netscreen_CLI

722
NetScreen CLI Reference Guide Version 5.2.0 Command Descriptions Version 5.2.0 P/N 093-1592-000 Rev. A

Transcript of netscreen_CLI

Page 1: netscreen_CLI

NetScreen CLI Reference Guide

s

Version 5.2.0

P/N 093-1592-000

Rev. A

Version 5.2.0

Command Description

Page 2: netscreen_CLI

compliance of Class B devices: The enerates and may radiate radio-frequency nce with NetScreen’s installation e with radio and television reception. This d to comply with the limits for a Class B specifications in part 15 of the FCC rules. provide reasonable protection against allation. However, there is no guarantee rticular installation.

interference to radio or television y turning the equipment off and on, the e interference by one or more of the

ing antenna.

en the equipment and receiver.

ienced radio/TV technician for help.

utlet on a circuit different from that to d.

o this product could void the user's device.

ITED WARRANTY FOR THE ET FORTH IN THE INFORMATION PRODUCT AND ARE INCORPORATED OU ARE UNABLE TO LOCATE THE

WARRANTY, CONTACT YOUR JUNIPER R A COPY.

Copyright Notice

Copyright © 2005 Juniper Networks, Inc. All rights reserved.

Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, NetScreen-Global Pro, ScreenOS, and GigaScreen are registered trademarks of Juniper Networks, Inc. in the United States and other countries. NetScreen-5GT, NetScreen-5XP, NetScreen-5XT, NetScreen-25, NetScreen-50, NetScreen-100, NetScreen-204, NetScreen-208, NetScreen-500, NetScreen-5200, NetScreen-5400, NetScreen-IDP 10, NetScreen-IDP 100, NetScreen-IDP 500, NetScreen-IDP 1000, IDP 50, IDP 200, IDP 600, IDP 1100, ISG 1000, ISG 2000, NetScreen-Global Pro Express, NetScreen-Remote Security Client, NetScreen-Remote VPN Client, GigaScreen ASIC, and GigaScreen-II ASIC are trademarks of Juniper Networks, Inc. All other trademarks and registered trademarks are the property of their respective companies.

Information in this document is subject to change without notice.

No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without receiving written permission from:

Juniper Networks, Inc.

ATTN: General Counsel

1194 N. Mathilda Ave.

Sunnyvale, CA 94089-1206

FCC StatementThe following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.

The following information is for FCC equipment described in this manual genergy. If it is not installed in accordainstructions, it may cause interferencequipment has been tested and foundigital device in accordance with the These specifications are designed tosuch interference in a residential instthat interference will not occur in a pa

If this equipment does cause harmfulreception, which can be determined buser is encouraged to try to correct thfollowing measures:

• Reorient or relocate the receiv

• Increase the separation betwe

• Consult the dealer or an exper

• Connect the equipment to an owhich the receiver is connecte

Caution: Changes or modifications twarranty and authority to operate this

Disclaimer

THE SOFTWARE LICENSE AND LIMACCOMPANYING PRODUCT ARE SPACKET THAT SHIPPED WITH THEHEREIN BY THIS REFERENCE. IF YSOFTWARE LICENSE OR LIMITED NETWORKS REPRESENTATIVE FO

Page 3: netscreen_CLI

Contents

i

............................................... 65

............................................... 74....................................................78....................................................79d .................................................82....................................................83....................................................84....................................................87....................................................88....................................................92....................................................94....................................................95....................................................96....................................................97....................................................98....................................................99..................................................100..................................................102..................................................114..................................................117..................................................119..................................................120..................................................122..................................................123..................................................124..................................................125..................................................126

............................................. 127

.............................................129

............................................. 131

NetScreen CLI Reference Guide

ContentsPreface .......................................................................... v

Organization............................................................... v

CLI Syntax .................................................................. vi

Object Name Conventions.......................................viii

CLI Variables.............................................................. ixVariable Notation......................................................... ix

Common CLI Variable Names ...................................... x

New, Modified and Deleted Commands ..................xiiNew Commands......................................................... xii

Modified Commands.................................................. xii

Deleted Commands ................................................... xii

Juniper Networks NetScreen Publications................. xiii

“active-user” through “common-criteria”.......................1active-user ...................................................................2address ........................................................................3admin ..........................................................................5alarm .........................................................................18alg..............................................................................24alias............................................................................27all ...............................................................................28arp .............................................................................29attack.........................................................................32attack-db ...................................................................41audible-alarm ............................................................42auth ...........................................................................45auth-server .................................................................52

av ...............................BGP Commands.........

advertise-def-route...aggregate ...............always-compare-meas-number ...............as-path-access-list ...comm-rib-in .............community-list ..........confederation ..........config.......................enable .....................flap-damping...........hold-time .................keepalive .................local-pref .................med.........................neighbor ..................network.....................redistribute................redistribution.............reflector....................reject-default-route ..retry-time..................rib-in .........................router-id....................synchronization ........

chassis ........................clock...........................common-criteria ........

