Zyxel UAG4100 [2/323] Important read carefully before use keep this guide for future reference
![Zyxel UAG4100 [2/323] Important read carefully before use keep this guide for future reference](/views2/1169094/page2/bg2.png)
IMPORTANT!
READ CAREFULLY BEFORE USE.
KEEP THIS GUIDE FOR FUTURE REFERENCE.
This is a Reference Guide for a series of products. Not all products support all firmware features.
Screenshots, graphics and commands in this book may differ slightly from your product due to
differences in your product firmware or your computer operating system. Every effort has been made
to ensure that the information in this manual is accurate.
Related Documentation
• User’s Guide
The User’s Guide explains how to use the Web Configurator to configure the UAG.
It is recommended you use the Web Configurator to configure the UAG.
Содержание
- Cli reference guide 1
- Default login details 1
- Quick start guide 1
- Uag series 1
- Unified access gateway 1
- Important read carefully before use keep this guide for future reference 2
- It is recommended you use the web configurator to configure the uag 2
- About this cli reference guide 3
- How to use this guide 3
- Intended audience 3
- Note some features cannot be configured in both the web configurator and cli 3
- Note the version number on the cover page refers to the latest firmware version supported by the uag this guide applies to version2 0 and 4 0 at the time of writing 3
- Note this guide is intended as a command reference for a series of products therefore many commands or command options in this guide may not be available in your product see your user s guide for a list of supported features and details about feature implementation 3
- Document conventions 4
- Icons used in figures 4
- Note notes tell you other important information for example other things you may need to configure or helpful tips or recommendations 4
- Syntax conventions 4
- Warnings and notes 4
- Warnings tell you about things that could harm you or your device 4
- Document conventions 5
- Uag cli reference guide 5
- Contents overview 6
- Introduction 1 6
- Reference 0 6
- About this cli reference guide 8
- Chapter 1 command line interface 3 8
- Contents overview 8
- Document conventions 8
- Part i introduction 21 8
- Table of contents 8
- Chapter 2 user and privilege modes 6 9
- Chapter 3 object reference 2 9
- Chapter 4 status 4 9
- Chapter 5 registration 7 9
- Chapter 6 ap management 4 9
- Chapter 7 wireless lan profiles 7 9
- Part ii reference 40 9
- Chapter 8 interfaces 8 10
- Chapter 9 trunks 0 10
- Chapter 10 ip drop in 6 11
- Chapter 11 route 9 11
- Chapter 12 routing protocol 06 11
- Chapter 13 zones 110 11
- Chapter 14 ddns 113 11
- Chapter 15 virtual servers 16 11
- Chapter 16 vpn 1 1 mapping 20 12
- Chapter 17 http redirect 24 12
- Chapter 18 smtp redirect 26 12
- Chapter 19 alg 29 12
- Chapter 20 upnp 32 12
- Chapter 21 ip mac binding 35 12
- Chapter 22 layer 2 isolation 37 13
- Chapter 23 ipnp 40 13
- Chapter 24 web authentication 42 13
- Chapter 25 walled garden 48 13
- Chapter 26 advertisement 50 13
- Chapter 27 firewall 51 13
- Chapter 28 billing 57 14
- Chapter 29 payment service 61 14
- Chapter 30 printer manager 64 14
- Chapter 31 free time 66 14
- Chapter 32 sms 68 14
- Chapter 33 bandwidth management 70 14
- Chapter 34 ipsec vpn 75 15
- Chapter 35 ssl vpn 84 15
- Chapter 36 content filtering 89 15
- Chapter 37 user group 00 15
- Chapter 38 addresses 07 16
- Chapter 39 services 10 16
- Chapter 40 schedules 13 16
- Chapter 41 aaa server 15 16
- Chapter 42 authentication objects 21 16
- Chapter 43 certificates 24 16
- Chapter 44 isp accounts 29 17
- Chapter 45 ssl application 31 17
- Chapter 46 endpoint security 33 17
- Chapter 47 dynamic guest accounts 40 17
- Chapter 48 system 43 17
- Chapter 49 system remote management 49 18
- Chapter 50 file manager 59 18
- Chapter 51 logs 72 19
- Chapter 52 reports and reboot 77 19
- Chapter 53 session timeout 82 19
- Chapter 54 diagnostics 83 19
- Chapter 55 packet flow explore 84 19
- Chapter 56 maintenance tools 88 19
- Chapter 57 watchdog timer 93 20
- List of commands alphabetical 97 20
- Introduction 21
- Accessing the cli 23
- Command line interface 23
- Overview 23
- The configuration file 23
- Console port 24
- Note before you can access the cli through the web configurator make sure your computer supports the java runtime environment you will be prompted to download and install the java plug in if it is not already installed 24
- Note the default login username is admin and password is 1234 the username and password are case sensitive 24
- Web configurator console 24
- Configure termina 26
- Note the default login username is admin it is case sensitive 26
- Router config 26
- How to find commands in this guide 27
- Note the default login username is admin and password is 1234 the username and password are case sensitive 27
- Ssh secure shell 27
- Telnet 27
- Telnet 192 68 27
- Background information optional 28
- Command examples optional 28
- Command input values optional 28
- Command summary 28
- Command syntax 28
- How commands are explained 28
- Note see the user s guide for background information about most features 28
- Service objec 28
- At the time of writing there is not much difference between user and privilege mode for admin users this is reserved for future use 29
- Changing the password 29
- Chapter 1 command line interface 29
- Cli modes 29
- Exactly as it appears followed by two numbers between 1 and 65535 29
- It is highly recommended that you change the password for accessing the uag see section 37 on page 201 for the appropriate commands 29
- See chapter 37 on page 200 for more information about the user types user users can only log in look at but not run the available commands in user mode and log out limited admin users can look at the configuration in the web configurator and cli and they can run basic diagnostics in the cli admin users can configure the uag in the web configurator or cli 29
- Table 2 cli modes 29
- Uag cli reference guide 29
- User privilege configuration sub command 29
- You run cli commands in one of several modes 29
- A list of valid commands can be found by typing 30
- At the command prompt to view a list of available commands within a command group enter 30
- Chapter 1 command line interface 30
- Figure 10 help available command example 2 30
- Figure 11 help sub command information example 30
- Figure 12 help required user input example 30
- Figure 9 help available commands example 1 30
- List of available commands 30
- List of sub commands or required user input 30
- Shortcuts and help 30
- To view detailed help information for a command enter 30
- Uag cli reference guide 30
- Command history 31
- Configur 31
- Entering a in a command 31
- Entering partial commands 31
- Erase current command 31
- Navigation 31
- The no commands 31
- Chapter 1 command line interface 32
- Description 32
- Input values 32
- Table 3 input value formats for strings in cli commands 32
- Tag values legal values 32
- The following table provides more information about input values like 32
- Uag cli reference guide 32
- You can use the or tab to get more information about the next input value that is required for a command in some cases the next input value is a string whose length and allowable characters may not be displayed in the screen for example in the following example the next input value is a string called 32
- Chapter 1 command line interface 33
- Table 3 input value formats for strings in cli commands continued 33
- Tag values legal values 33
- Uag cli reference guide 33
- Chapter 1 command line interface 34
- Table 3 input value formats for strings in cli commands continued 34
- Tag values legal values 34
- Uag cli reference guide 34
- Ethernet interfaces 35
- Logging out 35
- Note always save the changes before you log out after each management session all unsaved changes will be lost after the system restarts 35
- Saving configuration changes 35
- User and privilege modes 36
- Chapter 2 user and privilege modes 37
- Command mode description 37
- Command syntax description linux command equivalent 37
- Debug commands 37
- Debug commands marked with an asterisk are not available when the debug flag is on and are for zyxel service personnel use only the debug commands follow a linux based syntax so if there is a linux equivalent it is displayed in this chapter for your reference you must know a command listed here well before you use it otherwise it may cause undesired results 37
- Note these commands are for zyxel s internal manufacturing process 37
- Subsequent chapters in this guide describe the configuration commands user privilege mode commands that are also configuration commands for example show are described in more detail in the related configuration command chapter 37
- Table 4 user u and privilege p mode commands continued 37
- Table 5 debug commands 37
- Uag cli reference guide 37
- Chapter 2 user and privilege modes 38
- Command syntax description linux command equivalent 38
- Table 5 debug commands continued 38
- Uag cli reference guide 38
- Chapter 2 user and privilege modes 39
- Command syntax description linux command equivalent 39
- Table 5 debug commands continued 39
- Uag cli reference guide 39
- Reference 40
- Object reference 42
- Object reference commands 42
- Chapter 3 object reference 43
- Command description 43
- Object reference command example 43
- Table 6 show reference commands continued 43
- This example shows how to check which configuration is using an address object named lan1_subnet for the command output firewall rule 3 named lan1 to uag is using the address object 43
- Uag cli reference guide 43
- Status 44
- Chapter 4 status 45
- Here are examples of the commands that display the fan speed mac address memory usage ram size and serial number 45
- Here is an example of the command that displays the listening ports 45
- Here is an example of the command that displays the open ports 45
- Uag cli reference guide 45
- Chapter 4 status 46
- Here are examples of the commands that display the system uptime and model firmware and build information 46
- This example shows the current led states on the uag the sys led lights on and green 46
- Uag cli reference guide 46
- Content filtering subscription service 47
- Myzyxel com overview 47
- Registration 47
- Subscription services available on the uag 47
- Configure termina 48
- Maximum number of managed aps 48
- Registration commands v2 0 only 48
- Command examples 49
- Configure termina 49
- Registration status commands v4 0 and later only 49
- Chapter 5 registration 50
- Command examples 50
- Country code 50
- Country code country name country code country name 50
- Table 11 country codes 50
- The following command displays the service registration status and type and how many days remain before the service expires 50
- The following table displays the number for each country 50
- Uag cli reference guide 50
- Chapter 5 registration 51
- Country code country name country code country name 51
- Table 11 country codes continued 51
- Uag cli reference guide 51
- Chapter 5 registration 52
- Country code country name country code country name 52
- Table 11 country codes continued 52
- Uag cli reference guide 52
- Chapter 5 registration 53
- Country code country name country code country name 53
- Table 11 country codes continued 53
- Uag cli reference guide 53
- Ap management 54
- Ap management commands 54
- Ap management overview 54
- Chapter 6 ap management 55
- Command description 55
