> < modify> commands < item-number> [ no] enable [ no] comment <comments> Allows administrator to modify com ments relating to a NAT policy orig-src <original source object> Modifies the original source object for this policy trans-src <translated source object> Modifies the translated source object for this policy orig-dst <original destination address object> Modifies the original destination address object for this policy trans-dst <translated destination address object> Modifies the translated destination- address object for this policy orig-svc <original service name> trans-svc <translated service name> inbound-interface <inbound interface> outbound-interface <outbound interface> Configures the Advanced Routing Suite for the NSM module Configures the Advanced Routing Suite for the OSPF module Configures the Advanced Routing Suite for the RIP module Accesses sub-commands to configure individual services < add> commands < service name> Allows configuration of a new service type to be associated to the appliance < group name> Allows configuration of a new service group name [ no] service <service name> Allows/Removes configuration of service type ip-type <ip type> port-begin <port> port-end <port> Allows additional values to be added for the specific service subtype <x> < delete> commands < group name> < service name> < modify> commands < service name> < group name> Modifies the name of a specified service group ip-type <ip type> port-begin <port> port-end <port> [ no] service <service name} subtype <x> [ info] Optional, displays service values for service name, protocol, and port range Enables SSH management for the specified interface Assigns the SSH port or resets to the default port Restores SSH management settings to defaults Stops all SSH sessions, disables all SSH management, and resets the port Configures or modifies SSL VPN client settings Configures or modifies SSL VPN settings timeout <minutes> [ no] vpn <enable|disable> <policy name> [ no] vpn policy <policy-name> [preshared| manual|cert] Exits to top-level menu and cancels changes where needed [ no] advanced apply-nat <local|remote> <translated address object> Enable or disable translation of the local and/or remote networks communicating with this VPN tunnel [ no] advanced auto-add-rule Enables or disables the auto-add access rule advanced bound-to interface <interface> advanced bound-to zone <zone> [ no] advanced default-lan-gw <ip address> Sets the default LAN domain gateway for VPN tunnel traffic [ no] advanced keepalive Enables or disables heartbeat messages between peers on this VPN tunnel [ no] advanced management http Enables or disables HTTP as the management method security association [ no] advanced management https Enables or disables HTTPS as the management method security association [ no] advanced multicast Enables IP multicasting traffic to pass through the VPN tunnel [ no] advanced netbios Enables or disables Windows Networking (NetBIOS) Broadcast [ no] advanced use-xauth <group-name> Configures or removes the specified user group for XAUTH users [ no] advanced user-login http Enables or disables required user login through HTTP [ no] advanced user-login https Enables or disables required user login through HTTPS Exits to top-level and applies changes where needed gw domain-name <domain name> gw ip-address <ip address> id local <domain-name|email address|ip-address|ADTRAN-id> <our id> Sets the name and IP address of the local connection id remote <domain name|email address|ip-address|ADTRAN-id> <their id> Sets the name and IP address of the remote connection network local <address-object> <address object string>|any|dhcp> Sets a local network for the VPN tunnel, or configures the network to obtain IP addresses using DHCP network remote <address- object<address object string>|any|dhcp> Sets a specific VPN tunnel as the default route for all incoming Internet traffic pre-shared-secret <string> proposal ike [<main|aggressive|ikev2>] [encr <des|triple-des|aes-128|aes-192|aes-256>] [auth <md5|sha1>] [dh <1|2|5>] [lifetime <seconds>] Sets the desired IKE encryption suite configurations for VPN tunnel traffic proposal ipsec [<esp|ah>] [encr <des|triple-des|aes-128|aes-192|aes-256>] [auth <md5|sha1>] [dh <1|2|5>] [lifetime <seconds>] sec-gw domain-name <domain name> sec-gw ip-address <ip address> Sets the secondary gateway’s IP address Exits to top-level menu and cancels changes where needed [ no] advanced apply-nat <local|remote> <translated address object> Enable or disable translation of the local and/or remote networks