Page 4: netscreen_CLI

Contents

ii

............................................. 311

............................................. 312

............................................. 314

............................................. 318

.............................................328

............................................. 329

............................................. 331

............................................. 335

............................................. 336

............................................. 343

............................................. 348

.............................................350

............................................. 353

............................................. 360

............................................. 380

............................................. 385

............................................. 387............................................ 392............................................. 394............................................. 397............................................. 398............................................. 399............................................. 400..................................................404..................................................405..................................................406..................................................407..................................................409..................................................410..................................................412..................................................413..................................................415

NetScreen CLI Reference Guide

“config” through “interface” ......................................133config...................................................................... 134console ................................................................... 139counter ................................................................... 142delete ..................................................................... 145di............................................................................. 148dip........................................................................... 174dns .......................................................................... 176domain ................................................................... 185downgrade ............................................................. 186envar....................................................................... 188event....................................................................... 190exit .......................................................................... 195failover .................................................................... 196file ........................................................................... 199firewall ..................................................................... 201flow ......................................................................... 204gate ........................................................................ 214group ...................................................................... 215group-expression..................................................... 219hostname................................................................ 222igmp ....................................................................... 223ike ........................................................................... 227ike-cookie................................................................ 253interface.................................................................. 255

“ip” through “port-mode”...........................................297ip............................................................................. 298ip-classification ....................................................... 300ippool...................................................................... 301l2tp.......................................................................... 303

led ..............................lcd ..............................license-key..................log ..............................mac ...........................mac-learn ..................memory......................mirror ..........................modem ......................multicast-group-policynrtp .............................nsgp ...........................nsmgmt ......................nsrp.............................ntp ..............................os................................OSPF Commands .......

advertise-def-routearea......................authentication ......auto-vlink ..............config ...................database..............enable ....................hello-threshold..........interface...................lsa-threshold.............neighbor ..................redistribute................reject-default-route ..retransmit .................rfc-1583 ...................

Page 5: netscreen_CLI

Contents

iii

............................................. 516..................................................520..................................................522..................................................523..................................................524..................................................525..................................................526..................................................527..................................................528..................................................529..................................................530..................................................531..................................................532..................................................533..................................................534..................................................535..................................................537..................................................539..................................................540..................................................542..................................................544..................................................545..................................................546..................................................547..................................................548..................................................549..................................................550..................................................551..................................................552..................................................553

.............................................554

............................................. 557

............................................. 559

NetScreen CLI Reference Guide

routes-redistribute .......................................................416rules-redistribute..........................................................417statistics ......................................................................418stub ............................................................................419summary-import.........................................................420vlink ............................................................................422vneighbor ...................................................................426

performance........................................................... 427PIM Commands ...................................................... 429

accept-group ............................................................432bsr ..............................................................................433config.........................................................................434enable .......................................................................435igmp-members..........................................................436interface.....................................................................437join-prune ...................................................................438mgroup ......................................................................439mroute .......................................................................441neighbor.....................................................................443rp................................................................................444rpf...............................................................................446spt-threshold...............................................................447zone ...........................................................................448

ping......................................................................... 452pki ........................................................................... 454policy ...................................................................... 471port-mode .............................................................. 493

“pppoa” through “zone” ............................................497pppoa..................................................................... 498pppoe..................................................................... 504proxy-id ................................................................... 513reset ........................................................................ 515

RIP Commands ..........advertise-def-route...alt-route....................config.......................database .................default-metric ..........enable .....................flush-timer.................garbage-list..............hold-timer.................interface...................invalid-timer .............max-neighbor-countneighbors .................no-source-validationpoll-timer ..................redistribute................reject-default-route ..retransmit-timer ........route-map................routes-redistribute.....rules-redistribute .......summary ..................summary-ip ..............threshold-update .....timer.........................trusted-neighbors .....update-timer............update-threshold .....version......................

route ...........................sa................................sa-statistics..................