- Command to enter the configuration mode before you can use these commands 55
- Configure termina 55
- Table 13 command summary ap management 55
- The following table describes the commands available for ap management you must use the 55
- Uag cli reference guide 55
- Ap management commands example 56
- Chapter 6 ap management 56
- The following example shows you how to add an ap to the management list and then edit it 56
- Uag cli reference guide 56
- Ap profile commands 57
- Wireless lan profiles 57
- Wireless lan profiles overview 57
- Chapter 7 wireless lan profiles 58
- Command description 58
- Command to enter the configuration mode before you can use these commands 58
- Configure termina 58
- Label description 58
- Table 14 input values for general radio and monitor profile commands continued 58
- Table 15 command summary radio profile 58
- The following table describes the commands available for radio profile management you must use the 58
- Uag cli reference guide 58
- Chapter 7 wireless lan profiles 59
- Command description 59
- Table 15 command summary radio profile continued 59
- Uag cli reference guide 59
- Chapter 7 wireless lan profiles 60
- Command description 60
- Table 15 command summary radio profile continued 60
- Uag cli reference guide 60
- 2 g band with channel 6 61
- A beacon interval of 100ms 61
- A dtim period of 2 61
- A short guard interval 61
- Ampdu frame aggregation enabled 61
- Amsdu frame aggregation enabled 61
- An ampdu buffer limit of 65535 bytes 61
- An ampdu subframe limit of 64 frames 61
- An amsdu buffer limit of 4096 61
- An output power of 100 61
- Ap profile commands example 61
- Block acknowledgement enabled 61
- Channel width of 20mhz 61
- Chapter 7 wireless lan profiles 61
- Command description 61
- Table 15 command summary radio profile continued 61
- The following example shows you how to set up the radio profile named radio01 activate it and configure it to use the following settings 61
- Uag cli reference guide 61
- Chapter 7 wireless lan profiles 62
- It will also assign the ssid profile labeled default in order to create wlan vap wlan 1 1 functionality within the radio profile 62
- Label description 62
- Ssid profile commands 62
- Table 16 input values for general ssid profile commands 62
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 62
- Uag cli reference guide 62
- Chapter 7 wireless lan profiles 63
- Command description 63
- Command to enter the configuration mode before you can use these commands 63
- Configure termina 63
- Label description 63
- Table 16 input values for general ssid profile commands continued 63
- Table 17 command summary ssid profile 63
- The following table describes the commands available for ssid profile management you must use the 63
- Uag cli reference guide 63
- Chapter 7 wireless lan profiles 64
- Command description 64
- Command to enter the configuration mode before you can use these commands 64
- Configure termina 64
- Label description 64
- Security profile commands 64
- Ssid profile example 64
- Table 18 input values for general security profile commands 64
- Table 19 command summary security profile 64
- The following example creates an ssid profile with the name zyxel it makes the assumption that both the security profile security01 and the mac filter profile macfilter01 already exist 64
- The following table describes the commands available for security profile management you must use the 64
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 64
- Uag cli reference guide 64
- Chapter 7 wireless lan profiles 65
- Command description 65
- Table 19 command summary security profile continued 65
- Uag cli reference guide 65
- Chapter 7 wireless lan profiles 66
- Command description 66
- Command to enter the configuration mode before you can use these commands 66
- Configure termina 66
- Label description 66
- Mac filter profile commands 66
- Security profile example 66
- Table 20 input values for general mac filter profile commands 66
- Table 21 command summary mac filter profile 66
- The following example creates a security profile with the name security01 66
- The following table describes the commands available for security profile management you must use the 66
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 66
- Uag cli reference guide 66
- Chapter 7 wireless lan profiles 67
- Mac filter profile example 67
- The following example creates a mac filter profile with the name macfilter01 67
- Uag cli reference guide 67
- Interface overview 68
- Interfaces 68
- Types of interfaces 68
- Chapter 8 interfaces 69
- Characteristics ethernet ethernet vlan bridge ppp virtual 69
- In the uag interfaces are usually created on top of other interfaces only ethernet interfaces are created directly on top of the physical ports or port groups the relationships between interfaces are explained in the following table 69
- Interface required port interface 69
- Port groups and trunks have a lot of characteristics that are specific to each type of interface these characteristics are listed in the following tables and discussed in more detail farther on 69
- Relationships between interfaces 69
- Table 22 ethernet vlan bridge ppp and virtual interface characteristics 69
- Table 23 relationships between different types of interfaces 69
- Uag cli reference guide 69
- Chapter 8 interfaces 70
- Interface general commands summary 70
- Interface required port interface 70
- Label description 70
- Table 23 relationships between different types of interfaces continued 70
- Table 24 input values for general interface commands 70
- The following sections introduce commands that are supported by several types of interfaces 70
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 70
- Uag cli reference guide 70
- Basic interface properties and ip address commands 71
- Chapter 8 interfaces 71
- Command description 71
- Table 25 interface general commands basic properties and ip address assignment 71
- This table lists basic properties and ip address commands 71
- Uag cli reference guide 71
- Basic interface properties command examples 72
- Chapter 8 interfaces 72
- Command description 72
- Table 25 interface general commands basic properties and ip address assignment continued 72
- The following commands make ethernet interface wan1 a dhcp client 72
- Uag cli reference guide 72
- Chapter 8 interfaces 73
- This example shows how to change the user defined name from vip to partner note that you have to use the interface rename command if you do not know the system name of the interface to use the interface name command you have to find out the corresponding system name first ge4 in this example this example also shows how to change the user defined name from partner to customer using the interface name command 73
- This example shows how to modify the name of interface lan2 to vip first you have to check the interface system name ge4 in this example on the uag then change the name and display the result 73
- Uag cli reference guide 73
- Chapter 8 interfaces 74
- Command description 74
- Dhcp setting commands 74
- Table 26 interface commands dhcp settings 74
- This example shows how to restart an interface you can check all interface names on the uag then use either the system name or user defined name of an interface ge4 or customer in this example to restart it 74
- This table lists dhcp setting commands dhcp is based on dhcp pools create a dhcp pool if you want to assign a static ip address to a mac address or if you want to specify the starting ip address and pool size of a range of ip addresses that can be assigned to dhcp clients there are different commands for each configuration afterwards in either case you have to bind the dhcp pool to the interface 74
- Uag cli reference guide 74
- Chapter 8 interfaces 75
- Command description 75
- Note the dhcp pool must have the same subnet as the interface to which you plan to bind it 75
- Note the ip address must be in the same subnet as the interface to which you plan to bind the dhcp pool 75
- Table 26 interface commands dhcp settings continued 75
- Uag cli reference guide 75
- Chapter 8 interfaces 76
- Command description 76
- Note you must specify the network number first and the start address must be in the same subnet 76
- Table 26 interface commands dhcp settings continued 76
- Uag cli reference guide 76
- Chapter 8 interfaces 77
- Dhcp extended option setting command example 77
- Dhcp setting command examples 77
- The following example configures the dhcp_test pool with a sip server code 120 extended dhcp option with one ip address to provide to the sip clients 77
- The following example uses these commands to configure dhcp pool dhcp_test 77
- Uag cli reference guide 77
- Chapter 8 interfaces 78
- Command description 78
- Interface parameter command examples 78
- Rip commands 78
- Table 27 examples for different interface parameters ethernet virtual interface pppoe pptp 78
- Table 28 interface commands rip settings 78
- This table lists the commands for rip settings 78
- This table shows an example of each interface type s sub commands the sub commands vary for different interface types 78
- Uag cli reference guide 78
- Vlan bridge 78
- Chapter 8 interfaces 79
- Command description 79
- Ospf commands 79
- Table 28 interface commands rip settings continued 79
- Table 29 interface commands ospf settings 79
- This table lists the commands for ospf settings 79
- Uag cli reference guide 79
- Chapter 8 interfaces 80
- Command description 80
- Table 29 interface commands ospf settings continued 80
- Uag cli reference guide 80
- Chapter 8 interfaces 81
- Command description 81
- Connectivity check ping check commands 81
- Table 30 interface commands ping check 81
- This table lists the ping check commands 81
- Uag cli reference guide 81
- Use these commands to have an interface regularly check the connection to the gateway you specified to make sure it is still available you specify how often the interface checks the connection how long to wait for a response before the attempt is a failure and how many consecutive failures are required before the uag stops routing to the gateway the uag resumes routing to the gateway the first time the gateway passes the connectivity check 81
- Chapter 8 interfaces 82
- Command description 82
- Connectivity check command example 82
- Ethernet interface specific commands 82
- Label description 82
- Mac address setting commands 82
- Table 31 input values for ethernet interface commands 82
- Table 32 interface commands mac setting 82
- The following commands show you how to set the wan1 interface to use a tcp handshake on port 8080 to check the connection to ip address 1 82
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 82
- This section covers commands that are specific to ethernet interfaces 82
- This table lists the commands you can use to set the mac address of an interface 82
- Uag cli reference guide 82
- Chapter 8 interfaces 83
- Command description 83
- Note in cli representative interfaces are also called representative ports 83
- Port grouping commands 83
- Table 32 interface commands mac setting continued 83
- Table 33 basic interface setting commands 83
- This section covers commands that are specific to port grouping 83
- Uag cli reference guide 83
- Chapter 8 interfaces 84
- Port grouping command examples 84
- The following commands add physical port 5 to interface lan1 84
- The following commands set port 1 to use auto negotiation auto and port 2 to use a 10 mbps connection speed and half duplex 84
