Command
|
Description
|
ACCESS RULES SUB-COMMANNDS
|
|
|
access-rules <from-zone> <to-zone>
|
Allows configuration of access rules between one zone and another
|
<add> commands
|
|
|
action <allow|deny|discard>
|
Sets the action to allow, deny, or discard an access rule
|
advanced
|
Allows configuration of advanced access rule settings
|
[no] allow-fragments
|
Allows/Disallows fragmented packets to be transferred
|
comment <comments>
|
Allows administrators to record comments related to this access rule
|
destination <address object>
|
Configures an address object destination for an access rule
|
info
|
Displays current access rule
|
[no] logging
|
Enables/Disables access rule packet logging
|
maxconns <percentage>
|
Configures maximum number of connections in a pool
|
qos dscp <none| preserve|explicit|map> [<arg>]
|
Sets DSCP packet header markings
|
qoa 802.1p <none| preserve|explicit|map> [<arg>]
|
Sets 802.1p Ethernet packet header markings
|
[no] reflexive
|
Creates/Removes a reflexive access rule
|
schedule <schedule object>
|
Configures the schedule object for an access rule
|
service <service object>
|
Configures the service object for an access rule
|
source <address object>
|
Configures an address object source for an access rule
|
tcptimeout <minutes>
|
Sets TCP timeout in minutes
|
udptimeout <seconds>
|
Sets UDP timeout in seconds
|
user <user object>
|
Configures the user object for an access rule
|
delete <index>
|
Deletes specified index of access rules
|
list [<index>]
|
Displays one access rule whose index matches the specified value input. If index is not available, all access rules in the current zone to zone context will display
|
<modify> commands
|
|
|
<index>
|
Modifies specific access rules index
|
action <allow|deny|discard>
|
Modifies an allow, deny, or discard action relating to a specific access rule
|
advanced
|
Modifies an advanced access rule
|
[no] allow-fragments
|
Modifies whether fragmented packets are to be transferred
|
comment <comments>
|
Modifies comments related to access rules
|
destination <address object>
|
Modifies the destination address object for a specific access rule
|
info
|
Displays current or modifying access rule settings
|
[no] logging
|
Modifies whether packet logging is enabled for a specific access rule
|
qos dscp <none| preserve|explicit|map> [<arg>]
|
Modifies DSCP packet header markings
|
qos 802.1p <none| preserve|explicit|map> [<arg>]
|
Modifies 802.1p Ethernet packet header markings
|
maxconns <percentage>
|
Modifies maximum number of connections in a pool
|
schedule <schedule object>
|
Modifies a schedule object connected to an access rule
|
service <service object>
|
Modifies the service object connected to an access rule
|
source <address object>
|
Modifies the source address object connected to an access rule
|
tcptimeout <minutes>
|
Modifies set TCP timeout limit in minutes
|
udptimeout <seconds>
|
Modifies set UDP timeout limit in seconds
|
user <user object>
|
Modifies the user-object connected with an access rule
|
show access-rules
|
Displays all currently configured access rules
|
ADDRESS GROUP/ADDRESS OBJECT SUB-COMMANDS
|
|
abort
|
Exits to top-level menu and cancels changes where needed
|
[no] address-object <object name>
|
Configures or modifies an address object
|
[no] address-group <group name>
|
Configures or modifies an address group
|
cancel
|
Cancel from menu without applying changes
|
end
|
Exits configuration mode
|
exit
|
Exits menu and applies changes
|
finished
|
Exits to top-level and applies changes where needed
|
host <ip address>
|
Configures the host IP address for the specific address object
|
info
|
Displays current address group configuration
|
network <subnet> <netmask>
|
Configures network subnet and netmask
|
range <begin-address> <end address>
|
Defines address range for the address group or address object
|
zone <zone name>
|
Configures a zone for the specified address object or group
|
ARP SUB-COMMAND
|
|
|
[no] arp <ip address> <MAC address> interface <lan|wan|dmz>[perm][pub]
|
Adds or removes arp entries for specified interface(s)
|
GMS SUB-COMMANDS
|
<gms>
|
algorithm <des-md5|frd3-sha>
|
Sets GMS encryption and authentication algorithm