communicating with this VPN tunnel [ no] advanced auto-add-rule Enables or disables the auto-add access rule advanced bound-to interface <interface> advanced bound-to zone <zone> [ no] advanced keepalive Enables or disables heartbeat messages between peers on this VPN tunnel [ no] advanced management http Enables or disables HTTP as the management method security association [ no] advanced managment https Enables or disables HTTPS as the management method security association [ no] advanced multicast Enables IP multicasting traffic to pass through the VPN tunnel [ no] advanced netbios Enables or disables Windows Networking (NetBIOS) Broadcast [ no] advanced use-xauth <group name> Configures or removes the specified user group for XAUTH users [ no] advanced user-login http Enables or disables required user login through HTTP [ no] advanced user-login https Enables or disables required user login through HTTPS Exits to top-level and applies changes where needed gw domain-name <domain name> gw ip-address <ip address> network local <address object <address object string> | any> Sets a local network for the VPN tunnel, or configures the network to obtain IP addresses using DHCP network remote <address object <address object string> | any> Sets a specific VPN tunnel as the default route for all incoming Internet traffic proposal ipsec [<esp|ah>] [encr <des|triple-des|aes-128|aes-192|aes-256>] [auth <md5|sha1>] [dh <1|2|5>] [lifetime <seconds>] Sets encryption settings for IPSec proposal sa [in-spi <Incoming SPI>] [out-spi <Outgoing SPI>] [encr-key <Encryption Key>] [auth-key <Authentication Key>] Sets hexidecimal incoming and outgoing Security Parameter Index (SPI) to allow the ADTRAN to uniquely identify all security associations Exits to top-level menu and cancels changes where needed [ no] advanced apply-nat Enable or disable translation of the local and/or remote networks communicating with this VPN tunnel [ no] advanced auto-add-rule Enables or disables the auto-add access rule advanced bound-to inter face <interface> advanced bound-to zone <zone> [no ] advanced default-lan-gw <ip address> Sets the default LAN gateway for VPN tunnel traffic [ no] advanced keepalive Enables or disables heartbeat messages between peers on this VPN tunnel [ no] advanced management http Enables or disables HTTP as the management method security association [ no] advanced managment https Enables or disables HTTPS as the management method security association [ no] advanced multicast Enables IP multicasting traffic to pass through the VPN tunnel [ no] advanced netbios Enables or disables Windows Networking (NetBIOS) Broadcast [ no] advanced ocsp <url> Enables use of Online Certificate Status Protocol (OCSP) to check VPN certificate status and specifies the URL where to check the certificate status [ no] advanced use-xauth <group name> Configures or removes the specified user group for XAUTH users [ no] advanced user-login http Enables or disables required user login through HTTP [ no] advanced user-login https Enables or disables required user login through HTTPS cert <certname> Exits to top-level and applies changes where needed gw domain-name <domain name> gw ip-address <ip address> id remote <domain name | email address | distinguished name> <peer-id> network local <address object <address object string> | any> Sets a local network for the VPN tunnel, or configures the network to obtain IP addresses using DHCP network remote <address object <address object string> | any> Sets a specific VPN tunnel as the default route for all incoming Internet traffic proposal ike [<main|aggressive|ikev2>] [encr <des|triple-des|aes-128|aes-192|aes-256>] [auth <md5|sha1>] [dh <1|2|5>] [lifetime <seconds>] Sets the desired IKE encryption suite configurations for VPN tunnel traffic proposal ipsec [<esp|ah>] [encr <des|triple-des|aes-128|aes-192|aes-256>] [auth <md5|sha1>] [dh <1|2|5>] [lifetime <seconds>] Sets encryption settings for IPSec proposal sec-gw domain-name <domain name> sec-gw ip-address <ip address> Sets the secondary gateway’s IP address Exits to top-level menu without applying changes address <start ip address> <end ip address> <interface> Sets the global IP address pool from which NetExtender clients are assigned an IP address [ no] auto-update Enables/Disables auto-update which assists users in updating their NetEx tender client when a newer version is required to establish a connection cache-username-password <username-only | password-username | prohibit> Sets the user name and password cache policy used for the NetExtender client