- The following commands set up a virtual interface on top of ethernet interface lan1 the virtual interface is named lan1 1 with the following parameters ip 1 subnet 255 55 55 84
- Uag cli reference guide 84
- Virtual interface command examples 84
- Virtual interface specific commands 84
- Virtual interfaces use many of the general interface commands discussed at the beginning of section 8 on page 70 there are no additional commands for virtual interfaces 84
- Chapter 8 interfaces 85
- Command description 85
- Gateway 4 upstream bandwidth 345 downstream bandwidth 123 and description i am vir interface 85
- Label description 85
- Pppoe pptp specific commands 85
- Table 34 input values for pppoe pptp interface commands 85
- Table 35 interface commands pppoe pptp interfaces 85
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 85
- This section covers commands that are specific to pppoe pptp interfaces pppoe pptp interfaces also use many of the general interface commands discussed at the beginning of section 8 on page 70 85
- This table lists the pppoe pptp interface commands 85
- Uag cli reference guide 85
- Chapter 8 interfaces 86
- Command description 86
- Note for the uag which supports more than one usb ports these commands only apply to the usb storage device that is first attached to the uag 86
- Pppoe pptp interface command examples 86
- Table 35 interface commands pppoe pptp interfaces continued 86
- Table 36 usb storage general commands 86
- The following commands show you how to configure pppoe pptp interface ppp0 with the following characteristics base interface wan1 isp account hinet local address 1 remote address 2 mtu 1200 upstream bandwidth 345 downstream bandwidth 123 description i am ppp0 and dialed only when used 86
- The following commands show you how to connect and disconnect ppp0 86
- Uag cli reference guide 86
- Usb storage specific commands 86
- Use these commands to configure settings that apply to the usb storage device connected to the uag 86
- Chapter 8 interfaces 87
- Command description 87
- Table 36 usb storage general commands continued 87
- This example shows how to display the status of the connected usb storage device 87
- This section covers commands that are specific to vlan interfaces vlan interfaces also use many of the general interface commands discussed at the beginning of section 8 on page 70 87
- Uag cli reference guide 87
- Usb storage general commands example 87
- Vlan interface specific commands 87
- Bridge specific commands 88
- Chapter 8 interfaces 88
- Command description 88
- Label description 88
- Table 37 input values for vlan interface commands 88
- Table 38 interface commands vlan interfaces 88
- The following commands show you how to set up vlan vlan100 with the following parameters vlan id 100 interface lan1 ip 1 subnet 255 55 55 mtu 598 gateway 2 description i am vlan100 upstream bandwidth 345 and downstream bandwidth 123 88
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 88
- This section covers commands that are specific to bridge interfaces bridge interfaces also use many of the general interface commands discussed at the beginning of section 8 on page 70 88
- This table lists the vlan interface commands 88
- Uag cli reference guide 88
- Vlan interface command examples 88
- Bridge interface command examples 89
- Chapter 8 interfaces 89
- Command description 89
- Label description 89
- Table 39 input values for bridge interface commands 89
- Table 40 interface commands bridge interfaces 89
- The following commands show you how to set up a bridge interface named br0 with the following parameters member lan1 ip 1 subnet 255 55 55 mtu 598 gateway 2 upstream bandwidth 345 downstream bandwidth 123 and description i am br0 89
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 89
- This table lists the bridge interface commands 89
- Uag cli reference guide 89
- Trunk scenario examples 90
- Trunks 90
- Trunks overview 90
- Chapter 9 trunks 91
- Command description 91
- Command to enter the configuration mode before you can use these commands see table 41 on page 91 for details about the values you can input with these commands 91
- Commands 91
- Commands you must use the 91
- Configure termina 91
- Interface grou 91
- Interface group 91
- Label description 91
- Table 41 interface group command input values 91
- Table 42 interface group commands summary 91
- The following table explains the values you can input with the 91
- The following table lists the 91
- Trunk commands input values 91
- Trunk commands summary 91
- Uag cli reference guide 91
- Chapter 9 trunks 92
- Command description 92
- Table 42 interface group commands summary continued 92
- The following example creates a least load first trunk for ethernet interface lan1 and vlan 5 which will only apply to outgoing traffic through the trunk the uag sends new session traffic through the least utilized of these interfaces 92
- The following example creates a spill over trunk for ethernet interfaces wan1 and wan2 which will apply to both incoming and outgoing traffic through the trunk the uag sends traffic through wan1 until it hits the limit of 1000 kbps the uag sends anything over 1000 kbps through wan2 92
- The following example creates a weighted round robin trunk for ethernet interfaces wan1 and wan2 the uag sends twice as much traffic through ge1 92
- Trunk command examples 92
- Uag cli reference guide 92
- Configure termina 93
- Link sticking 93
- Link sticking commands summary 93
- Wan1 wan2 93
- Chapter 9 trunks 94
- Command description 94
- Link sticking command example 94
- Mode before you can use these commands see table 41 on page 91 for details about the values you can input with these commands 94
- Table 43 ip load balancing link sticking commands summary 94
- This example shows how to activate link sticking and set the timeout to 600 seconds ten minutes 94
- Uag cli reference guide 94
- Drop in mode overview 96
- Ip drop in 96
- Chapter 10 ip drop in 97
- Command description 97
- Command to enter the configuration mode before you can use these commands 97
- Configure termina 97
- Drop in commands 97
- Drop in limitations 97
- Label description 97
- Table 44 input values for general drop in commands 97
- Table 45 ip drop in commands 97
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 97
- The interfaces in drop in mode cannot be part of a bridge interface 97
- The interfaces in drop in mode cannot join the port group of the interfaces that are not in drop in mode but other interfaces can join a drop in interface s port group 97
- This table lists the ip drop in commands you must use the 97
- Uag cli reference guide 97
- You cannot create a policy route static route nat rule or vpn 1 1 mapping rule for an interface in drop in mode 97
- You cannot enable ipnp upnp or layer 2 isolation on a lan interface in drop in mode the interface cannot be used for printer management and web authentication nor provide sms free time and billing services 97
- You must configure a drop in wan interface s ip address before setting it to work in drop in mode 97
- Chapter 10 ip drop in 98
- The following example shows you how to set the drop in wan interface and lan interface set a wan host turn on the dop in mode and show the settings 98
- Uag cli reference guide 98
- Policy route 99
- Policy route commands 99
- Chapter 11 route 100
- Command description 100
- Command to enter the configuration mode before you can use these commands 100
- Configure termina 100
- Table 47 command summary policy route 100
- The following table describes the commands available for policy route you must use the 100
- Uag cli reference guide 100
- Chapter 11 route 101
- Command description 101
- Table 47 command summary policy route continued 101
- Uag cli reference guide 101
- Assured forwarding af behavior is defined in rfc 2597 the af behavior group defines four af classes inside each class packets are given a high medium or low drop precedence the drop precedence determines the probability that routers in the network will drop packets when congestion occurs if congestion occurs between classes the traffic in the higher class smaller numbered class is generally given priority combining the classes and drop precedence produces the following twelve dscp encodings from af11 through af43 the decimal equivalent is listed in brackets 102
- Assured forwarding af phb for diffserv 102
- Chapter 11 route 102
- Class 1 class 2 class 3 class 4 102
- Command description 102
- Policy route command example 102
- Table 47 command summary policy route continued 102
- Table 48 assured forwarding af behavior group 102
- The following commands create two address objects tw_subnet and gw_1 and insert a policy that routes the packets with the source ip address tw_subnet and any destination ip address 102
- Uag cli reference guide 102
- Chapter 11 route 103
- Ip static route 103
- The uag has no knowledge of the networks beyond the network that is directly connected to the uag for instance the uag knows about network n2 in the following figure through gateway r1 however the uag is unable to route a packet to network n3 because it doesn t know that there is 103
- Through the interface wan1 to the next hop router gw_1 this route uses the ip address of the outgoing interface as the matched packets source ip address 103
- Uag cli reference guide 103
- Configure termina 104
- Static route commands 104
- Static route commands examples 105
- Routing protocol 106
- Routing protocol commands summary 106
- Routing protocol overview 106
- Chapter 12 routing protocol 107
- Command description 107
- General ospf commands 107
- Rip commands 107
- Table 52 router commands rip 107
- Table 53 router commands general ospf configuration 107
- This table lists the commands for general ospf configuration 107
- This table lists the commands for rip 107
- Uag cli reference guide 107
- Chapter 12 routing protocol 108
- Command description 108
- Ospf area commands 108
- Table 54 router commands ospf areas 108
- Table 55 router commands virtual links in ospf areas 108
- This table lists the commands for ospf areas 108
- This table lists the commands for virtual links in ospf areas 108
- Uag cli reference guide 108
- Virtual link commands 108
- Chapter 12 routing protocol 109
- Command description 109
- Learned routing information commands 109
- Show ip route command example 109
- Table 56 ip route commands learned routing information 109
- The following example shows learned routing information on the uag 109
- This table lists the commands to look at learned routing information 109
- Uag cli reference guide 109
- Zones overview 110
- Chapter 13 zones 111
- Command description 111
- Label description 111
- Table 57 input values for zone commands 111
- Table 58 zone commands 111
- The following table describes the values required for many zone commands other values are discussed with the corresponding commands s 111
- This table lists the zone commands 111
- Uag cli reference guide 111
- Zone commands summary 111
- Chapter 13 zones 112
- The following commands add interfaces vlan123 and vlan234 to zone a and block intra zone traffic 112
- Uag cli reference guide 112
- Zone command examples 112
- Ddns overview 113
- Chapter 14 ddns 114
- Command description 114
- Ddns commands summary 114
- Label description 114
- Table 60 input values for ddns commands 114
- Table 61 ip ddns commands 114
- The following table describes the values required for many ddns commands other values are discussed with the corresponding commands 114
- The following table lists the ddns commands 114
- Uag cli reference guide 114
- Chapter 14 ddns 115