|
[no] authentication-key <hex key>
|
Sets the 32-hex or 40-hex authentication key to communicate with the GMS server
|
[no] behind-nat
|
Enables GMS behind a NAT device
|
bound-interface <x1|x2|x3|x4|x5>
|
Binds a VPN policy to an interface
|
[no] enable
|
Enables GMS management on a SonicWALL
|
encryption-key <hex key>
|
set the 16-hex/48-hex encryption key to communicate with the GMS server
|
end
|
Exits configuration menu
|
finished
|
Exits configuration mode to top menu
|
help <command>
|
Displays command and description
|
info
|
Displays current GMS configuration state
|
[no] nat-address <IP Address>
|
Sets the public NAT IP address that the GMS server resides behind
|
[no] over-vpn
|
Enables GMS server locally or over VPN
|
[no] send-heartbeat
|
Sends heart beat status messages only
|
[no] server <IP Address>
|
Sets the real IP address of the GMS server
|
[no] standby-management-sa
|
Enables the backup SA for GMS management
|
syslog-port <uvalue|(default)>
|
Sets the syslog server port of the GMS server
|
HIGH AVAILABILITY SUB-COMMAND
|
|
|
ha <disable|enable>
|
Enables or disables the High Availability function
|
NAT SUB-COMMANDS
|
|
|
nat
|
Accesses sub-commands to configure NAT policies
|
<add> commands
|
|
|
orig-src <original source object>
|
Sets the original source object for this policy
|
trans-src <translated source object>
|
Sets the translated source object for this policy
|
orig-dst <original destination source object>
|
Sets the original destination source object for this policy
|
orig-svc <original service name>
|
Sets the original service name for this policy
|
trans-svc <translated service name>
|
Sets the translated service name for this policy
|
inbound-interface <inbound interface>
|
Sets the inbound interface for this policy
|
outbound-interface <outbound interface>
|
Sets the outbound interface for this policy
|
[no] enable
|
Enables/Disables a NAT policy once it has been created
|
[no] reflexive
|
Creates/Removes a reflexive NAT policy once it has been saved
|
comment <comments>
|
Allows administrator to leave comments relating to a NAT policy
|
info
|
Displays currently configured NAT element settings
|
<delete> commands
|
|
|
delete <item-number>
|
Deletes a specific NAT policy
|
<modify> commands
|
|
|
<item-number>
|
Allows modification of a specific NAT policy
|
[no] enable
|
Enables/Disables a specific NAT policy
|
[no] comment <comments>
|
Allows administrator to modify comments relating to a NAT policy
|
orig-src <original source object>
|
Modifies the original source object for this policy
|
trans-src <translated source object>
|
Modifies the translated source object for this policy
|
orig-dst <original destination address object>
|
Modifies the original destination address object for this policy
|
trans-dst <translated destination address object>
|
Modifies the translated destination-address object for this policy
|
orig-svc <original service name>
|
Modifies the name of the original service
|
trans-svc <translated service name>
|
Modifies the translated service name
|
inbound-interface <inbound interface>
|
Modifies the inbound interface for NAT
|
outbound-interface <outbound interface>
|
Modifies the outbound interface for NAT
|
info
|
Displays current object or modifying object
|
ROUTE SUB-COMMANDS
|
|
|
route ars-nsm
|
Configures the Advanced Routing Suite for the NSM module
|
route ars-ospf
|
Configures the Advanced Routing Suite for the OSPF module
|
route ars-rip
|
Configures the Advanced Routing Suite for the RIP module
|
SERVICE SUB-COMMANDS
|
|
|
service
|
Accesses sub-commands to configure individual services
|
<add> commands
|
|
|
<service name>
|
Allows configuration of a new service type to be associated to the appliance
|
<group name>
|
Allows configuration of a new service group name
|
[no] service <service name>
|
Allows/Removes configuration of service type
|
ip-type <ip type>
|
Allows ip-type to be set for a particular service
|
port-begin <port>
|
Sets the start point for a service’s port range
|
port-end <port>
|
Sets the endpoint for a service’s port range
|
info
|
Allows additional values to be added for the specific service
|
subtype <x>
|
Sets the subtype for the selected ip-type
