CLI Command-Reference
CLI Command-Reference
TAKE CAUTION ESPECIALLY ON EXECUTING THE DEBUG COMMANDS AS THEY CAN OVERLOAD
THE SYSTEM !!!!!
###################################################################################
#######################
##
## SYSTEM INFORMATION AND DEBUG
##
############################################################
## GENERAL SYSTEM INFORMATION & STATUS
! INTERFACES
show interface all
show interface management
! ROUTING
show routing route
! CONFIGURATION
show config running
show config diff
set cli pager off
set cli config-output-format set
############################################################
## SOFTWARE AND UPDATES
## LICENSES
request license info
request license fetch
request support info
request support check
## SOFTWARE
! DOWNLOAD AND INSTALL
request system software info
debug swm list
request system software check
request system software download version X.X.X
request system software install version X.X.X
show jobs all
## DYNAMIC UPDATES
! APPLICATION AND IPS SIGNATURES
request content upgrade info
request content upgrade check
request content upgrade download latest
request content upgrade install version latest
! ANTIVIRUS
request anti-virus upgrade info
request anti-virus upgrade check
request anti-virus upgrade download latest
request anti-virus upgrade install version latest
! URL
request url-filtering download status vendor brightcloud
request url-filtering upgrade brightcloud
## FACTORY RESET
! ONLY DELETE PRIVATE DATA
request system private-data-reset
! On the console login with user "maint" and the serial number of the device as the
password
############################################################
## SYSTEM STATISTICS
! JOBS
show jobs all
show jobs id <ID>
! SYSTEM PROCESSES
show system software status
! TECH-SUPPORT FILE - GENERATE & COPY - DOES NOT NEED TO BE GENERATED BEFOREHAND
scp export tech-support to username@host:path
! TECH SUPPORT SUMMARY CAN BE FOUND IN ./tmp/cli/techsupportXX
! DEBUG
show system state | match debug
############################################################
## TROUBLESHOOT TRAFFIC PASSING THROUGH THE FIREWALL
## TRAFFIC LOG
show log traffic direction equal backward src in IP.IP.IP.IP dst in IP.IP.IP.IP
! use "/" to search
## CONNECTIVITY CHECK
ping source IP.IP.IP.IP host IP.IP.IP.IP
show arp <INTERFACE>
## TRAFFIC COUNTER
!! DEFINE FILTER TO SHOW ONLY COUNTER FOR SPECIFIC TRAFFIC
debug dataplane packet-diag clear all
debug dataplane packet-diag set filter match source IP.IP.IP.IP
debug dataplane packet-diag set filter on
debug dataplane packet-diag show setting
!! GLOBAL COUNTER
show counter global filter delta yes packet-filter yes
show counter global filter delta yes packet-filter yes severity drop
show counter interface <INTERFACE> !! FILTER DOES NOT APPLY TO THIS COMMAND
!! CLEAR FILTER
debug dataplane packet-diag clear all
debug dataplane packet-diag clear filter-marked-session all
!! VIEW LOG
debug dataplane packet-diag aggregate-logs
less dp-log pan_packet_diag.log
## PACKET CAPTURE
!!! CAREFUL - NEVER USE PACKET CAPTURES WITHOUT APPLYING AND ENABLING A FILTER !!!
!!! ALWAYS DISABLE THE CAPTURE AFTERWARDS !!!