Exits from menu without applying changes [ no] client-communicate Enables/Disables traffic between hosts connecting to server with NetExtender [ no] create-connection-profile Enables/Disables NetExtender client’s ability to create a connection profiles dns-domain <DNS domain name> Sets the DNS domain which is the NetExtender client DNS-specific suffix dns1 <ip address> Sets the primary DNS server IP address to be used by all NetExtender clients dns2 <ip address> Sets the secondary DNS server IP address to be used by all NetExtender clients [ no] exit-after-disconnect Enables/Disables the forcing of a NetExtender client to exit after disconnecting from the server Exits to top-level and applies changes where needed Displays available sub-commands for SSL VPN client configuration sslvpn-access <LAN|WAN|DMZ|WLAN> [ no] uninstall-after-exit Enables/Disables automatic uninstall of NetExtender clients after exit user-domain <user domain name> Sets the user domain to which all SSL VPN users belong wins1 <ip address> Sets the primary WINS server IP address wins2 <ip address> Exits to top-level menu without applying changes [ no] auto-launch Enables/Disables automatic launch of NetExtender after a user logs into the portal banner-title <portal banner title name> Sets the portal banner title that displays next to the logo on the portal home page [ no] cache-control Enables/Disables the use of some HTML META tags to tell browser to cache UI files in portal pages Exits the menu without applying changes custom logo <url> Sets a customized logo to be used on the portal page. The URL entered must be valid and reachable by the unit. [ no] default-logo Enables/Disables the use of the default ADTRAN logo on the portal page [ no] display-cert Enables/Disables the display of the button to import the SSL VPN server certificate Displays available subcommands for SSL VPN portal settings Displays current SSL VPN portal settings site-title <portal site title name> Sets the portal HTML page title that displays in the browser window’s title Exits to top-level menu without applying changes add-routes <address object name> Adds an address object as a client route entry Exits from menu without applying changes delete-routes <address object name> Deletes specified SSL VPN client route entry, identified as an address object Exits SSL VPN client routes configura tion mode Displays available subcommands for SSL VPN client routes settings [ no] tunnel-all Enables/Disables tunnel all mode which configures the NetExtender client to tunnel all traffic over the SSL VPN connection [ no] web-management otp enable Configures one-time password for VPN user access to the appliance
Table 8 LAN Interface Configuration
interface < x0 | x1 | x2 | x3 | x4 | x5 > [< lan | wan | dmz >] Assigns zone and enters the configura tion mode for the interface comment < string > Adds comment as part of the port con figuration duplex < full | half > help < command > [no] https-redirect enable Enables or disables https redirect on the interface Displays the configuration of all interfaces [no] management <http|https|ping|snmmp|ss h> enable Enables or disables specified manage ment protocol on the interface [no] user-login <http|https> Configures user-login protocol for the interface < lan > help < command > ip < IP Address > netmask <mask> name < interface name > speed < 10 | 100 >
Table 9 WAN Interface Configuration
< wan > bandwidth-management enable bandwidth-management size < uvalue > comment < string > Adds comment as part of the port con figuration duplex < full | half > Enables/disables fragmentation of packets larger than the interface MTU Enables/disables ignoring the don’t fragment bit help < command > [ no] https-redirect enable Enables or disables https redirect on the interface [ no] management <http|https|ping|snmmp| ssh> enable Enables or disables specified manage ment protocol on the interface [ no] user-login <http|https> Configures user-login protocol for the interface mode < static | dhcp | pptp | l2tp | pppoe > Sets the mode for the WAN interface and enters the mode configuration Mode Static WAN Interface Configuration [ no ] dns < IP Address > gateway < IP Address > Sets or removes default gateway for the interface help < command > [ no ] ip < IP Address > Mode DHCP WAN Interface Configuration help < command > [ no ] hostname < string > Mode PPTP WAN Interface Configuration [ no ] dynamic Sets the ADTRAN to obtain the IP address dynamically help < command > [ no ] hostname < string > [ no ] inactivity timeout < uvalue > [ no ] ip < IP Address > Sets/Clears the IP address for the interface [ no ] password < quoted string > [ no ] server ip <IP Address > Sest/Clears the PPTP server IP address [ no ] username < string > L2TP WAN Configura tion Mode [ no ] dynamic Sets the ADTRAN to obtain the IP address dynamically help < command > [ no ] hostname < string > [ no ] inactivity timeout < uvalue > [ no ] ip < IP Address> Sets/Clears the IP address for the interface [ no ] password < quoted string > [ no ] server ip < IP Address > Sets/Clears the L2TP server IP address [ no ] username < string > mtu < uvalue > name < interface name > speed < 10 | 100 > Other Interface Configuration comment < string > Adds a comment as part of the force configuration duplex < full | half > help < command > name < interface name > speed < 10 | 100 > [no] log categories [ all ] Log Category Information [ no ] all [ no ] attack [ no ] blocked-code Assigns/clears blocked code logging category [ no ] blocked-sites Assigns/clears blocked sites logging category [no ] connection [ no ] conn-traffic [ no ] debug help < command > [ no ] icmp [no ] lan-icmp [ no ] lan-tcp [ no ] lan-udp [ no ] maintenance Assigns/clears maintenance logging category [ no ] mgmt-80211b Assigns/clears 80211b management logging category [ no ] modem-debug Assigns/clears modem debugging log ging category [ no ] sys-env [ no ] sys-err [ no ] tcp [ no ] udp [ no ] user-activity [ no ] vpn-stat [ no ] vpn-tunnel-status Assigns/clears vpn tunnel status log ging category [ no ] log filter-time <uvalue> log ordering <choices> [ invert ] Assign/clear ordering method when displaying log entries name < string> [ no ] route default < IP address > [ no ] route < Destination > < Netmask > < Gateway > [ metric < route metric >] [ no ] web-management http enable < x0 | x1 | x2 | x3 | x4 | x5 > web-management http port < tcp port or 'default' > Assigns the HTTP web management port or reset to default [ no ] web-management https enable < x0 | x1 | x2 | x3 | x4 | x5 > Enables/disables HTTPS web man agement web-management https port < tcp port or 'default' > Assigns the HTTPS web management port or resets to default Restores default web-management port and interface assignments [ no ] intrazone-communica tions Enables/disables intra-zone communi cations bandwidth-management enable bandwidth-management size < uvalue > comment < string > Adds comment as part of the port con figuration duplex < full | half > Enable/disable fragmentation of pack ets larger than the interface MTU Enable/disable ignoring the don’t frag ment bit [ no] sslvpn-access < guest services> Exits to top-level menu and cancels changes where needed Configures the zone’s bypass settings for anti-virus bypass auth <string|iden tifier Configures the zone’s bypass authentication based on string or identifier input Enables custom authentication page settings custom footer-text <string|identifier Configures custom footer text for the authentication page custom footer-type <text|url> Configures custom footer text font for the authentication page custom header-text <string|identifier> Configures custom header text for the authentication page custom header-type <text|url> Configures custom header text font for the authentication page Exits to top-level menu and applies changes where needed Sets maximum guest limit for the zone at specified value Allows traffic through zone from the specified network Enables guests to be directed to a landing page post-authentication post url <string|identi fier> Configures which URL guests are directed to after authentication smtp-redirect <string|identifier>Configuring Site-to-Site VPN Using CLI
This section describes how to create a VPN policy using the Command Line Interface. You can configure all of the parameters using the CLI, and enable the VPN without using the Web management interface.
CLI Access
1. Use a DB9 to RJ45 connector to connect the serial port of your PC to the console port of your firewall.
• 8 bits
3. You may need to hit return two to three times to get to a command prompt, which will look similar to the following: If you have used any other CLI, such as Unix shell or Cisco IOS, this process should be relatively easy and similar. It has auto-complete so you do not have to type in the entire command.
4. When a you need to make a configuration change, you should be in configure mode. To enter configure mode, type configure. The command prompt changes and adds the word config to distinguish it from the normal mode. Now you can configure all the settings, enable and disable the VPNs, and configure the firewall.