|
|
<delete> commands
|
|
|
<group name>
|
Deletes the specifically named service group
|
<service name>
|
Deletes the specifically named service type
|
<modify> commands
|
|
|
|
<service name>
|
Allows modification of a service name
|
<group name>
|
Modifies the name of a specified service group
|
ip-type <ip type>
|
Modifies the ip-type for this particular service
|
port-begin <port>
|
Modifies the start port for this range
|
port-end <port>
|
Modifies the end port for this range
|
[no] service <service name}
|
Modifies/deletes specified service type
|
subtype <x>
|
Modifies the subtype for this specific ip-type
|
[info]
|
Optional, displays service values for service name, protocol, and port range
|
|
|
|
SONICPOINT SUB-COMMANDS
|
|
<sonicpoint>
|
<string>
|
Configures a SonicPoint profile
|
|
sync
|
Synchronizes configured SonicPoints
|
country-code <US|CA>
|
Sets applicable country code for a SonicPoint
|
[no] delete
|
Deletes an operational SonicPoint from a deployment
|
[no] enable
|
Enables or disables a configured SonicPoint
|
end
|
Exits configuration mode
|
exit
|
Exits menu and applies changes
|
finished
|
Exits to top-level and applies changes where needed
|
info
|
Displays information on a specific SonicPoint
|
[no] radio-a enable
|
Enables or disables 802.11a radio band wireless connections
|
radio-a acl allow <string>
|
Adds a specific MAC address to the Access Control List (ACL) to allow 802.11a radio band wireless connections to a SonicPoint
|
radio-a acl deny <string>
|
Adds a specific MAC address to the denied Access Control List, preventing 802.11a radio band wireless connections to a SonicPoint
|
[no] radio-acl enable
|
Enables or disables the Access Control List feature on 802.11a radio
|
radio-a acl mode <deny|allow| disabled|enabled>
|
Sets Access Control List enforcement
|
radio-a acl object-handle <string>
|
Sets 802.11a radio ACL to allow list object handle
|
radio-a antenna-diversity <one|two|both>
|
Sets which antenna (left, right, or both) the SonicPoint uses to send and receive data
|
|
radio-a authtype <both|open|psk|shared>
|
Sets the method type for authentication to be both, open, WPA/PSK, or WEP-shared
|
radio-a beacon-interval <uvalue>
|
Sets the interval (in milliseconds) between broadcasts of the wireless beacon
|
radio-a channel <uvalue>
|
Sets the radio channel the SonicPoint will operate on
|
radio-a datarate <6|9|12|18|24|36|48|54| best>
|
Sets the data rate at which data is transmitted and received to either the best possible rate, or a specified rate
|
radio-a dtim <uvalue>
|
Sets 802.11a radio DTIM, which is the numbers of beacon frames that must occur before the radio sends buffered multicast frames
|
radio-a frag-thresh <uvalue>
|
Sets the number of bytes of fragmented data for the SonicPoint to allow
|
[no] radio-a hide-ssid
|
Sets SSID to be broadcast as part of the wireless beacon, rather than as a separate broadcast
|
radio-a maxclients <uvalue>
|
Sets maximum number of clients that can the SonicPoint can support at one time
|
radio-a radio-mode <standard|turbo>
|
Sets radio mode to standard or turbo
|
radio-a rts-thresh <uvalue>
|
Sets the RTS threshold in bytes
|
radio-a sched-onoff <string>
|
Sets the on/off schedule string for 802.11a radio
|
radio-a sched-scan <string>
|
Sets a convenient time to schedule an Intrusion Detection Scan (IDS)
|
radio-a ssid <string>
|
Sets Service Set Identifier (SSID) identifying a particular SonicPoint
|
radio-a txpower <eighth|full|half| minimum|quarter>
|
Sets Transmit Power Control level strength
|
radio-a wep key-value <1-4> <string>
|
Sets the 802.11a radio WEP key value for each encryption key slot
|
radio-a wep default-key <uvalue>
|
Sets the SonicPoint’s default WEP key index
|
radio-a wep key-mode <64bit|128bit|152bit| none>
|
Sets WEP key mode, establishing character length of encryption
|
radio-a wep key-type <alpha|hex>
|
Sets type of WEP key for encryption
|
radio-a wpa cipher <aes|auto|tkip>
|
Sets the cipher type system used by the WPA to either AES, AUTO, or TKIP
|
|
radio-a wpa interval <uvalue>
|
Sets the length of time between re-keying the WPA key
|
radio-a wpa psk <string>
|
Sets WiFi Protected Access Pre-shared key passphrase
|