- Command description 115
- Table 61 ip ddns commands continued 115
- Uag cli reference guide 115
- 1 1 nat and many 1 1 nat 116
- Virtual server commands summary 116
- Virtual server overview 116
- Virtual servers 116
- Chapter 15 virtual servers 117
- Command description 117
- Table 63 ip virtual server commands 117
- The following table lists the virtual server commands 117
- Uag cli reference guide 117
- Chapter 15 virtual servers 118
- Command description 118
- Table 63 ip virtual server commands continued 118
- The following command creates virtual server wan lan_h323 on the wan1 interface that maps ip addresses 10 to 192 68 6 for tcp protocol traffic on port 1720 it also adds a nat loopback entry 118
- The following command shows information about all the virtual servers in the uag 118
- Uag cli reference guide 118
- Virtual server command examples 118
- Tutorial how to allow public access to a server 119
- Vpn 1 1 mapping 120
- Vpn 1 1 mapping commands 120
- Vpn 1 1 mapping overview 120
- Chapter 16 vpn 1 1 mapping 121
- Command description 121
- Command to enter the configuration mode before you can use the configuration commands 121
- Configure termina 121
- Table 65 command summary vpn 1 1 map 121
- The following table describes the commands available for vpn 1 1 mapping you must use the 121
- Uag cli reference guide 121
- Chapter 16 vpn 1 1 mapping 122
- Command description 122
- Note it s recommended that the ip addresses of the configured address object and the wan interface are in the same subnet so that the uag can receive response packets from the remote node 122
- Note you cannot configure an address group object at the time of writing 122
- Table 66 vpn 1 1 map pool sub commands 122
- Table 67 vpn 1 1 map rule sub commands 122
- The following commands create a pool profile and display the settings 122
- The following table describes the sub commands for several vpn 1 1 map rule commands note that not all rule commands use all the sub commands listed here 122
- The following table describes the sub commands for the vpn 1 1 map pool command 122
- Uag cli reference guide 122
- Vpn 1 1 map pool command examples 122
- Vpn 1 1 map pool sub commands 122
- Vpn 1 1 map rule sub commands 122
- Chapter 16 vpn 1 1 mapping 123
- Command description 123
- Table 67 vpn 1 1 map rule sub commands continued 123
- The following command shows statistics for each of the vpn 1 1 mapping rules this displays how many times the uag applied the rule to a user successfully or failed to apply the rule to a user this also shows the maximum number of times the uag has applied the rule to a user successfully 123
- The following commands create a vpn 1 1 mapping rule enable it and display the settings 123
- Uag cli reference guide 123
- Vpn 1 1 map rule command examples 123
- Vpn 1 1 map statistics command examples 123
- Http redirect 124
- Http redirect commands 124
- Http redirect overview 124
- Web proxy server 124
- Chapter 17 http redirect 125
- Command description 125
- Http redirect command examples 125
- Table 69 command summary http redirect continued 125
- The following commands create a http redirect rule disable it and display the settings 125
- Uag cli reference guide 125
- Smtp redirect 126
- Smtp redirect commands 126
- Smtp redirect overview 126
- Chapter 18 smtp redirect 127
- Command description 127
- Command to enter the configuration mode before you can use the configuration commands 127
- Configure termina 127
- Smtp redirect sub commands 127
- Table 71 command summary smtp redirect 127
- Table 72 smtp redirect sub commands 127
- The following table describes the commands available for smtp redirection you must use the 127
- The following table describes the sub commands for several smtp redirect commands note that not all rule commands use all the sub commands listed here 127
- Uag cli reference guide 127
- Chapter 18 smtp redirect 128
- Smtp redirect command examples 128
- The following commands create a smtp redirect rule enable it and display the settings 128
- Uag cli reference guide 128
- Alg introduction 129
- Alg commands 130
- Chapter 19 alg 130
- Command description 130
- Command to enter the configuration mode before you can use these commands 130
- Commands you must use the 130
- Configure termina 130
- Table 73 alg commands 130
- The following table lists the 130
- Uag cli reference guide 130
- Alg commands example 131
- Upnp and nat pmp commands 132
- Upnp and nat pmp overview 132
- Chapter 20 upnp 133
- Command description 133
- Table 74 ip upnp commands continued 133
- The following example turns on upnp and nat pmp on the uag and it s two lan interfaces it also shows the upnp and nat pmp settings 133
- Uag cli reference guide 133
- Upnp nat pmp commands example 133
- Chapter 20 upnp 134
- The following example displays the uag s port mapping entries and removes the entry with the specified port number and protocol type 134
- Uag cli reference guide 134
- Ip mac binding 135
- Ip mac binding commands 135
- Ip mac binding overview 135
- Chapter 21 ip mac binding 136
- Ip mac binding commands example 136
- The following example enables ip mac binding on the lan1 interface and displays the interface s ip mac binding status 136
- Uag cli reference guide 136
- Layer 2 isolation 137
- Layer 2 isolation overview 137
- Chapter 22 layer 2 isolation 138
- Command description 138
- Command to enter the configuration mode before you can use these commands 138
- Configure terminal 138
- Layer 2 isolation commands 138
- Layer 2 isolation white list sub commands 138
- Table 76 l2 isolation commands 138
- Table 77 l2 isolation white list sub commands 138
- The following table describes the sub commands for l2 isolation white list commands 138
- The following table lists the l2 isolation commands you must use the 138
- Uag cli reference guide 138
- Chapter 22 layer 2 isolation 139
- Layer 2 isolation commands example 139
- The following example enables layer 2 isolation on the uag and interface lan2 it also creates a rule in the white list to allow access to the device with ip address 172 7 6 it then displays the layer 2 isolation settings 139
- Uag cli reference guide 139
- Ipnp commands 140
- Ipnp overview 140
- Chapter 23 ipnp 141
- Ipnp commands example 141
- The following example enables ipnp on the uag and interface lan1 it also displays the ipnp settings 141
- Uag cli reference guide 141
- Web authentication 142
- Web authentication commands 142
- Web authentication overview 142
- Chapter 24 web authentication 143
- Command description 143
- Note if you select the external option you cannot use endpoint security to make sure that users computers meet specific security requirements before they can access the network 143
- Table 79 web auth commands continued 143
- Table 80 web auth login setting sub commands 143
- The following table describes the sub commands for the web auth login setting command 143
- Uag cli reference guide 143
- Web auth login setting sub commands 143
- Chapter 24 web authentication 144
- Command description 144
- Table 80 web auth login setting sub commands continued 144
- Uag cli reference guide 144
- Chapter 24 web authentication 145
- Command description 145
- Table 81 web auth policy sub commands 145
- The following table describes the sub commands for several web auth policy commands note that not all rule commands use all the sub commands listed here 145
- Uag cli reference guide 145
- Web auth policy sub commands 145
- Activate yes 146
- Chapter 24 web authentication 146
- Command description 146
- Description eps on lan 146
- Destination use address object dmz_servers 146
- Endpoint security activate 146
- Schedule no specified 146
- Source use address object lan1_subnet 146
- Table 82 web auth user agreement sub commands 146
- The following commands show how to insert a web authentication policy at position 1 of the checking order this policy applies endpoint security policies and uses the following settings 146
- The following table describes the sub commands for several web auth user agreement commands note that not all rule commands use all the sub commands listed here 146
- Uag cli reference guide 146
- User authentication required 146
- Web auth user agreement sub commands 146
- Web authentication policy insert command example 146
- Chapter 24 web authentication 147
- Endpoint security object use eps winxp and eps winvista for the first and second checking eps objects 147
- Uag cli reference guide 147
- Walled garden 148
- Walled garden commands 148
- Walled garden overview 148
- Activate yes 149
- Chapter 25 walled garden 149
- Command description 149
- Name example1 149
- Table 84 walled garden rule sub commands 149
- The following table describes the sub commands for several walled garden rule commands note that not all rule commands use all the sub commands listed here 149
- This example shows how to enable the walled garden feature and insert a walled garden link rule at position 1 of the checking order this example also displays the rule settings the link rule uses the following settings 149
- Uag cli reference guide 149
- Url www example com 149
- Walled garden command example 149
- Walled garden rule sub commands 149
- Advertisement 150
- Advertisement command example 150
- Advertisement commands 150
- Advertisement overview 150
- Firewall 151
- Firewall overview 151
- Chapter 27 firewall 152
- Command description 152
- Command to enter the configuration mode before you can use the configuration commands 152
- Configure termina 152
- Firewall commands 152
- Label description 152
- Table 86 input values for general firewall commands 152
- Table 87 command summary firewall 152
- The following table describes the commands available for the firewall you must use the 152
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 152
- Uag cli reference guide 152
- Chapter 27 firewall 153
- Command description 153
- Table 87 command summary firewall continued 153
- Uag cli reference guide 153
- Chapter 27 firewall 154
- Command description 154
- Firewall command examples 154
- Firewall sub commands 154
- Table 88 firewall sub commands 154
- The following table describes the sub commands for several firewall commands 154
- These are ipv4 firewall configuration examples 154
- Uag cli reference guide 154
- Chapter 27 firewall 155
- Create a service object 155
- Create an ip address object 155
- Enter configuration command mode 155
- Enter the firewall sub command mode to add a firewall rule 155
- Label description 155
- Session limit commands 155
- Set the action the uag is to take on packets which match this rule 155
- Set the destination ip address es 155
- Set the direction of travel of packets to which the rule applies 155
- Set the service to which this rule applies 155
- Table 89 input values for general session limit commands 155
- The following command displays the default ipv4 firewall rule that applies to the wan to uag packet direction the firewall rule number is in the rule s priority number in the global rule list 155
- The following example shows you how to add an ipv4 firewall rule to allow a myservice connection from the wan zone to the ip addresses dest_1 in the lan zone 155
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 155
- Uag cli reference guide 155
- Chapter 27 firewall 156
- Command description 156
- Command to enter the configuration mode before you can use these commands 156
- Configure termina 156
- Table 90 command summary session limit 156
- The following table describes the session limit commands you must use the 156