Configuration
In this example, a site-to-site VPN is configured between two NetVanta 2630 appliances, with the following settings:
Local NetVanta 2630 (home):
WAN IP: 10.50.31.150
LAN subnet: 192.168.61.0
Mask 255.255.255.0
Remote NetVanta 2630 (office):
WAN IP: 10.50.31.104
LAN subnet: 192.168.15.0
Mask: 255.255.255.0
Authentication Method: IKE using a Pre-Shared Key
Phase 1 Exchange: Main Mode
Phase 1 Encryption: 3DES
Phase 1 Authentication SHA1
Phase 1 DH group: 2
Phase 1 Lifetime: 28800
Phase 2 Protocol: ESP
Phase 2 Encryption: 3DES
Phase 2 Authentication: SHA1
Phase 2 Lifetime: 28800
No PFS
1. In configure mode, create an address object for the remote network, specifying the name , zone assignment , type , and address . In this example, we use the name OfficeLAN : (config[NetVanta2630]> address-object Office LAN
(config-address-object[OfficeLAN])>(config-address-object[OfficeLAN])> zone VPN
(config-address-object[OfficeLAN])> network 192.168.15.0 255.255.255.0
(config-address-object[OfficeLAN])> finished
2. To display the address object, type the command show address-object [name] : NetVanta2630 > show address-object OfficeLAN
The output will be similar to the following:
address-object OfficeLAN
network 192.168.15.0 255.255.255.0
zone VPN(config[NetVanta2630])> vpn policy OfficeVPN pre-shared
(config-vpn[OfficeVPN])>
Note The prompt has changed to indicate the configuration mode for the VPN policy. All the settings regarding this VPN will be entered here. (config-vpn[OfficeVPN])> pre-shared-secret ADTRAN
(config-vpn[OfficeVPN])> gw ip-address 10.50.31.104
(config-vpn[OfficeVPN])> network local address-object "LAN Primary Subnet"
(config-vpn[OfficeVPN])> network remote address-object "OfficeLAN"(config-vpn[OfficeVPN])> proposal ike main encr triple-des auth sha1 dh 2 lifetime 28800
(config-vpn[OfficeVPN])> proposal ipsec esp encr triple-des auth sha1 dh no lifetime 28800(config-vpn[OfficeVPN])> advanced keepalive
(config[NetVanta2630])> vpn enable "OfficeVPN"
(config-vpn[OfficeVPN])> finished
(config[NetVanta2630])>The configuration is complete.
Viewing VPN Configuration
Use the following steps to configure the VPN policies.
1. To view a list of all the configured VPN policies, type the command show vpn policy. The output will be similar to the following: (config[NetVanta2630])> show vpn policy
Policy: WAN GroupVPN (Disabled)
Key Mode: Pre-shared
Pre Shared Secret: DE65AD2228EED75AProposals:
IKE: Aggressive Mode, 3DES SHA, DH Group 2, 28800 seconds
IPSEC: ESP, 3DES SHA, No PFS, 28800 secondsAdvanced:
Allow NetBIOS OFF, Allow Multicast OFF
Management: HTTP OFF, HTTPS OFF
Lan Default GW: 0.0.0.0
Require XAUTH: ON, User Group: Trusted UsersClient:
Cache XAUTH Settings: Never
Virtual Adapter Settings: None
Allow Connections To: Split Tunnels
Set Default Route OFF, Apply VPN Access Control List OFF
Require GSC OFF
Use Default Key OFFPolicy: OfficeVPN (Enabled)
Key Mode: Pre-shared
Primary GW: 10.50.31.104
Secondary GW: 0.0.0.0
Pre Shared Secret: ADTRANIKE ID:
Local: IP Address
Peer: IP AddressNetwork:
Local: LAN Primary Subnet
Remote: OfficeLAN
Proposals:
IKE: Main Mode, 3DES SHA, DH Group 2, 28800 seconds
IPSEC: ESP, 3DES SHA, No PFS, 28800 secondsAdvanced:
Keepalive ON, Add Auto-Rule ON, Allow NetBIOS OFF
Allow Multicast OFF
Management: HTTP ON, HTTPS ON
User Login: HTTP ON, HTTPS ON
Lan Default GW: 0.0.0.0
Require XAUTH: OFF
Bound To: Zone WAN
2. To view the configuration for a specific policy, specify the policy name in double quotes. For example: (config[NetVanta2630])> show vpn policy "OfficeVPN"
The output will be similar to the following:
Policy: OfficeVPN (Enabled)
Key Mode: Pre-shared
Primary GW: 10.50.31.104