[no] radio-g enable
|
Enables or disables 802.11g radio band wireless connections
|
[no] radio-g acl enable
|
Enables or disables the Access Control List
|
radio-g acl allow <string>
|
Adds a specific MAC address to the Access Control List (ACL) to allow 802.11g radio band wireless connections to a SonicPoint
|
radio-g acl deny <string>
|
Adds a specific MAC address to the denied Access Control List, preventing 802.11g radio band wireless connections to a SonicPoint
|
radio-g acl mode <deny|allow| disabled|enabled>
|
Sets Access Control List enforcement
|
radio-g acl object-handle <string>
|
Sets 802.11g radio ACL to allow list object handle
|
radio-g antenna-diversity <one|two|both>
|
Sets which antenna the SonicPoint uses to send and receive data
|
radio-g authtype <both|open|psk|shared>
|
Sets the method type for authentication
|
radio-g beacon-interval <uvalue>
|
Sets the interval (in milliseconds) between broadcasts of the wireless beacon
|
radio-g channel <uvalue>
|
Sets the channel the radio will operate on
|
radio-g datarate <b1|b11|b2|b5|best|g1|g11|g12|g18|g2|g24|g36|g48| g5|g54|g6|g9|super108| super12|super18|super24| super36|super48|super72| super96>
|
Sets the data rate at which data is transmitted and received
|
radio-g dtim <uvalue>
|
Sets 802.11g radio DTIM, which is the numbers of beacon frames that must occur before the radio sends buffered multicast frames
|
radio-g frag-thresh <uvalue>
|
Sets the number of bytes of fragmented data for the SonicPoint to allow
|
[no] radio-g g-only
|
Allows only 802.11g clients to connect
|
[no] radio-g hide-ssid
|
Sets SSID to be broadcast as part of the wireless beacon, rather than as a separate broadcast
|
radio-g maxclients <uvalue>
|
Sets maximum number of clients that can the SonicPoint can support at one time
|
|
radio-g ofdm-power <uvalue>
|
Sets the difference in radio transmit power allowed between 802.11g and 802.11b modes
|
[no] radio-g preamble-long
|
Sets the length of the initial wireless communication when associating with the host
|
radio-g protection mode <always|none>
|
Sets the protection mode; None is the default
|
radio-g protection rate <1|2|5|11>
|
Sets the speed for CTS or RTS protection
|
radio-g protection type <cts-only|rts-cts>
|
Sets the protection type
|
radio-g radio-mode <b|g|super-g>
|
Sets radio mode. If super-g is selected, all clients must use access cards that support this mode
|
radio-g rts-thresh <uvalue>
|
Sets the RTS threshold in bytes
|
radio-g ssid <string>
|
Sets Service Set Identifier identifying a particular SonicPoint
|
radio-g sched-onoff <string>
|
Sets the on/off schedule string for 802.11g radio
|
radio-g sched-scan <string>
|
Sets a convenient time to schedule an Intrusion Detection Scan (IDS)
|
[no] radio-g short-slot
|
Allows clients to disassociate and re-associate more quickly
|
radio-g txpower <eighth|full|half| minimum|quarter>
|
Sets Transmit Power Control strength
|
radius1 address <ip address>
|
Sets the IP address location of the RADIUS authentication server
|
radius1 port <port>
|
Sets the port for authentication through the RADIUS server
|
radius1 secret <string>
|
Sets the secret passcode for the RADIUS authentication server
|
radius2 address <ip address>
|
Sets the IP address for the backup RADIUS authentication server
|
radius 2 port <port>
|
Sets the port for authentication through the backup RADIUS server
|
radius2 secret <string>
|
Sets the secret passcode for the backup RADIUS authentication server
|
SSH SUB-COMMANDS
|
|
|
ssh enable <interface>
|
Enables SSH management for the specified interface
|
ssh genkey
|
Creates a new key to use with SSH
|
ssh port <port>
|
Assigns the SSH port or resets to the default port
|
ssh restore
|
Restores SSH management settings to defaults
|
ssh terminate
|
Stops all SSH sessions, disables all SSH management, and resets the port
|
SSL VPN SUB-COMMANDS
|
|
|
sslvpn client
|
Configures or modifies SSL VPN client settings
|
sslvpn portal
|
Configures or modifies SSL VPN portal settings
|
sslvpn settings
|
Configures or modifies SSL VPN settings
|
TIMEOUT SUB-COMMAND
|
|
|
timeout <minutes>
|
Sets login timeout in minutes
|
VPN SUB-COMMANDS
|
|
|
[no] vpn <enable|disable> <policy name>
|