Page 6: netscreen_CLI

Contents

iv

............................................. 614

............................................. 617

............................................. 625

............................................. 631

............................................. 636

............................................. 638

............................................. 648

............................................. 650

............................................. 652

............................................. 673

............................................. 676

............................................. 678

.............................................680

.............................................683

..........................................A-I

.......................................... B-I

......................................... C-I

NetScreen CLI Reference Guide

save ........................................................................ 560scheduler ................................................................ 566scp.......................................................................... 569service..................................................................... 570session..................................................................... 575sip ........................................................................... 580snmp....................................................................... 583socket ..................................................................... 589ssh ........................................................................... 590ssl ............................................................................ 598sys-clock.................................................................. 601syslog ...................................................................... 602system..................................................................... 606tech-support ........................................................... 607temperature-threshold ............................................ 608tftp .......................................................................... 609timer........................................................................ 610trace-route .............................................................. 612

traffic-shaping.............url................................user.............................user-group ..................vip...............................vpn .............................vpn-group...................vpnmonitor .................vrouter ........................vsys .............................webauth .....................webtrends...................xauth...........................zone ...........................

Interface Names................

Zone Names ......................

Command Availability .......

Page 7: netscreen_CLI

v

ed to configure and manage a ublished with each Juniper

in this guide.

nd descriptions.

.

ice interfaces.

es which platforms support

Juniper Networks NetScreen CLI Reference Guide

Preface

The Juniper Networks NetScreen CLI Reference Guide describes the commands usNetScreen device from a console interface. This manual is an ongoing publication, pNetworks NetScreen OS release.

ORGANIZATIONThis guide consists of the following items:

• A Table of Contents, which lists the contents of all sections and appendices

• Four command sections, each an alphabetized compendium of CLI comma

The command sections are as follows:

Section 1 describes CLI commands active-user through common-criteria

Section 2 describes CLI commands config through interface.

Section 3 describes CLI commands ip through port-mode.

Section 4 describes CLI commands pppoa through zone.

• Interface Names, an appendix that lists and briefly describes NetScreen dev

• Zone Names, an appendix that lists and briefly describes zones.

• Command Availability, an appendix that lists the CLI commands and indicatthem.

Page 8: netscreen_CLI

Preface CLI Syntax

vi

ntax. This syntax may include ommand descriptions use atory, and in which contexts.

ing special characters.

e symbols are essential for

symbols are not essential for affect the outcome.

ymbol appears between two is symbol appears at the end of

me contexts, and mandatory in

e_1, feature_2, and feature_3, s surround feature_2 and Otherwise, you cannot

command.

}

Juniper Networks NetScreen CLI Reference Guide

CLI SYNTAX

Each CLI command description in this manual reveals some aspect of command syoptions, switches, parameters, and other features. To illustrate syntax rules, some cdependency delimiters. Such delimiters indicate which command features are mand

Dependency Delimiters

Each syntax description shows the dependencies between command features by us

• The { and } symbols denote a mandatory feature. Features enclosed by thesexecution of the command.

• The [ and ] symbols denote an optional feature. Features enclosed by theseexecution of the command, although omitting such features might adversely

• The | symbol denotes an “or” relationship between two features. When this sfeatures on the same line, you can use either feature (but not both). When tha line, you can use the feature on that line, or the one below it.

Nested Dependencies

Many CLI commands have nested dependencies, which make features optional in soothers. The three hypothetical features shown below demonstrate this principle.

[ feature_1 { feature_2 | feature_3 } ]

The delimiters [ and ] surround the entire clause. Consequently, you can omit featurand still execute the command successfully. However, because the { and } delimiterfeature_3, you must include either feature_2 or feature_3 if you include feature_1.successfully execute the command.

The following example shows some of the feature dependencies of the set interface

set interface vlan1 broadcast { flood | arp [ trace-route ]

Page 9: netscreen_CLI

Preface CLI Syntax

vii

trast, the [ and ] brackets ight take any of the following

y find that certain commands

x, attempting to use such a ge appears, confirm the ailable options for the set vpn

Juniper Networks NetScreen CLI Reference Guide

The { and } brackets indicate that specifyng either flood or arp is mandatory. By conindicate that the trace-route option for arp is not mandatory. Thus, the command mforms:

ns-> set interface vlan1 broadcast flood

ns-> set interface vlan1 broadcast arp

ns-> set interface vlan1 broadcast arp trace-route

Availability of CLI Commands and Features

As you execute CLI commands using the syntax descriptions in this manual, you maand command features are unavailable for your NetScreen device model.