- Uag cli reference guide 156
- Billing 157
- Billing commands 157
- Billing overview 157
- Billing profile sub commands 158
- Chapter 28 billing 158
- Command description 158
- Table 91 billing commands continued 158
- Table 92 billing profile sub commands 158
- The following table describes the sub commands for the billing profile command 158
- Uag cli reference guide 158
- Billing command example 159
- Chapter 28 billing 159
- This example applies the billing profile billing_1hour to button a of the web based account generator and button a on a connected statement printer it also displays the default discount price 159
- This example creates a billing profile named billing_1hour and displays the profile settings 159
- This example enables and creates a custom discount pricing plan it uses button a to assign the base charge and also shows the discount status and plan settings 159
- This example sets the accounting method to time to finish and configures the idle timeout that elapses before the uag disconnects a user 159
- Uag cli reference guide 159
- Chapter 28 billing 160
- Plan settings that is the billing profile settings for button a when it is selected as the button to assign the base charge 160
- Uag cli reference guide 160
- Payment service 161
- Payment service commands 161
- Payment service overview 161
- Chapter 29 payment service 162
- Command description 162
- Table 94 payment service commands continued 162
- Uag cli reference guide 162
- Chapter 29 payment service 163
- Command description 163
- Payment service command example 163
- Payment service provider paypal sub commands 163
- Table 95 payment service provider paypal sub commands 163
- The following table describes the sub commands for the payment service provider paypal command 163
- This example configures the paypal account information and displays the settings it also enables online payment service and sets how the uag provides dynamic guest account information after the user s online payment is done 163
- Uag cli reference guide 163
- Printer manager 164
- Printer manager commands 164
- Printer manager overview 164
- Chapter 30 printer manager 165
- Command description 165
- Printer manager command example 165
- Printer manager printer sub commands 165
- Table 96 printer manager commands continued 165
- Table 97 printer manager printer sub commands 165
- The following table describes the sub commands for the printer manager printer command 165
- This example adds a printer to the managed printer list and displays the printer settings 165
- Uag cli reference guide 165
- Free time 166
- Free time commands 166
- Free time overview 166
- Chapter 31 free time 167
- Free time commands example 167
- The following example enables the free time feature and sets the uag to provide user account information in the web screen and also sent account information via sms text messages it then displays the free time settings 167
- Uag cli reference guide 167
- Sms commands 168
- Sms overview 168
- Chapter 32 sms 169
- Sms commands example 169
- The following example enables the sms service on the uag to provide and configures the vianett account information it then displays the sms settings 169
- Uag cli reference guide 169
- Bandwidth management 170
- Bandwidth management commands 170
- Bandwidth management overview 170
- Bwm type 170
- Bandwidth sub commands 171
- Chapter 33 bandwidth management 171
- Command description 171
- Table 100 bwm commands continued 171
- Table 101 bwm sub commands 171
- The following table describes the sub commands for several bwm commands 171
- Uag cli reference guide 171
- Chapter 33 bandwidth management 172
- Command description 172
- Table 101 bwm sub commands continued 172
- Uag cli reference guide 172
- Chapter 33 bandwidth management 173
- Command description 173
- Table 101 bwm sub commands continued 173
- Uag cli reference guide 173
- Bandwidth management commands example 174
- Chapter 33 bandwidth management 174
- The following example adds a new bandwidth management policy for trial users to limit incoming and outgoing bandwidth and sets the traffic priority to 3 it then displays the policy settings 174
- Uag cli reference guide 174
- Ipsec vpn 175
- Ipsec vpn overview 175
- Ipsec vpn commands summary 176
- Chapter 34 ipsec vpn 177
- Command description 177
- Ike sa commands 177
- Label description 177
- Table 102 input values for ipsec vpn commands continued 177
- Table 103 isakmp commands ike sas 177
- The following sections list the ipsec vpn commands 177
- This table lists the commands for ike sas vpn gateways 177
- Uag cli reference guide 177
- Aaa authentication 178
- Chapter 34 ipsec vpn 178
- Command description 178
- Ipsec sa commands except manual keys 178
- Table 103 isakmp commands ike sas continued 178
- Table 104 crypto commands ipsec sas 178
- This table lists the commands for ipsec sas excluding manual keys vpn connections using vpn gateways 178
- Uag cli reference guide 178
- Chapter 34 ipsec vpn 179
- Command description 179
- Note you must allow traffic whose source and destination ip addresses do not match the local and remote policy if you want to use the ipsec sa in a vpn concentrator 179
- Table 104 crypto commands ipsec sas continued 179
- Uag cli reference guide 179
- Chapter 34 ipsec vpn 180
- Command description 180
- Table 104 crypto commands ipsec sas continued 180
- Uag cli reference guide 180
- Chapter 34 ipsec vpn 181
- Command description 181
- Ipsec sa commands for manual keys 181
- Table 105 crypto map commands ipsec sas manual keys 181
- Table 106 vpn concentrator commands vpn concentrator 181
- This table lists the additional commands for ipsec sas using manual keys vpn connections using manual keys 181
- This table lists the commands for the vpn concentrator 181
- Uag cli reference guide 181
- Vpn concentrator commands 181
- Chapter 34 ipsec vpn 182
- Command description 182
- Table 106 vpn concentrator commands vpn concentrator continued 182
- Table 107 vpn configuration provision commands vpn configuration provisioning 182
- This table lists the commands for vpn configuration provisioning 182
- Uag cli reference guide 182
- Vpn configuration provisioning commands 182
- Chapter 34 ipsec vpn 183
- Command description 183
- Sa monitor commands 183
- Table 108 sa commands sa monitor 183
- This table lists the commands for the sa monitor 183
- Uag cli reference guide 183
- Ssl access policy 184
- Ssl access policy limitations 184
- Ssl application objects 184
- Ssl vpn 184
- Ssl vpn commands 184
- Chapter 35 ssl vpn 185
- Command description 185
- Command to enter the configuration mode before you can use these commands 185
- Configure termina 185
- Label description 185
- Ssl vpn commands 185
- Table 109 input values for ssl vpn commands continued 185
- Table 110 ssl vpn commands 185
- The following sections list the ssl vpn commands 185
- This table lists the commands for ssl vpn you must use the 185
- Uag cli reference guide 185
- Chapter 35 ssl vpn 186
- Command description 186
- Here is an example ssl vpn configuration the ssl vpn rule defines 186
- Only users using the tester account can use the ssl vpn 186
- Setting an ssl vpn rule tutorial 186
- Table 110 ssl vpn commands 186
- The ssl vpn users are allowed to access the uag s local network 172 6 0 24 defined in object network1 186
- The uag will assign an ip address from 192 68 00 to 192 68 00 0 defined in object ip pool to the computers which match the rule s criteria 186
- The uag will assign two dns server settings 172 6 and 172 6 defined in objects dns1 and dns2 to the computers which match the rule s criteria 186
- Trendmicro pc cillin internet security 2007 is installed and activated 186
- Uag cli reference guide 186
- Users have to access the ssl vpn using a computer that complies with all the following criteria defined in object eps 1 186
- Windows xp is installed 186
- Chapter 35 ssl vpn 187
- Create an endpoint security profile named eps 1 ssl vpn users computers must install windows xp and trendmicro pc cillin internet security 2007 besides the pc cillin anti virus must be activated 187
- Create an ssl vpn rule named ssl_vpn_test enable it and apply objects you just created 187
- Create four address objects for the ssl vpn dhcp pool dns servers and the local network for ssl vpn authenticated users to access 187
- Create the ssl vpn user account named tester with password 1234 187
- First of all configure 10 54 24 for the ip address of interface wan1 which is an external interface for public ssl vpn to access configure 172 6 0 54 24 for the ip address of interface lan2 which is an internal network 187
- Uag cli reference guide 187
- Chapter 35 ssl vpn 188
- Displays the ssl vpn rule settings 188
- Uag cli reference guide 188
- Content filtering 189
- Content filtering overview 189
- Content filtering policies 189
- Content filtering reports 189
- External web filtering service 189
- Chapter 36 content filtering 190
- Commands 190
- Content filte 190
- Content filter command input values 190
- Label description 190
- Table 111 content filter command input values 190
- The following table explains the values you can input with the 190
- Uag cli reference guide 190
- Chapter 36 content filtering 191
- Command to enter the configuration 191
- Configure termina 191
- General content filter commands 191
- Label description 191
- Table 111 content filter command input values continued 191
- The following table lists the commands that you can use for general content filter configuration such as enabling content filtering viewing and ordering your list of content filtering policies creating a denial of access message or specifying a redirect url and checking your external web filtering service registration status use the 191
- Uag cli reference guide 191
- Chapter 36 content filtering 192
- Command description 192
- Mode to be able to use these commands see table 111 on page 190 for details about the values you can input with these commands 192
- Table 112 content filter general commands 192
- Uag cli reference guide 192
- Chapter 36 content filtering 193
- Command description 193
- Command to enter the configuration mode to be able to use these commands see table 111 on page 190 for details about the values you can input with these commands 193
- Configure termina 193
- Content filter filtering profile commands 193
- Table 112 content filter general commands continued 193
- Table 113 content filter filtering profile commands summary 193
- The following table lists the commands that you can use to configure a content filtering policy a content filtering policy defines which content filter profile should be applied when it should be applied and to whose web access it should be applied use the 193
- Uag cli reference guide 193
- Chapter 36 content filtering 194
- Command description 194
- Table 113 content filter filtering profile commands summary continued 194
- Uag cli reference guide 194
- Chapter 36 content filtering 195
- Command description 195
- Content filter url cache commands 195
- Table 113 content filter filtering profile commands summary continued 195
- The following table lists the commands that you can use to view and configure your uag s url caching you can configure how long a categorized web site address remains in the as well as view those web site addresses to which access has been allowed or blocked based on the responses from the external content filtering server the uag only queries the external content filtering database for sites not found in the cache 195
- Uag cli reference guide 195