Enables or disables VPN for a specific policy
|
[no] vpn policy <policy-name> [preshared| manual|cert]
|
Enables or disables a specific VPN policy
|
VPN SUB-COMMANDS (PRE-SHARED SECRET)
|
|
|
abort
|
Exits to top-level menu and cancels changes where needed
|
[no] advanced apply-nat <local|remote> <translated address object>
|
Enable or disable translation of the local and/or remote networks communicating with this VPN tunnel
|
[no] advanced auto-add-rule
|
Enables or disables the auto-add access rule
|
advanced bound-to interface <interface>
|
Binds VPN policy to specific interface
|
advanced bound-to zone <zone>
|
Binds VPN policy to a specific zone
|
[no] advanced default-lan-gw <ip address>
|
Sets the default LAN domain gateway for VPN tunnel traffic
|
[no] advanced keepalive
|
Enables or disables heartbeat messages between peers on this VPN tunnel
|
[no] advanced management http
|
Enables or disables HTTP as the management method security association
|
[no] advanced management https
|
Enables or disables HTTPS as the management method security association
|
|
[no] advanced multicast
|
Enables IP multicasting traffic to pass through the VPN tunnel
|
[no] advanced netbios
|
Enables or disables Windows Networking (NetBIOS) Broadcast
|
[no] advanced use-xauth <group-name>
|
Configures or removes the specified user group for XAUTH users
|
[no] advanced user-login http
|
Enables or disables required user login through HTTP
|
[no] advanced user-login https
|
Enables or disables required user login through HTTPS
|
cancel
|
Cancel from menu without applying changes
|
end
|
Exits VPN configuration mode
|
exit
|
Exits menu and applies changes
|
finished
|
Exits to top-level and applies changes where needed
|
gw domain-name <domain name>
|
Sets the primary gateway domain name
|
gw ip-address <ip address>
|
Sets the primary gateway IP address
|
id local <domain-name|email address|ip-address|sonicwall-id> <our id>
|
Sets the name and IP address of the local connection
|
id remote <domain name|email address|ip-address|sonicwall-id> <their id>
|
Sets the name and IP address of the remote connection
|
info
|
Displays information on a specific VPN policy
|
network local <address-object> <address object string>|any|dhcp>
|
Sets a local network for the VPN tunnel, or configures the network to obtain IP addresses using DHCP
|
network remote <address- object<address object string>|any|dhcp>
|
Sets a specific VPN tunnel as the default route for all incoming Internet traffic
|
pre-shared-secret <string>
|
Established specified preshared secret
|
proposal ike [<main|aggressive|ikev2>] [encr <des|triple-des|aes-128|aes-192|aes-256>] [auth <md5|sha1>] [dh <1|2|5>] [lifetime <seconds>]
|
Sets the desired IKE encryption suite configurations for VPN tunnel traffic
|
|
proposal ipsec [<esp|ah>] [encr <des|triple-des|aes-128|aes-192|aes-256>] [auth <md5|sha1>] [dh <1|2|5>] [lifetime <seconds>]
|
Sets encryption settings for IPSec proposal
|
sec-gw domain-name <domain name>
|
Sets the secondary gateway domain name
|
sec-gw ip-address <ip address>
|
Sets the secondary gateway’s IP address
|
VPN SUB-COMMANDS (MANUAL KEY)
|
|
|
abort
|
Exits to top-level menu and cancels changes where needed
|
[no] advanced apply-nat <local|remote> <translated address object>
|
Enable or disable translation of the local and/or remote networks communicating with this VPN tunnel
|
[no] advanced auto-add-rule
|
Enables or disables the auto-add access rule
|
advanced bound-to interface <interface>
|
Binds VPN policy to specific interface
|
advanced bound-to zone <zone>
|
Binds VPN policy to a specific zone
|
[no] advanced keepalive
|
Enables or disables heartbeat messages between peers on this VPN tunnel
|
[no] advanced management http
|
Enables or disables HTTP as the management method security association
|
[no] advanced managment https
|
Enables or disables HTTPS as the management method security association
|
[no] advanced multicast
|
Enables IP multicasting traffic to pass through the VPN tunnel
|
[no] advanced netbios
|
Enables or disables Windows Networking (NetBIOS) Broadcast
|
[no] advanced use-xauth <group name>
|
Configures or removes the specified user group for XAUTH users
|
