HP 200 Unified Threat Management (UTM) Appliance Using the undo form of a command, CLI views

Page 128

Figure 83 Understanding command-line parameters

For example, to set the system time to 10:30:20, February 23, 2010, enter the following command line at the CLI and press Enter:

<Sysname> clock datetime 10:30:20 2/23/2010

Using the undo form of a command

Most configuration commands have an undo form for canceling a configuration, restoring the default, or disabling a feature. For example, the info-center enable command enables the information center, and the undo info-center enable command disables the information center.

CLI views

Commands are grouped in different views by function. To use a command, you must enter its view.

CLI views are hierarchically organized, as shown in Figure 84. Each view has a unique prompt, from which you can identify where you are and what you can do. For example, the prompt [Sysname-vlan100]shows that you are in VLAN 100 view and can configure attributes for that VLAN.

You are placed in user view immediately after you are logged in to the CLI. The user view prompt is <Device-name>, where the Device-nameargument, representing the device hostname, defaults to Sysname and can be changed by using the sysname command. In user view, you can perform basic operations including display, debug, file management, FTP, Telnet, clock setting, and reboot.

From user view, you can enter system view to configure global settings, including the daylight saving time, banners, and hotkeys. The system view prompt is [Device-name].

From system view, you can enter different function views. For example, you can enter interface view to configure interface parameters, enter VLAN view to add ports to the specific VLAN, enter user interface view to configure login user attributes, or create a local user and enter local user view to configure attributes for the local user.

To display all commands available in a view, enter a question mark (?) at the view prompt.