Secondary GW: 0.0.0.0
Pre Shared Secret: ADTRANIKE ID:
Local: IP Address
Peer: IP AddressNetwork:
Local: LAN Primary Subnet
Remote: OfficeLANProposals:
IKE: Main Mode, 3DES SHA, DH Group 2, 28800 seconds
IPSEC: ESP, 3DES SHA, No PFS, 28800 secondsAdvanced:
Keepalive ON, Add Auto-Rule ON, Allow NetBIOS OFF
Allow Multicast OFF
Management: HTTP ON, HTTPS ON
User Login: HTTP ON, HTTPS ON
Lan Default GW: 0.0.0.0
Require XAUTH: OFF
Bound To: Zone WAN3. Type the command show vpn sa “name” to see the active SA:
(config[NetVanta2630])> show vpn sa "OfficeVPN"
Policy: OfficeVPN
IKE SAsGW: 10.50.31.150:500 --> 10.50.31.104:500
Main Mode, 3DES SHA, DH Group 2, Responder
Cookie: 0x0ac298b6328a670b (I), 0x28d5eec544c63690 (R)
Lifetime: 28800 seconds (28783 seconds remaining)GW: 10.50.31.150:500 --> 10.50.31.104:500
(192.168.61.0 - 192.168.61.255) --> (192.168.15.0 - 192.168.15.255)
ESP, 3DES SHA, In SPI 0xed63174f, Out SPI 0x5092a0b2
Lifetime: 28800 seconds (28783 seconds remaining)ADTRAN NetExtender Windows Client CLI Commands
The following section includes commands for the NetExtender Windows Client CLI (NEClient.exe):
-s server
-u user name
-p password
-d domain name
-clientcertificatethumb thumb(when server need client
certificate)
-clientcertificatename name(when server need client
certificate)disconnect
createprofile [OPTIONS]-s server
-u user name(optional)
-p password(optional)
-d domain name-s server(optional)
-d domain(optional)
-u username(optional)-s server
-d domain
-u usernameshowstatus
setproxy [OPTIONS]-t 1 automatic detect setting; 2 configuration script; 3 proxy server
-s proxy address/URL of automatic configuration script
-o port
-u user name
-p password
-b bypass proxy
-save
queryproxy
reconnect
viewlog
-profileservername: connect to server directly when password has been saved
NECLI connect -s 10.103.62.208 -d LocalDomain -u admin -p
passwordNECLI connect -s 10.103.62.208 -d LocalDomain -u admin -p
password - clientcertificatethumb
cf3d20378ba7f2d9a79c536e230a2495d4a46734NECLI connect -s 10.103.62.208 -d LocalDomain -u admin -p
password - clientcertificatename "Admin"NECLI createprofile -s 10.103.62.208 -d LocalDomain -u admin
NECLI displayprofile -s 10.103.62.208
NECLI deleteprofile -s 10.103.62.208 -d LocalDomain -u admin
NECLI -t 3 -s 10.103.62.201 -o 808 -u user1 -p password -b
10.103.62.101;10.103.62.102ADTRAN NetExtender MAC and Linux Client CLI Commands
The following section includes the Mac and Linux CLI version, which is similar to the NetExtender Windows Client CLI in the previous section:
Usage: netExtender [OPTIONS] server[:port]
-u user
-p password
-d domain
-t timeout Login timeout in seconds, default is 30 sec.
-e encryption Encryption cipher to use. To see list use -e -h.
-m Use this option to not add remote routes.
-r filename Generate a diagnostic report.
-v Display NetExtender version information.
-h Display this usage information.server: Specify the server either in FQDN or IP address.
The default port for server is 443 if not specified.netExtender -u u1 -p p1 -d LocalDomain sslvpn.company.com
[root@linux]# netExtender -u demo sslvpn.demo.adtran.com
SUSE/Ubuntu compatibility mode offUser Access Authentication
Password:
Domain: Active Directory
Connecting to SSL-VPN Server "sslvpn.demo.adtran.com:443". . .
Connected.
Logging in...
Login successful.
Using SSL Encryption Cipher 'DHE-RSA-AES256-SHA'
Using new PPP frame encoding mechanism
You now have access to the following 5 remote networks:NetExtender connected successfully. Type "Ctrl-c" to disconnect...
Disconnecting NetExtender...
Terminating pppd.......
SSL-VPN logging out...
SSL-VPN connection is terminated.
Exiting NetExtender client.