[no] advanced user-login http
|
Enables or disables required user login through HTTP
|
[no] advanced user-login https
|
Enables or disables required user login through HTTPS
|
cancel
|
Cancel from menu without applying changes
|
end
|
Exits configuration mode
|
exit
|
Exits menu and applies changes
|
finished
|
Exits to top-level and applies changes where needed
|
gw domain-name <domain name>
|
Sets the primary gateway domain name
|
gw ip-address <ip address>
|
Sets the primary gateway IP address
|
info
|
Displays information on a specific VPN policy
|
network local <address object <address object string> | any>
|
Sets a local network for the VPN tunnel, or configures the network to obtain IP addresses using DHCP
|
network remote <address object <address object string> | any>
|
Sets a specific VPN tunnel as the default route for all incoming Internet traffic
|
|
proposal ipsec [<esp|ah>] [encr <des|triple-des|aes-128|aes-192|aes-256>] [auth <md5|sha1>] [dh <1|2|5>] [lifetime <seconds>]
|
Sets encryption settings for IPSec proposal
|
sa [in-spi <Incoming SPI>] [out-spi <Outgoing SPI>] [encr-key <Encryption Key>] [auth-key <Authentication Key>]
|
Sets hexidecimal incoming and outgoing Security Parameter Index (SPI) to allow the SonicWALL to uniquely identify all security associations
|
VPN SUB-COMMANDS (3rd PARTY CERTIFICATE)
|
|
abort
|
Exits to top-level menu and cancels changes where needed
|
[no] advanced apply-nat
|
Enable or disable translation of the local and/or remote networks communicating with this VPN tunnel
|
[no] advanced auto-add-rule
|
Enables or disables the auto-add access rule
|
advanced bound-to interface <interface>
|
Binds VPN policy to specific interface
|
advanced bound-to zone <zone>
|
Binds VPN policy to a specific zone
|
[no] advanced default-lan-gw <ip address>
|
Sets the default LAN gateway for VPN tunnel traffic
|
[no] advanced keepalive
|
Enables or disables heartbeat messages between peers on this VPN tunnel
|
[no] advanced management http
|
Enables or disables HTTP as the management method security association
|
[no] advanced managment https
|
Enables or disables HTTPS as the management method security association
|
[no] advanced multicast
|
Enables IP multicasting traffic to pass through the VPN tunnel
|
[no] advanced netbios
|
Enables or disables Windows Networking (NetBIOS) Broadcast
|
[no] advanced ocsp <url>
|
Enables use of Online Certificate Status Protocol (OCSP) to check VPN certificate status and specifies the URL where to check the certificate status
|
[no] advanced use-xauth <group name>
|
Configures or removes the specified user group for XAUTH users
|
[no] advanced user-login http
|
Enables or disables required user login through HTTP
|
[no] advanced user-login https
|
Enables or disables required user login through HTTPS
|
cancel
|
Cancel from menu without applying changes
|
|
cert <certname>
|
Selects a certificate for the SonicWALL
|
end
|
Exits configuration mode
|
exit
|
Exits menu and applies changes
|
finished
|
Exits to top-level and applies changes where needed
|
gw domain-name <domain name>
|
Sets the primary gateway domain name
|
gw ip-address <ip address>
|
Sets the primary gateway IP address
|
id remote <domain name | email address | distinguished name> <peer-id>
|
Sets peer IKE ID type
|
info
|
Displays information on a specific VPN policy
|
network local <address object <address object string> | any>
|
Sets a local network for the VPN tunnel, or configures the network to obtain IP addresses using DHCP
|
network remote <address object <address object string> | any>
|
Sets a specific VPN tunnel as the default route for all incoming Internet traffic
|
proposal ike [<main|aggressive|ikev2>] [encr <des|triple-des|aes-128|aes-192|aes-256>] [auth <md5|sha1>] [dh <1|2|5>] [lifetime <seconds>]
|
Sets the desired IKE encryption suite configurations for VPN tunnel traffic
|
proposal ipsec [<esp|ah>] [encr <des|triple-des|aes-128|aes-192|aes-256>] [auth <md5|sha1>] [dh <1|2|5>] [lifetime <seconds>]
|
Sets encryption settings for IPSec proposal
|
sec-gw domain-name <domain name>
|
Sets the secondary gateway domain name
|
sec-gw ip-address <ip address>
|
Sets the secondary gateway’s IP address
|
