Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Introduction to checkpoint command

2025-02-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Brief introduction to Command Line Operation of checkpoint

Several commands that are often used by checkpoint are show,add,set,delete.

Set interface eth2 ipv4-address 192.168.1.11 mask-length 24

Set interface eth2 state on

Others are save-- saving configurations.

Reboot-- restart

Halt-- hangs

Quit-- exits from cli

Exit-- exits from the current shell

Start--start transaction, enter the transaction mode, and the current configuration does not take effect immediately. If you want to take effect, you need to use the commit command to submit the configuration and exit the transaction mode; if you do not want the configuration to take effect, use rollback to undo the command and exit the transaction mode. This function needs to be pre-configured in advance in the operator project, but it should be very helpful if you don't want the configuration to take effect immediately.

Commit

Rollback

Expert-- expert mode that allows low-level access to the system, including the file system.

Ver--- displays version information

Revert---revert database, restore the database, there are even parameters. The premise of date and tag.tag is that the database has been restored before.

Help

Show commands to view the commands available to the current user

Show commands feature looks at the fame and wealth that can be used for a particular feature

Example: show commands feature arp

Gw-center > show commands feature arp

Add arp proxy ipv4-address VALUE interface VALUE real-ipv4-address VALUE

Add arp proxy ipv4-address VALUE macaddress VALUE real-ipv4-address VALUE

Add arp static ipv4-address VALUE macaddress VALUE

Delete arp dynamic all

Delete arp proxy ipv4-address VALUE

Delete arp static ipv4-address VALUE

Set arp table cache-size VALUE

Set arp table validity-timeout VALUE

Show arp dynamic all

Show arp proxy all

Show arp proxy ipv4-address VALUE

Show arp static all

Show arp table cache-size

Show arp table validity-timeout

Show commands op to view possible action options for a command

Show commands op show feature lists all available commands for the feature of the current command

Gw-center > show commands op show feature arp

Show arp dynamic all

Show arp proxy all

Show arp proxy ipv4-address VALUE

Show arp static all

Show arp table cache-size

Show arp table validity-timeout

Tab completion command space + tab View the following options press the ESC key twice to see the full commands that may be used.

History displays the last 100 commands used

!! Execute the last order.

Like Cisco, you can use keyboard shortcuts for command editors and write only a few commonly used ones:

Ctrl+a moves to the beginning of the line

Ctrl+e moves to the end of the line

Ctrl+u deletes the current line

Set up the environment for the user's command

Show clienv all to view the user's environment

Set clienv config-lock VALUE

Set clienv prompt sets the format of cli command prompt

% H displays the command number

% I display user ID

% M displays hostname

% P displays the product name Gaia

% U displays the user name of the current login

Whether syntax-check checks command line syntax. Default is off.

Save-clienv saves the environment variable after setting

Cli supports three output formats: pretty, structured, and xml

Show clienv output views the current output format, such as:

Gw-center > show clienv output

Pretty

Command line expert mode expert mode

Show extended commands

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report