- Chapter 36 content filtering 196
- Command description 196
- Command to enter the configuration mode before you can use these commands 196
- Command to enter the configuration mode to be able to use these commands see table 111 on page 190 for details about the values you can input with these commands 196
- Configure termina 196
- Content filtering statistics 196
- Table 114 content filter url cache commands 196
- Table 115 commands for content filtering statistics 196
- The following table describes the commands for collecting and displaying content filtering statistics you must use the 196
- Uag cli reference guide 196
- Use the 196
- Chapter 5 on page 47 197
- Content filtering commands example 197
- Content filtering statistics example 197
- Note you must register for the external web filtering service before you can use it see 197
- Activate the customization 198
- Chapter 36 content filtering 198
- Uag cli reference guide 198
- Chapter 36 content filtering 199
- Uag cli reference guide 199
- Use this command to display the settings of the profile 199
- User account overview 200
- User group 200
- User types 200
- Chapter 37 user group 201
- Command description 201
- Commands 201
- Commands other input values are discussed with the corresponding commands 201
- Label description 201
- Table 117 username groupname command input values 201
- Table 118 username groupname commands summary users 201
- The first table lists the commands for users 201
- The following sections list the 201
- The following table identifies the values required for many 201
- Uag cli reference guide 201
- User commands 201
- User group commands summary 201
- Username groupnam 201
- Chapter 37 user group 202
- Command description 202
- Table 118 username groupname commands summary users continued 202
- Table 119 username groupname commands summary groups 202
- The following commands create a new user account and show the user information 202
- This table lists the commands for groups 202
- Uag cli reference guide 202
- User group commands 202
- Username setting command examples 202
- Chapter 37 user group 203
- Command description 203
- Table 120 username groupname commands summary settings 203
- This table lists the commands for user settings except for forcing user authentication 203
- Uag cli reference guide 203
- User setting commands 203
- Additional user commands 204
- Chapter 37 user group 204
- Command description 204
- Table 120 username groupname commands summary settings continued 204
- Table 121 username groupname commands summary additional 204
- The following commands show the current settings for the number of simultaneous logins 204
- This table lists additional commands for users 204
- Uag cli reference guide 204
- User setting command examples 204
- Additional user command examples 205
- Chapter 37 user group 205
- The following commands display the users that are currently logged in to the uag and forces the logout of all logins from a specific ip address 205
- Uag cli reference guide 205
- Chapter 37 user group 206
- The following commands display the users that are currently locked out and then unlocks the user who is displayed 206
- Uag cli reference guide 206
- Address commands summary 207
- Address overview 207
- Addresses 207
- Address group commands 208
- Address object command examples 208
- Address object commands 208
- Chapter 38 addresses 208
- Command description 208
- Table 123 address object and address6 object commands 208
- Table 124 object group commands address groups 208
- The following example creates three ipv4 address objects and then deletes one 208
- This table lists the commands for address groups 208
- This table lists the commands for address objects 208
- Uag cli reference guide 208
- Address group command examples 209
- Chapter 38 addresses 209
- Command description 209
- Table 124 object group commands address groups continued 209
- The following commands create three address objects a0 a1 and a2 and add a1 and a2 to address group rd 209
- Uag cli reference guide 209
- Service object commands 210
- Services 210
- Services commands summary 210
- Services overview 210
- Chapter 39 services 211
- Command description 211
- Service group commands 211
- Service object command examples 211
- Table 126 service object commands service objects continued 211
- Table 127 object group commands service groups 211
- The first table lists the commands for service groups 211
- The following commands create four services displays them and then removes one of them 211
- Uag cli reference guide 211
- Chapter 39 services 212
- Command description 212
- Service group command examples 212
- Table 127 object group commands service groups continued 212
- The following commands create service icmp_echo create service group sg1 and add icmp_echo to sg1 212
- Uag cli reference guide 212
- Schedule commands summary 213
- Schedule overview 213
- Schedules 213
- Chapter 40 schedules 214
- Command description 214
- Schedule command examples 214
- Table 129 schedule commands continued 214
- The following commands create recurring schedule schedule1 and one time schedule schedule2 and then delete schedule1 214
- Uag cli reference guide 214
- Aaa server 215
- Aaa server overview 215
- Ad server commands 215
- Authentication server command summary 215
- Chapter 41 aaa server 216
- Command description 216
- Commands you use to set the default ldap server 216
- Ldap server 216
- Ldap server commands 216
- Table 130 ad server commands continued 216
- Table 131 ldap server commands 216
- The following table lists the 216
- Uag cli reference guide 216
- Aaa group server ad 217
- Aaa group server ad commands 217
- Chapter 41 aaa server 217
- Command description 217
- Commands you use to configure a group of ad servers 217
- Commands you use to set the default radius server 217
- Note you can not delete a server group that is currently in use 217
- Radius server 217
- Radius server command example 217
- Radius server commands 217
- Table 132 radius server commands 217
- Table 133 aaa group server ad commands 217
- The following example sets the secret key and timeout period of the default radius server 172 6 0 00 to 87643210 and 80 seconds 217
- The following table lists the 217
- Uag cli reference guide 217
- Aaa group server ldap 218
- Aaa group server ldap commands 218
- Chapter 41 aaa server 218
- Command description 218
- Commands you use to configure a group of ldap servers 218
- Note you can not delete a server group that is currently in use 218
- Table 133 aaa group server ad commands continued 218
- Table 134 aaa group server ldap commands 218
- The following table lists the 218
- Uag cli reference guide 218
- Aaa group server radius 219
- Aaa group server radius commands 219
- Chapter 41 aaa server 219
- Command description 219
- Commands you use to configure a group of radius servers 219
- Note you can not delete a server group that is currently in use 219
- Table 134 aaa group server ldap commands continued 219
- Table 135 aaa group server radius commands 219
- The following table lists the 219
- Uag cli reference guide 219
- Aaa group server command example 220
- Chapter 41 aaa server 220
- Command description 220
- Table 135 aaa group server radius commands continued 220
- The following example creates a radius server group with two members and sets the secret key to 12345678 and the timeout to 100 seconds then this example also shows how to view the radius group settings 220
- Uag cli reference guide 220
- Aaa authentication commands 221
- Authentication objects 221
- Authentication objects overview 221
- Aaa authentication command example 222
- Base dn dc zyxel dc com 222
- Chapter 42 authentication objects 222
- Command description 222
- Command you use to teat a user account on an authentication server 222
- Ip address 172 6 0 222
- Note you must specify at least one member for each profile each type of member can only be used once in a profile 222
- Port 389 222
- Table 136 aaa authentication commands continued 222
- Table 137 test aaa command 222
- Test a user account command example 222
- Test aa 222
- Test aaa command 222
- The following example creates an authentication profile to authentication users using the ldap server group and then the local user database 222
- The following example shows how to test whether a user account named userabc exists on the ad authentication server which uses the following settings 222
- The following table lists the 222
- Uag cli reference guide 222
- Bind dn zyxel engineerabc 223
- Chapter 42 authentication objects 223
- Login name attribute samaccountname 223
- Password abcdefg 223
- The result shows the account exists on the ad server otherwise the uag responds an error 223
- Uag cli reference guide 223
- Certificate commands 224
- Certificates 224
- Certificates commands input values 224
- Certificates overview 224
- Certificates commands summary 225
- Chapter 43 certificates 225
- Command description 225
- Command to enter the configuration mode to be able to use these commands 225
- Configure termina 225
- Label description 225
- Table 138 certificates commands input values continued 225
- Table 139 ca commands summary 225
- The following table lists the commands that you can use to display and manage the uag s summary list of certificates and certification requests you can also create certificates or certification requests use the 225
- Uag cli reference guide 225
- Chapter 43 certificates 226
- Command description 226
- Table 139 ca commands summary continued 226
- Uag cli reference guide 226
- Chapter 43 certificates 227
- Command description 227
- Table 139 ca commands summary continued 227
- Uag cli reference guide 227
- Certificates commands examples 228
- Chapter 43 certificates 228
- The following example creates a self signed x 09 certificate with ip address 10 8 as the common name it uses the rsa key type with a 512 bit key then it displays the list of local certificates finally it deletes the pkcs12request certification request 228
- Uag cli reference guide 228
- Isp accounts 229
- Isp accounts overview 229
- Pppoe and pptp account commands 229
- Chapter 44 isp accounts 230
- Command description 230
- Table 140 pppoe and pptp isp account commands continued 230
- Uag cli reference guide 230
- Ssl application 231
- Ssl application object commands 231
- Ssl application overview 231
- Chapter 45 ssl application 232
- Command description 232
- Ssl application command examples 232
- Table 141 ssl application object commands 232
- The following commands create and display a server type ssl application object named example for a link to the website at http www example com 232
- Uag cli reference guide 232
- Endpoint security 233
- Endpoint security overview 233
- Chapter 46 endpoint security 234
- Command description 234
- Command to enter the configuration mode before you can use these commands 234
- Configure termina 234
- Endpoint security commands summary 234
- Endpoint security object commands 234
- Label description 234
- Requirements 234
- Table 142 input values for endpoint security commands 234
- Table 143 endpoint security object commands 234
- The following sections list the endpoint security object commands 234
- The following table describes the values required for many endpoint security object commands other values are discussed with the corresponding commands 234
- This table lists the commands for creating endpoint security objects you must use the 234
- Uag cli reference guide 234
- User computers must have sun s java java runtime environment or jre installed and enabled with a minimum version of 1 234