122

Image 128
Contents HP Firewalls and UTM Devices Page Contents Page Iii Page Overview F1000-A-EI/F1000-S-EIOverview AppearanceF1000-E Front viewF5000 Aspf Firewall modules Firewall module for 5800 switches Enhanced firewall modulesUTM products U200-A U200-A front viewApplication scenarios F1000-A-EI/F1000-S-EIU200-S Firewall applicationVirtual firewall application VPN applicationF1000-E F5000 Firewall modulesEnhanced firewall modules Clound computing data center applicationRemote access application Enterprise network applicatoinUTM Network diagram Login overview Login methods at a glanceLogin methods Login method Default setting and configuration requirementsCLI login method and user interface matrix User interface Login methodCLI user interfaces User interface assignmentPage Default console port properties Parameter DefaultLogging in to the CLI Logging in through the console port for the first timeConnection description Configuring console login control settings Setting the properties of the serial portConfiguring none authentication for console login Authentication Configuration tasks Reference ModeCommand Remarks Last-numberConfiguring password authentication for console login Configuring scheme authentication for console loginConfiguration Guide PasswordDomain domain-name Hwtacacs-scheme-nameConfiguring common console user interface settings optional Speed speed-valueTelnet login Logging in through TelnetTelnet server and Telnet client configuration requirements Device role RequirementsConfiguring none authentication for Telnet login Configuring password authentication for Telnet login Telnetting to the device without authenticationConfiguring scheme authentication for Telnet login Password authentication interface for Telnet loginUser only depend on the user Configuring common VTY user interface settings optional Step Command RemarksUsing the device to log in to a Telnet server CommandCharacter ValueLogging in through SSH To use the device to log in to a Telnet serverConfiguring the SSH server on the device SSH server and client requirementsLdap-scheme-name Local login through the AUX port Using the device to log in to an SSH serverStarted Command Reference Ssh2 serverHardware Feature compatible AUX login diagramConfiguring none authentication for AUX login Configuring password authentication for AUX login Configuring scheme authentication for AUX login Password authentication interface for AUX loginApply the specified AAA Configuring common settings for AUX login optional Ip alias ip-address port-numberDisplay type of both the device Login procedure Default AUX port propertiesConnecting the AUX port to a terminal Power on the device and press Enter at the prompt Displaying and maintaining CLI login Task Command RemarksInclude regular-expression Regular-expressionSend all num1 aux console Available in user view Vty num2 Logging in to the Web interface Configuration guidelinesLogging in by using the default Web login settings Adding a Web login account Configuring Web loginConfiguring Http login Basic Web login configuration requirementsObject Requirements Web captcha verification-codeVerification-code Configuring Https loginInterface interface-type Interface-number VPN Configuration Guide Policy-nameHttps Mask mask-lengthDisplaying and maintaining Web login Http login configuration exampleConfiguration procedure Network requirementsHttps login configuration example # Associate the Https service with SSL server policy myssl # Enable the Https serviceConfigure the host Https client # Create RSA local key pairsTroubleshooting Web browser Failure to access the device through the Web interfaceSymptom Configuring the Internet Explorer settingsInternet Explorer setting Configuring Firefox Web browser settings Click OK in the Security Settings dialog boxFirefox Web browser setting Accessing the device through Snmp Configuring Snmp accessConfiguring SNMPv3 access PrerequisitesConfiguring SNMPv1 or SNMPv2c access Ipv6 ipv6-acl-number See Getting Started Command ReferencePriv-password acl acl-number acl ipv6 ipv6-acl-number Notify-view acl acl-number aclSnmp login example StepCommand Remarks# Enable the Snmp agent # Configure an Snmp groupPage Logging in to the firewall module from the network device Feature and hardware compatibilityLogging in to the firewall module from the network device Resetting the system of the firewall module Configuring the Acsei protocolAcsei timers Configuring Acsei server on the network deviceAcsei starts up and runs in the following procedures Acsei startup and runningConfiguring Acsei client on the firewall module Displaying and maintaining Acsei server and clientNetwork requirements Client-idConfiguration procedure # Set the clock synchronization timer to 10 minutes# Set the monitoring timer to 10 seconds # Log in to the firewall modulePage Overview Basic configurationPerforming basic configuration in the Web interface Basic configuration wizard-1/6 Click Next For basic configuration appearsBasic configuration wizard-2/6 basic information Click Next For configuring service management appearsBasic configuration wizard-3/6 service management Another service Assign IP addresses to the interfacesConfigure the parameters as described in Table Configuration itemsClick Next For configuring NAT appears IP/Wildcard Performing basic configuration at the CLI Basic configuration wizard-6/6Global-name Interface interface-typeIp address ip-address mask-length mask Zone name zone-name id zone-idConfiguration Configuring the device name in the Web interface Configuring the device name at the CLIManaging the device Hardware Supported storage mediumDisplaying the current system time Configuring the system time in the Web interfaceConfiguring the system time Configuring the network time CalendarConfiguring the time zone and daylight saving time Source InterfaceDate and time configuration example This example, Device a is the firewallConfiguring the local clock as the reference clock Configuring the system time at the CLI Configuration guidelinesSystem time configuration results Date-timeZone-offset Date-time ± zone-offsetZone-offset + To change the system time Date-time ± zone-offset +Summer-offset Both date-timeTo set the idle timeout timer Setting the idle timeout timer in the Web interfaceSetting the idle timeout timer at the CLI Configuring banners To enable displaying the copyright statementEnabling displaying the copyright statement Banner message input modesConfiguring the maximum number of concurrent users To configure bannersRebooting the firewall in the Web interface Configuring the exception handling methodRebooting the device Scheduling a device reboot Rebooting the firewall at the CLIRebooting devices immediately at the CLI Comparison of non-modular and modular approaches Job configuration approachesScheduling jobs Scheduling a job in the non-modular approach Scheduling a job in the modular approachJob job-name View view-name# Create a job named pc1, and enter its view Scheduled job configuration exampleTime time-id at time date command command Setting the port status detection timer # Create a job named pc2, and enter its view# Create a job named pc3, and enter its view # Display information about scheduled jobsConfiguring temperature thresholds for a device or a module Configuring basic temperature thresholdsConfiguring advanced temperature thresholds To set the port status detection timerMonitoring an NMS-connected interface Clearing unused 16-bit interface indexes Verifying and diagnosing transceiver modules Verifying transceiver modulesDiagnosing transceiver modules Interface-number beginSee Getting Started Command ReferenceDisplaying and maintaining device management Task Command Remarks Task Command Remarks User levels Configuring a local user in the Web interfaceManaging users Configure a local user, as described in Table Click Apply Click AddItem Description Configuration exampleService type feature and hardware compatibility Configuring Telnet login control Configuring a local user at the CLIControlling user logins Configuring source IP-based Telnet login control Source sour-addr sour-wildcardVpn-instancevpn-instance-name Ipv6-address prefix-lengthRule-string Telnet login control configuration exampleConfiguring source MAC-based Telnet login control Configuring source IP-based Snmp login control Getting StartedSnmp login control configuration example Ipv6 ipv6-acl-numberRead-view write-viewwrite-view Group-name acl acl-number acl ipv6Configuring Web login control Configuring source IP-based Web login controlWeb login control configuration example Logging off online Web usersSource sour-addr sour-wildcard N/A any time-range User-id user-nameuser-nameDisplaying online users Field DescriptionUsing the CLI Command conventionsCommand conventions Convention DescriptionUsing the undo form of a command CLI viewsTask Command Entering system view from user viewReturning to the upper-level view from any view Returning to user view from any other viewAccessing the CLI online help Entering a command Editing a command lineAbbreviating commands Command line editing keysConfiguring and using command keyword aliases Configuring and using hotkeysTo configure a command keyword alias Usage guidelinesHotkey Function Enabling redisplaying entered-but-not-submitted commandsSystem-reserved hotkeys Understanding command-line error messages Using the command history functionCommon command-line error messages Error message CauseViewing history commands Setting the command history buffer size for user interfacesPausing between screens of output Controlling the CLI outputCharacter Meaning Examples Filtering the output from a display commandSpecial characters supported in a regular expression Contain stringstring. string1string2\2 repeats String1string2string2. string1string2\1\2String1string2string1string2 Matches character1character2Configuring user privilege and command levels A being character2, but does not match 2aLevel Privilege Default set of commands Configuring a user privilege levelCommand levels and user privilege levels Management and Maintenance Last-num1 vty first-num2 Last-num2By default, the user privilege level Switching the user privilege level Information, see Access Control Configuration Guide Privilege level switching authentication modesAuthentication mode Keywords Description Switching to a higher user privilege level Information required for user privilege level switchingSaving the running configuration Changing the level of a commandTo change the level of a command View commandRelated information Support and other resourcesContacting HP Command conventions SymbolsConventions GUI conventionsNetwork topology icons Port numbering in examplesIndex 144
Related manuals
Manual 3 pages 45.38 Kb