Because NetScreen devices treat unavailable command features as improper syntafeature usually generates the unknown keyword error message. When this messafeature’s availability using the ? switch. For example, the following commands list avcommand:

ns-> set vpn ?

ns-> set vpn vpn_name ?

ns-> set vpn gateway gate_name ?

Page 10: netscreen_CLI

Preface Object Name Conventions

viii

as addresses, admin users, creenOS configurations.

osed within double quotes ( “ );

tes; for example, “ local LAN ”

ensitive. For example, “local

. Examples of SBCS are ASCII, e character sets (DBCS)—are

quotes ( “ ), which have special ludes spaces.

h SBCS and MBCS, depending

Juniper Networks NetScreen CLI Reference Guide

OBJECT NAME CONVENTIONS

ScreenOS employs the following conventions regarding the names of objects—suchauth servers, IKE gateways, virtual systems, VPN tunnels, and zones—defined in S

• If a name string includes one or more spaces, the entire string must be enclfor example, set address trust “local LAN” 10.1.1.0/24.

• NetScreen trims any spaces leading or trailing text within a set of double quobecomes “local LAN” .

• NetScreen treats multiple consecutive spaces as a single space.

• Name strings are case sensitive, although many CLI key words are case insLAN” is different from “local lan”.

ScreenOS supports the following character types:

• Single-byte character sets (SBCS) and multiple-byte character sets (MBCS)European, and Hebrew. Examples of MBCS—also referred to as double-bytChinese, Korean, and Japanese.

• ASCII characters from 32 (0x20 in hexidecimals) to 255 (0xff), except doublesignificance as an indicator of the beginning or end of a name string that inc

Note: A console connection only supports SBCS. The WebUI supports boton the character sets that your Web browser supports.

Page 11: netscreen_CLI

Preface CLI Variables

ix

t affect the outcome of rameters as variables. Such

numbers, dates, and other

For example, the set arp

et2 is a physical interface.

Juniper Networks NetScreen CLI Reference Guide

CLI VARIABLES

Most Juniper Networks NetScreen CLI commands have changeable parameters thacommand execution. Juniper Networks NetScreen documention represents these pavariables may include names, identification numbers, IP addresses, subnet masks, values.

Variable NotationThe variable notation used in this manual consists of italicized parameter identifiers.command uses four identifiers, as shown here:

set arp{ip_addr mac_addr interfaceage number |always-on-dest |no-cache}

where

• ip_addr represents an IP address.

• mac_addr represents a MAC address.

• interface represents a physical or logical interface.

• number represents a numerical value.

Thus, the command might take the following form:

ns-> set arp 172.16.10.11 00e02c000080 ethernet2

where 172.16.10.11 is an IP address, 00e02c000080 is a MAC address, and ethern

Page 12: netscreen_CLI

Preface CLI Variables

x

tion.

ice group.

et).

.

Juniper Networks NetScreen CLI Reference Guide

Common CLI Variable NamesThe following is a list of CLI variable names used in NetScreen technical documenta

comm_name The community name of a host or other device.

date A date value.

dev_name A device name, as with flash card memory.

dom_name A domain name, such as “acme” in www.acme.com.

dst_addr A destination address.

filename The name of a file.

fqdn Fully-qualified domain name, such as www.acme.com.

grp_name The name of a group, such as an address group or service group.

interface A physical or logical interface.

id_num An identification number.

ip_addr An IPv4 address or IPv6 address.

key_str A key, such as a session key, a private key, or a public key.

key_hex A key expressed as a hexadecimal number.

loc_str A location of a file or other resource.

mac_addr A MAC address.

mbr_name The name of a member in a group, such as an address group or a serv

mask A subnet mask, such as 255.255.255.224 or /24.

mcst_addr A multicast address.

name_str The name of an item, such as “Marketing” for an address book entry.

n A subnet mask (for an IPv4 subnet) or a prefix length (for an IPv6 subn

number A numeric value, usually an integer, such as a threshold or a maximum

Page 13: netscreen_CLI

Preface CLI Variables

xi

riables might be numbered to ariables, each numbered for

Juniper Networks NetScreen CLI Reference Guide

Some commands contain multiple variables of the same type. The names of such vaidentify each individually. For example, the set dip command contains two id_num veasy identification:

set dip group id_num1 [ member id_num2 ]

pol_num An integer that identifies a policy.