- Chapter 46 endpoint security 235
- Command description 235
- Table 143 endpoint security object commands 235
- Uag cli reference guide 235
- Chapter 46 endpoint security 236
- Command description 236
- Table 143 endpoint security object commands 236
- Uag cli reference guide 236
- Anti virus kaspersky anti virus v2011 installed and enabled 237
- Chapter 46 endpoint security 237
- Endpoint security object command example 237
- However he needs to check the anti virus software name defined on the uag the following example shows how to check all available anti virus software packages for which the uag s endpoint security can check copy and paste the name of the output item 17 for the setting later 237
- Operating system windows xp 237
- Personal firewall windows firewall installed and enabled 237
- Peter wants to create and display an endpoint security object named eps example only the computers that match the following criteria can access the company s ssl vpn 237
- Uag cli reference guide 237
- Windows auto update enabled 237
- Windows service pack 2 or above 237
- Chapter 46 endpoint security 238
- Now peter can create the eps object profile as the example shown next note that he uses the matching criteria all command to make sure all users computers have the required software installed and settings being configured before they access the company s ssl vpn 238
- Then he also needs to check the personal firewall software name defined on the uag copy and paste the name of the output item 4 for the setting later 238
- Uag cli reference guide 238
- Chapter 46 endpoint security 239
- For users who fail the endpoint security checking peter decides to show them an error message of endpoint security checking failed contact helpdesk at 7777 if you have any questions the following shows how to configure the error message 239
- See chapter 35 on page 184 for how to configure an ssl vpn using this eps object 239
- Then he leaves the sub command mode and uses the show command to view the eps object settings 239
- Uag cli reference guide 239
- Dynamic guest accounts 240
- Dynamic guest accounts overview 240
- Dynamic guest commands 240
- Chapter 47 dynamic guest accounts 241
- Command description 241
- Dynamic guest sub commands 241
- Table 144 dynamic guest commands continued 241
- Table 145 dynamic guest sub commands 241
- The following table describes the sub commands for several dynamic guest commands note that not all rule commands use all the sub commands listed here 241
- Uag cli reference guide 241
- Chapter 47 dynamic guest accounts 242
- Dynamic guest command example 242
- This example shows how to create a dynamic guest account configure the account related settings and displays the account information 242
- Uag cli reference guide 242
- Customizing the www login page 243
- System 243
- System overview 243
- Configure termina 244
- Logo title 244
- Message color of all text 244
- Note message last line of text 244
- Window background 244
- Configure termina 245
- Host name commands 245
- Time and date 245
- Configure termina 246
- Console port speed 246
- Date time commands 246
- Configure termina 247
- Dns commands 247
- Dns overview 247
- Domain zone forwarder 247
- Chapter 48 system 248
- Command description 248
- Dns command example 248
- Table 151 command summary dns continued 248
- This command sets an a record that specifies the mapping of a fully qualified domain name www abc com to an ip address 210 7 3 248
- Uag cli reference guide 248
- Remote management limitations 249
- Remote management overview 249
- System remote management 249
- System timeout 249
- Chapter 49 system remote management 250
- Command description 250
- Command to enter the configuration mode before you can use these commands 250
- Common system command input values 250
- Configure termina 250
- Defaul 250
- Http https commands 250
- Label description 250
- Table 152 input values for general system commands 250
- Table 153 command summary http https 250
- The following table describes the commands available for http https you must use the 250
- The following table identifies the values required for many of these commands other input values are discussed with the corresponding commands 250
- Uag cli reference guide 250
- Chapter 49 system remote management 251
- Command description 251
- Defaul 251
- Table 153 command summary http https continued 251
- Uag cli reference guide 251
- Http https command examples 252
- Requirements for using ssh 252
- Ssh implementation on the uag 252
- Chapter 49 system remote management 253
- Command description 253
- Command to enter the configuration mode before you can use these commands 253
- Configure termina 253
- Defaul 253
- Ssh command examples 253
- Ssh commands 253
- Table 154 command summary ssh 253
- The following table describes the commands available for ssh you must use the 253
- This command sets a certificate default to be used to identify the uag 253
- This command sets a service control rule that allowed the computers with the ip addresses matching the specified address object to access the specified zone using ssh service 253
- Uag cli reference guide 253
- Chapter 49 system remote management 254
- Command description 254
- Command to enter the configuration mode before you can use these commands 254
- Configure termina 254
- Table 155 command summary telnet 254
- Telnet 254
- Telnet commands 254
- Telnet commands examples 254
- The following table describes the commands available for telnet you must use the 254
- This command displays telnet settings 254
- This command sets a service control rule that allowed the computers with the ip addresses matching the specified address object to access the specified zone using telnet service 254
- Uag cli reference guide 254
- You can configure your uag for remote telnet access 254
- Configure termina 255
- Configuring ftp 255
- Ftp commands 255
- Ftp commands examples 255
- Chapter 49 system remote management 256
- Object label object id description 256
- Simple network management protocol is a protocol used for exchanging management information between network devices your uag supports snmp agent functionality which allows a manager station to manage and monitor the uag through the network the uag supports snmp version one snmpv1 and version two snmpv2c 256
- Snmp traps 256
- Supported mibs 256
- Table 157 snmp traps 256
- The uag supports mib ii that is defined in rfc 1213 and rfc 1215 the uag also supports private mibs enterprise mib and private mib to collect information about cpu and memory usage and vpn total throughput the focus of the mibs is to let administrators collect statistical data and monitor status and performance you can download the uag s mibs from www zyxel com 256
- The uag will send traps to the snmp manager when any one of the following events occurs 256
- This command displays ftp settings 256
- Uag cli reference guide 256
- Chapter 49 system remote management 257
- Command description 257
- Command to enter the configuration mode before you can use these commands 257
- Configure termina 257
- Snmp commands 257
- Snmp commands examples 257
- Table 158 command summary snmp 257
- The following command sets a service control rule that allowed the computers with the ip addresses matching the specified address object to access the specified zone using snmp service 257
- The following table describes the commands available for snmp you must use the 257
- Uag cli reference guide 257
- Access 258
- Chapter 49 system remote management 258
- Command description 258
- Command to enter the configuration mode before you can use these commands 258
- Configure termina 258
- Configure the icmp filter to help keep the uag hidden from probing attempts you can specify whether or not the uag is to respond to probing for unused ports 258
- Icmp filter 258
- Table 159 command summary icmp filter 258
- The following command sets the ip address of the host that receives the snmp notifications to 172 6 5 4 and the password sent with each trap to qwerty 258
- The following command sets the password secret for read write 258
- The ip icmp filter commands are obsolete see chapter 27 on page 151 to configure firewall rules for icmp traffic going to the uag to discard or reject icmp packets destined for the uag 258
- Uag cli reference guide 258
- You must use the 258
- Configuration files and shell scripts overview 259
- File directories 259
- File manager 259
- Chapter 50 file manager 260
- Comments in configuration files or shell scripts 260
- Figure 24 configuration file shell script example 260
- In a configuration file or shell script use or as the first character of a command line to have the uag treat the line as a comment 260
- Note exit or must follow sub commands if it is to make the uag exit sub command mode 260
- Table 161 configuration files and shell scripts in the uag 260
- These files have the same syntax which is also identical to the way you run cli commands manually an example is shown below 260
- Uag cli reference guide 260
- While configuration files and shell scripts have the same syntax the uag applies configuration files differently than it runs shell scripts this is explained below 260
- You have to run the example in table 24 on page 260 as a shell script because the first command is run in privilege mode if you remove the first command you have to run the example as a configuration file because the rest of the commands are executed in configuration mode see section 1 on page 29 for more information about cli modes 260
- Your configuration files or shell scripts can use exit or a command line consisting of a single to have the uag exit sub command mode 260
- Errors in configuration files or shell scripts 261
- Setenv stop on error off 261
- Uag configuration file details 261
- Configuration file flow at restart 262
- File manager commands input values 262
- Setenv startup stop on error of 262
- Chapter 50 file manager 263
- Command description 263
- File manager commands summary 263
- Table 163 file manager commands summary 263
- The following table lists the commands that you can use for file management 263
- Uag cli reference guide 263
- Command line ftp file upload 264
- File manager command examples 264
- Ftp file transfer 264
- Chapter 50 file manager 265
- Command line ftp configuration file upload example 265
- Command line ftp file download 265
- Connect to the uag 265
- Enter bin to set the transfer mode to binary 265
- Figure 25 ftp configuration file upload example 265
- Get vpn_setup zysh vpn zysh transfers the vpn_setup zysh configuration file on the uag to your computer and renames it vpn zysh 265
- Note uploading a custom signature file named custom rules overwrites all custom signatures on the uag 265
- The firmware update can take up to five minutes do not turn off or reset the uag while the firmware update is in progress if you lose power during the firmware upload you may need to refer to section 50 on page 267 to recover the firmware 265
- The following example transfers a configuration file named tomorrow conf from the computer and saves it on the uag as next conf 265
- Uag cli reference guide 265
- Use cd to change to the directory that contains the files you want to download 265
- Use dir or ls if you need to display a list of the files in the directory 265
- Use get to download files for example 265
- Boot module 266
- Chapter 50 file manager 266
- Command line ftp configuration file download example 266
- Figure 26 ftp configuration file download example 266