!! DEFINE FILTER
debug dataplane packet-diag clear all
debug dataplane packet-diag set filter match source IP.IP.IP.IP
debug dataplane packet-diag set filter on
debug dataplane packet-diag show setting
debug dataplane packet-diag set log counter"tcp_drop_out_of_wnd"
## POLICY MATCH
TCP --> 6
UDP --> 17
ICMP --> 1
ESP --> 50
Ejemplo:
############################################################
## ROUTING
! VIEW DEBUG
view-pcap verbose++ yes debug-pcap <FILENAME>
! DISABLE AND DELETE DEBUG
debug routing pcap all off
debug routing pcap all delete
############################################################
## USER IDENTIFICATION
! IP TO USER MAPPING
show user ip-user-mapping all
############################################################
## URL Categorization
! DEBUG
show counter global filter delta yes category url
debug device-server bc-url-db db-info
debug device-server bc-url-db show-stats
debug device-server dump dynamic-url statistics
############################################################
## Response Page Customization
############################################################
# IPSEC
! VPN STATUS
show vpn flow
show vpn flow tunnel-id [ID]
show vpn ike-sa
show vpn tunnel
! SYSTEM LOG
show log system direction equal backward subtype equal vpn
############################################################
# HA
############################################################
# QoS
show session all
show session id XX
show qos interface ethernet1/x counter
show qos interface ethernet1/x hw-counter
############################################################
## DECRYPTION
show system setting ssl-decrypt exclude-cache
show system setting ssl-decrypt setting
show counter global filter categoty proxy
debug dataplane pool statistics
! Convert a PKCS#12 file (.pfx .p12) containing a private key and certificates to
PEM
openssl pkcs12 -in keyStore.pfx -out keyStore.pem -nodes
! Convert a PEM certificate file and a private key to PKCS#12 (.pfx .p12)
openssl pkcs12 -export -out certificate.pfx -inkey privateKey.key -in
certificate.crt -certfile CACert.crt
############################################################
## DOS
show counter global filter aspect dos delta yes
debug dataplane show dos block-table
debug dataplane show dos classification-table
############################################################
## WILDFIRE
! KEY GENERATION
https://hostname/api/?type=keygen&user=username&password=password
https://hostname/esp/restapi.esp?
type=config&action=show&key=KEYVALUE&xpath=devices/entry/vsys/entry/rulebase/
security/rules
############################################################
## MALWARE INDICATORS OF COMPROMISE
! DNS SINKHOLE
( addr.src in ) and ( addr.dst in 223.255.255.223 )
! USER THREATS
( addr in )
! SUSPICIOUS URLS
( addr.src in ) and ((category eq unknown) or (category eq proxy-avoidance-and-
anonymizers) or (category eq phishing) or (category eq peer-to-peer) or (category
eq parked) or (category eq malware) or (category eq dynamic-dns))
############################################################
## PANTS TIPS AND TRICKS
SysD
- phy - interface information including SFP brand etc
- leds - shows which LEDs are on including the ones of the HA peer
- core - show how many cores are used
- env - environmental information incl. temp
- error -
Counters
- session_svc_cp - Sessions allocated for captive-portal
- ctd_cp_drop - The number of sessions dropped because of captive portal page
###################################################################################
#######################
##
## CUSTOM REPORTS
##
! GENERATES STATS DUMP FILE FOR SPECIFIC PERIOD (LAST 7 DAYS PER DEFAULT)
tftp export stats-dump start-time equal 2011/11/15@00:00:00 end-time equal
2011/12/05@00:00:00 to YOUR_PC_IP_ADDR
edit shared
set reports "Top Applicaciones" type appstat sortby nbytes
set reports "Top Applicaciones" type appstat group-by technology-of-name
set reports "Top Applicaciones" type appstat aggregate-by name
set reports "Top Applicaciones" type appstat aggregate-by category-of-name
set reports "Top Applicaciones" type appstat aggregate-by subcategory-of-name
set reports "Top Applicaciones" type appstat aggregate-by risk
set reports "Top Applicaciones" type appstat values nbytes
set reports "Top Applicaciones" type appstat values nsess
set reports "Top Applicaciones" type appstat values nthreats
set reports "Top Applicaciones" period last-7-days
set reports "Top Applicaciones" topn 50
set reports "Top Applicaciones" topm 25
set reports "Top Applicaciones" query "(name neq unassigned-ip-prot) and (name neq
unknown-tcp) and (name neq unknown-udp) and (name neq insufficient-data)"
set reports "Top Applicaciones" frequency daily