port_num A number identifying a logical port.

pref_len A number identifying the prefix length for an IPv6 address.

pswd_str A password.

ptcl_num A number uniquely identifying a protocol, such as TCP, IP, or UDP.

serv_name The name of a server.

shar_secret A shared secret value.

spi_num A Security Parameters Index (SPI) number.

src_addr A source address.

string A character string, such as a comment.

svc_name The name of a service, such as HTTP or MAIL.

svc_num The ID number of a service, such as HTTP or MAIL.

time A time value.

tunn_str The name of a tunnel, such as an L2TP tunnel.

url_str A URL, such as www.acme.com.

usr_str A user name, usually an external entity such as a dialup user.

vrouter A virtual router, such as trust-vr or untrust-vr.

vsys The name of a vsys (virtual system).

zone The name of a security zone.

Page 14: netscreen_CLI

Preface New, Modified and Deleted Commands

xii

leases, certain commands may

ge 575

7

e 652

683

Juniper Networks NetScreen CLI Reference Guide

NEW, MODIFIED AND DELETED COMMANDSThis release of the CLI contains commands that are new and modified. For some reno longer exist.

New CommandsThe following commands are new in this release.

Modified CommandsThe following commands are modified in this release.

Deleted CommandsThere are no deleted commands in this release.

“alg” on page 24 “pppoa” on page 498

“auth” on page 45 “firewall” on page 201 “session” on pa

“auth-server” on page 52 “flow” on page 204 “url” on page 61

“BGP Commands” on page 74 “ippool” on page 301 “vrouter” on pag

“community-list” on page 88 “OSPF Commands” on page 387 “zone” on page

“neighbor” on page 102 “retransmit” on page 413

“config” on page 134 “policy” on page 471

Page 15: netscreen_CLI

Preface Juniper Networks NetScreen Publications

xiii

t www.juniper.net/techpubs/.

w.juniper.net/support/ or call tates).

-mail address below:

Juniper Networks NetScreen CLI Reference Guide

JUNIPER NETWORKS NETSCREEN PUBLICATIONS

To obtain technical documentation for any Juniper Networks NetScreen product, visi

For technical support, open a support case using the Case Manager link at http://ww1-888-314-JTAC (within the United States) or 1-408-745-9500 (outside the United S

If you find any errors or omissions in the following content, please contact us at the e

[email protected]

Page 16: netscreen_CLI

Preface Juniper Networks NetScreen Publications

xiv

Juniper Networks NetScreen CLI Reference Guide
Page 17: netscreen_CLI

1

1

a”

e (CLI) commands active-user

you may find that certain reen platform. A good example tScreen-5XP device. Similarly,

on of the vpn command. This

NetScreen CLI Reference Guide

1

“active-user” through “common-criteri

This section lists and describes Juniper Networks NetScreen Command Line Interfacthrough common-criteria.

Note: As you execute CLI commands using the syntax descriptions in this section,commands and command features are unavailable on your Juniper Networks NetScis the vsys command, which is available on a NetScreen-500 device, but not on a Nesome command options are unavailable on certain platforms, as with the df-bit optioption is available on a NetScreen-500, but not on a NetScreen-5XP.

Page 18: netscreen_CLI

“active-user” through “common-criteria”

2

active-user initiated a service request each user, and the number of

are license installed on the

NetScreen CLI Reference Guide

Description: Use the active-user command to display information for all users thatthrough the NetScreen device. The displayed information includes the IP address ofsessions (incoming and outgoing) currently active for the user.

Syntax

get

get active-user

Keywords and Variables

None.

Note: The maximum number of sessions allowed for users depends upon the softwdevice.

Page 19: netscreen_CLI

“active-user” through “common-criteria”

3

address security zone.

es defined for a security zone.

NetScreen CLI Reference Guide

Description: Use the address commands to define entries in the address book of a

An address book is a list containing all addresses, address groups, and domain namYou use address book entries to identify addressable entities in policy definitions.