- Figure 27 uag file usage at startup 266
- Firmware 266
- Recovery image 266
- The boot module performs a basic hardware test you cannot restore the boot module if it is damaged the boot module also checks and loads the recovery image the uag notifies you if the recovery image is damaged 266
- The following example gets a configuration file named today conf from the uag and saves it on the computer as current conf 266
- The recovery image checks and loads the firmware the uag notifies you if the firmware is damaged 266
- The uag uses the following files at system startup 266
- Uag cli reference guide 266
- Uag file usage at startup 266
- Note do not press any keys at this point wait to see what displays next 267
- Notification of a damaged recovery image or firmware 267
- Note you only need to use this section if you need to restore the recovery image 268
- Restoring the recovery image 268
- Chapter 50 file manager 269
- Enter y and wait for the starting xmodem upload message before activating xmodem upload on your terminal 269
- Figure 32 atuk command for restoring the recovery image 269
- Figure 33 starting xmodem upload 269
- Figure 34 example xmodem upload 269
- Figure 35 recovery image upload complete 269
- Note you only need to use the atuk or atur command if the recovery image is damaged 269
- This is an example xmodem configuration upload using hyperterminal click transfer then send file to display the following screen 269
- Uag cli reference guide 269
- Wait for about three and a half minutes for the xmodem upload to finish 269
- Note this section is not for normal firmware uploads you only need to use this section if you need to recover the firmware 270
- Restoring the firmware 270
- Chapter 50 file manager 271
- Enter quit to exit the ftp prompt 271
- Figure 38 ftp firmware transfer complete 271
- Figure 39 firmware recovery complete and restart 271
- Figure 40 restart complete 271
- The console session displays done when the firmware recovery is complete then the uag automatically restarts 271
- The username prompt displays after the uag starts up successfully the firmware recovery process is now complete and the uag is ready to use 271
- Uag cli reference guide 271
- Log commands summary 272
- Log entries commands 272
- Chapter 51 logs 273
- Command description 273
- System log command examples 273
- System log commands 273
- Table 166 logging commands system log settings 273
- The following command displays the current status of the system log 273
- This table lists the commands for the system log settings 273
- Uag cli reference guide 273
- Chapter 51 logs 274
- Command description 274
- Debug log commands 274
- Table 167 logging commands debug log settings 274
- Table 168 logging commands remote syslog server settings 274
- This table lists the commands for the debug log settings 274
- This table lists the commands for the remote syslog server settings 274
- Uag cli reference guide 274
- Chapter 51 logs 275
- Command description 275
- E mail profile commands 275
- Table 169 logging commands e mail profile settings 275
- This table lists the commands for the e mail profile settings 275
- Uag cli reference guide 275
- Chapter 51 logs 276
- Command description 276
- Console port logging commands 276
- E mail profile command examples 276
- Table 170 logging commands console port settings 276
- The following commands set up e mail log 1 276
- This table lists the commands for the console port settings 276
- Uag cli reference guide 276
- Report commands 277
- Report commands summary 277
- Reports and reboot 277
- Chapter 52 reports and reboot 278
- Command description 278
- Email daily report commands 278
- Label description 278
- Report command examples 278
- Session commands 278
- Table 172 session commands 278
- Table 173 input values for email daily report commands 278
- The following commands start collecting data display the traffic reports and stop collecting data 278
- The following table identifies the values used in some of these commands other input values are discussed with the corresponding commands 278
- This table lists the commands to display the current sessions for debugging or statistical analysis 278
- Uag cli reference guide 278
- Chapter 52 reports and reboot 279
- Command description 279
- Command to enter the configuration mode before you can use these commands 279
- Configure termina 279
- Table 174 email daily report commands 279
- Uag cli reference guide 279
- Use these commands to have the uag e mail you system statistics every day you must use the 279
- Appends the date and time to the mail subject 280
- Chapter 52 reports and reboot 280
- Command description 280
- Disables the reporting 280
- Email daily report example 280
- Has the report include cpu memory port and session usage along with traffic statistics 280
- Has the uag not reset the counters after sending the report 280
- Has the uag not use the fifth mail to option 280
- Has the uag not use the second and third mail to options 280
- Has the uag provide username 12345 and password 12345 to the smtp server for authentication 280
- Sets example administrator example com as the first account to which to send the mail 280
- Sets my email example com as the fourth mail to option 280
- Sets the sender as my email example com 280
- Sets the subject of the report e mails to test 280
- Sets the uag to send the report at 1 57 pm 280
- Specifies example smtp mail server com as the address of the smtp mail server 280
- Stops the system name from being appended to the mail subject 280
- Table 174 email daily report commands continued 280
- This example sets the following about sending a daily report e mail 280
- Turns on the daily e mail reporting 280
- Uag cli reference guide 280
- Chapter 52 reports and reboot 281
- Command to restart the device 281
- Command to save the configuration before you reboot otherwise the changes are lost when you reboot 281
- If you made changes in the cli you have to use the 281
- Reboot 281
- This displays the email daily report settings and has the uag send the report 281
- Uag cli reference guide 281
- Use the 281
- Use this to restart the device for example if the device begins behaving erratically 281
- Session timeout 282
- Diagnosis commands 283
- Diagnosis commands example 283
- Diagnostics 283
- Packet flow explore 284
- Packet flow explore commands 284
- Chapter 55 packet flow explore 285
- Packet flow explore commands example 285
- The following example shows all activated 1 to 1 snat rules 285
- The following example shows all activated dynamic vpn rules 285
- The following example shows all activated policy routes 285
- The following example shows all activated site to site vpn rules 285
- The following example shows all routing related functions and their order 285
- The following example shows all snat related functions and their order 285
- The following example shows the default wan trunk s settings 285
- Uag cli reference guide 285
- Chapter 55 packet flow explore 286
- The following example shows all activated 1 to 1 nat rules 286
- The following example shows all activated dynamic vpn rules 286
- The following example shows all activated policy routes which use snat 286
- The following example shows all activated policy routes which use snat and enable nat loopback 286
- The following example shows all activated static dynamic vpn rules 286
- The following example shows all activated vpn 1 1 mapping rules 286
- Uag cli reference guide 286
- Chapter 55 packet flow explore 287
- The following example shows all activated 1 to 1 nat rules 287
- The following example shows the default wan trunk settings 287
- Uag cli reference guide 287
- Maintenance tools 288
- Chapter 56 maintenance tools 289
- Command description 289
- Here are maintenance tool commands that you can use in configure mode 289
- Note use the packet capture configure command to configure the packet capture settings before using this command 289
- Table 179 maintenance tools commands in privilege mode 289
- Uag cli reference guide 289
- Chapter 56 maintenance tools 290
- Command description 290
- Here are maintenance tool commands that you can use in configure mode 290
- Maintenance command examples 290
- Some packet trace command examples are shown below 290
- Table 180 maintenance tools commands in configuration mode 290
- Uag cli reference guide 290
- Chapter 56 maintenance tools 291
- Command description 291
- Duration 150 seconds 291
- File size 10 megabytes 291
- File suffix example 291
- Host ip any 291
- Host port any then you do not need to configure this setting 291
- Ip address any 291
- Packet capture command example 291
- Save the captured packets to usb storage device 291
- Table 180 maintenance tools commands in configuration mode continued 291
- The following example creates an arp table entry for ip address 192 68 0 and mac address 01 02 03 04 05 06 then it shows the arp table and finally removes the new entry 291
- The following examples show how to configure packet capture settings and perform a packet capture first you have to check whether a packet capture is running this example shows no other packet capture is running then you can also check the current packet capture settings 291
- Then configure the following settings to capture packets going through the uag s wan1 interface only 291
- Uag cli reference guide 291
- Use the ring buffer no 291
- Chapter 56 maintenance tools 292
- Check current packet capture status and list all stored packet captures 292
- Exit the sub command mode and have the uag capture packets according to the settings you just configured 292
- Manually stop the running packet capturing 292
- The maximum size of a packet capture file 100 megabytes 292
- Uag cli reference guide 292
- You can use ftp to download a capture file open and study it using a packet analyzer tool for example ethereal or wireshark 292
- Hardware watchdog timer 293
- Software watchdog timer 293
- Watchdog timer 293
- App watchdog 294
- Application watchdog 294
- Chapter 57 watchdog timer 294
- Command description 294
- Command to enter the configuration mode to be able to use these commands 294
- Commands use the 294
- Configure termina 294
- Table 183 app watchdog commands 294
- The application watchdog has the system restart a process that fails these are the 294
- Uag cli reference guide 294
- Application watchdog commands example 295
- Chapter 57 watchdog timer 296
- Uag cli reference guide 296
- List of commands alphabetical 297
Похожие устройства
- Zyxel UAG5100 Инструкция по эксплуатации
- Zyxel UAG5100 Справочник командного интерфейса
- Zyxel UAG5100 Технические характеристики
- Zyxel UAG5100 Инструкция по монтажу
- Zyxel UAG5100 Рекомендации по настройке
- Zyxel SP-300E Инструкция по эксплуатации
- HP envy 17-j111sr leap motion, f7t10ea Инструкция по эксплуатации
- HP pavilion 11-e100sr touchsmart, f5b63ea Инструкция по эксплуатации
- HP pavilion 15-n006sr, e9l07ea Инструкция по эксплуатации
- HP pavilion 15-n263sr, f7s40ea Инструкция по эксплуатации
- HP pavilion 15-n273sr, f8t38ea Инструкция по эксплуатации
- HP probook 430, f0x04ea Инструкция по эксплуатации
- HP probook 450, e9y09ea Инструкция по эксплуатации
- HP probook 450, h6r42ea Инструкция по эксплуатации
- HP probook 450, e9x95ea Инструкция по эксплуатации
- HP color laserjet enterprise 700 m750n Инструкция по эксплуатации
- Zyxel WAC6502D-S Инструкция по эксплуатации
- Zyxel WAC6502D-S Технические характеристики
- Zyxel WAC6502D-S Инструкция по установке
- Zyxel WAC6503D-S Инструкция по эксплуатации