SSL VPN CLIENT SUB-COMMANDS
|
|
|
abort
|
Exits to top-level menu without applying changes
|
address <start ip address> <end ip address> <interface>
|
Sets the global IP address pool from which NetExtender clients are assigned an IP address
|
[no] auto-update
|
Enables/Disables auto-update which assists users in updating their NetExtender client when a newer version is required to establish a connection
|
cache-username-password <username-only | password-username | prohibit>
|
Sets the user name and password cache policy used for the NetExtender client
|
cancel
|
Exits from menu without applying changes
|
[no] client-communicate
|
Enables/Disables traffic between hosts connecting to server with NetExtender
|
[no] create-connection-profile
|
Enables/Disables NetExtender client’s ability to create a connection profiles
|
dns-domain <DNS domain name>
|
Sets the DNS domain which is the NetExtender client DNS-specific suffix
|
dns1 <ip address>
|
Sets the primary DNS server IP address to be used by all NetExtender clients
|
dns2 <ip address>
|
Sets the secondary DNS server IP address to be used by all NetExtender clients
|
end
|
Exits SSL VPN configuration mode
|
exit
|
Exits menu and applies changes
|
[no] exit-after-disconnect
|
Enables/Disables the forcing of a NetExtender client to exit after disconnecting from the server
|
finished
|
Exits to top-level and applies changes where needed
|
help
|
Displays available sub-commands for SSL VPN client configuration
|
info
|
Displays SSL VPN client settings
|
no
|
Inverts sense of a command
|
show
|
Invokes show commands
|
sslvpn-access <LAN|WAN|DMZ|WLAN>
|
Enables SSL VPN access on specified zone
|
[no] uninstall-after-exit
|
Enables/Disables automatic uninstall of NetExtender clients after exit
|
user-domain <user domain name>
|
Sets the user domain to which all SSL VPN users belong
|
wins1 <ip address>
|
Sets the primary WINS server IP address
|
wins2 <ip address>
|
Sets the secondary WINS server IP address
|
SSL VPN PORTAL SUB-COMMANDS
|
|
|
abort
|
Exits to top-level menu without applying changes
|
[no] auto-launch
|
Enables/Disables automatic launch of NetExtender after a user logs into the portal
|
banner-title <portal banner title name>
|
Sets the portal banner title that displays next to the logo on the portal home page
|
[no] cache-control
|
Enables/Disables the use of some HTML META tags to tell browser to cache UI files in portal pages
|
cancel
|
Exits the menu without applying changes
|
custom logo <url>
|
Sets a customized logo to be used on the portal page. The URL entered must be valid and reachable by the unit.
|
[no] default-logo
|
Enables/Disables the use of the default SonicWALL logo on the portal page
|
[no] display-cert
|
Enables/Disables the display of the button to import the SSL VPN server certificate
|
end
|
Exits SSL VPN portal configuration
|
exit
|
Exits menu and applies changes
|
finished
|
Exits to top-level menu and applies changes
|
help
|
Displays available subcommands for SSL VPN portal settings
|
info
|
Displays current SSL VPN portal settings
|
no
|
Inverts sense of a command
|
show
|
Invokes show commands
|
site-title <portal site title name>
|
Sets the portal HTML page title that displays in the browser window’s title
|
SSL VPN ROUTE SUB-COMMANDS
|
|
|
abort
|
Exits to top-level menu without applying changes
|
add-routes <address object name>
|
Adds an address object as a client route entry
|
cancel
|
Exits from menu without applying changes
|
delete-routes <address object name>
|
Deletes specified SSL VPN client route entry, identified as an address object
|
end
|
Exits SSL VPN client routes configuration mode
|
exit
|
Exits menu and applies changes
|
finished
|
Exits to top-level menu and applies changes
|
help
|
Displays available subcommands for SSL VPN client routes settings
|
info
|
Displays current SSL VPN client routes settings
|
no
|
Inverts sense of a command
|
show
|
Invokes show commands
|
[no] tunnel-all
|
Enables/Disables tunnel all mode which configures the NetExtender client to tunnel all traffic over the SSL VPN connection
|
WEB MANAGEMENT SUB-COMMANDS
|
|
|
[no] web-management otp enable
|
Configures one-time password for VPN user access to the appliance
|