Syntax

get

get address zone [ group name_str | name name_str ]

set

set address zone name_str{fqdn |ip_addr/mask}

[ string ]

unset

unset address zone name_str

Page 20: netscreen_CLI

“active-user” through “common-criteria”

4

et” and “Outside_Net”.

ed Sales_Group:

you can bind an address book MZ. You can also assign address see “Zone Names” on page B-I.

net.

ss group in a security policy g the set group address

ess group in a security policy

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameters

Example: The following commands create address book entries named “Local_N

set address trust Local_Net 10.1.1.0/24 “New_York_Subnet”set address untrust Outside_Net 1.1.12.1/24 “London_Subnet”

group

get address zone group name_str

Example: The following command displays information for an address group nam

get address trust group HTTP_Servers

name

zone The name of the security zone. The default security zones to which include Trust, Untrust, Global, DMZ, V1-Trust, V1-Untrust, and V1-Dbook entries to user-defined zones. For more information on zones,

fqdn The fully-qualified domain name of the host.

ip_addr/mask The address and subnet mask identifying an individual host or a sub

string A character string containing a comment line.

group The name of a group of address book entries. You can use an addredefinition to specify multiple addresses. (Create address groups usincommand.)

name name_str The name of an individual address book entry. You can use an addrdefinition to specify a single address.

Page 21: netscreen_CLI

“active-user” through “common-criteria”

5

admineters for the NetScreen device.

connect to the device

via e-mail

NetScreen CLI Reference Guide

Description: Use the admin commands to configure or display administrative paramThese parameters determine the following:

• Characteristics for each administrator, such as password and privilege level

• How the device performs administrator authentication

• Methods with which administrators can access the device

• An IP address or address range from which one or more administrators can

• Which port the device uses to detect administrative traffic

• Whether the device automatically sends generated alerts and traffic alarms

• Whether the device is enabled for reset

Syntax

clear

clear [ cluster ] admin { all | name name_str }

get

get admin[auth [ banner [ secondary ] | settings ] |current-user |manager-ip |ssh all |user [ login ]]

Page 22: netscreen_CLI

“active-user” through “common-criteria”

6

lnet login string }

NetScreen CLI Reference Guide

setset admin

{access attempts number |auth

{banner { console login string | secondary string | teserver name_str |timeout number |} |

device-reset |format { dos | unix } |http redirect |hw-reset |mail

{alert |mail-addr1 name_str | mail-addr2 name_str |server-name { ip_addr | name_str } |traffic-log} |

manager-ip ip_addr [ mask ] |name name_str |password [ pswd_str | restrict length number ] |port port_num |privilege { get-external | read-write } |root access console |ssh

{password { disable | enable } username name_str |port port_num

Page 23: netscreen_CLI

“active-user” through “common-criteria”

7

-only } ]

ffic-log } |

NetScreen CLI Reference Guide

} |telnet port port_num |user name_str password pswd_str [ privilege { all | read}

unset

unset admin{access attempts |auth

{banner

{console login |secondary |telnet login}

server |timeout} |

device-reset |format |http redirect |hw-reset |mail

{ alert | mail-addr1 | mail-addr2 | server-name | tramanager-ip { ip_addr | all } |name |password [ restrict-length ] |port |privilege |root access |

Page 24: netscreen_CLI

“active-user” through “common-criteria”

8

attempts to 5:

d before the device closes the

ress.

NetScreen CLI Reference Guide

ssh [ port ] |telnet { access tunnel | port } |user name_str}

Keywords and Variables

access attempts

set admin access attempts numberunset admin access attempts

Example: The following command sets the number of allowed unsuccessful login

set admin access attempts 5

alert

set admin mail alert

alert

clear admin all

access attempts Specifies the number (1 - 255) of unsuccessful login attempts alloweTelnet connection. The default is 3.

alert Collects system alarms from the device for sending to an e-mail add

all Clears all admin user profiles.

Page 25: netscreen_CLI

“active-user” through “common-criteria”

9

login }

admin sessions

t Console"

h the console port (console) or a nner created from the command cure Shell (SSH) logins.

ame—for either console or console login and a Telnet login. you can create an unrestricted ever you want a line to end.

ing admin users.

tScreen device automatically inutes. A value of 0 specifies no interval expires. You set this

NetScreen CLI Reference Guide

auth

get admin auth [ banner [ secondary ] | settings ]set admin auth banner console login stringset admin auth banner secondary stringset admin auth banner telnet login stringset admin auth server name_strset admin auth timeout numberunset admin auth banner { console login | secondary | telnetunset admin auth serverunset admin auth timeout

Example1: The following commands create two login banners:

• “Hyperterminal Management Console,“ displayed at the start of new console

• “Telnet Login Here,” displayed at the start of new Telnet admin sessions

set admin auth banner console login "Hyperterminal Managemenset admin auth banner telnet login "Telnet Login Here"

auth Configures admin authentication settings for the NetScreen device.

• banner Specifies the banner (string) displayed during login througTelnet or SSH session (telnet). The NetScreen device uses the baset admin auth banner telnet login string for both Telnet and Se

- secondary Specifies a second banner line that is always the sTelnet—under the first banner line, which can be different for aThe secondary banner can be up to 4000 bytes in length. Also,number of line breaks by inserting the special symbol “\n” wher

• server The name of the authentication server used for authenticat

• timeout Specifies the length of idle time (in minutes) before the Necloses the web administrative session. The value can be up 999 mtimeout. (Telnet admin sessions time out after the console timeoutinterval using the set console timeout command.)

Page 26: netscreen_CLI

“active-user” through “common-criteria”

10

string “Network Empire”. When wo login banners defined in the

he and propagates this change

r.

NetScreen CLI Reference Guide

Example2: The following command creates a secondary banner line with the textan admin initiates a console or Telnet login attempt, this line will appear under the tprevious example:

set admin auth banner secondary “Network Empire”

cluster

clear cluster admin user { cache | login }

Example: The following command clears remote administrative users from the cacto other devices in a NSRP cluster:

clear cluster admin user cache

current-user

get admin current-user

device-reset

set admin device-resetunset admin device-reset

cluster Propagates the clear operation to all other devices in a NSRP cluste

current-user Displays the user for the current administrative session.

device-reset Enables device reset for asset recovery.

Page 27: netscreen_CLI

“active-user” through “common-criteria”

11

e generates the configuration file. server or PCMCIA card using the

etScreen device from HTTP ection is disabled.

NetScreen CLI Reference Guide

format

set admin format { dos | unix }unset admin format

http redirect

set admin http redirectunset admin http redirect

hw-reset

set admin hw-resetunset admin hw-reset

login

clear [ cluster ] admin user loginget admin user login

format Determines the format (dos or unix) used when the NetScreen devicOn some Netscreen platforms, you can download this file to a TFTPCLI, or to a local directory using WebUI.

http redirect Enables and disables the redirection of administrative traffic to the N(default port 80) to HTTPS (default port 443). By default, HTTP redir

hw-reset Enables and disables hardware reset for asset recovery.

login Clears or displays all current administrative users.

Page 28: netscreen_CLI

“active-user” through “common-criteria”

12

to receive updates concerning

acme.com to receive updates

for sending alert and traffic logs.

affic logs.

NetScreen CLI Reference Guide

mail

set admin mail { ... }unset admin mail { ... }

Example: The following command configures the e-mail address [email protected] administrative issues:

set admin mail mail-addr1 [email protected]

mail-addr1

set admin mail mail-addr1 name_str

mail-addr2

set admin mail mail-addr2 name_str

Example: The following command configures the secondary e-mail address pat@concerning administrative issues:

set admin mail mail-addr2 [email protected]

mail Enables e-mail for sending alerts and traffic logs.

mail-addr1 name_str Sets the first e-mail address (such as [email protected])

mail-addr2 name_str Sets the secondary e-mail address for sending alert and tr

Page 29: netscreen_CLI

“active-user” through “common-criteria”

13

ddress 10.1.10.100:

p address is 0.0.0.0, which allows to specify up to six hosts or

he physical IP address of the

The maximum length of the name ensitive.

ngth of the password is 31 cter “?.”

NetScreen CLI Reference Guide

manager-ip

get admin manager-ipset admin manager-ip ip_addr [ mask ssh [ port ]unset admin manager-ip { ip_addr | all }

Example: The following command restricts management to a single host with IP a

set admin manager-ip 10.1.10.100 255.255.255.255

name

set admin name name_strunset admin name

passwordset admin password pswd_strunset admin password

manager-ip Restricts management to a host or a subnet. The default manager-imanagement from any workstation. All NetScreen devices allow yousubnets at once.Note: The manager-ip address must be unique, and different from tmanagement interface.

name The login name (name_str) of the root user for the NetScreen device.is 31 characters, including all symbols except ?. The name is case-s

password Specifies the password (pswd_str) of the root user. The maximum lecharacters, including all symbols except the special command chara

Page 30: netscreen_CLI

“active-user” through “common-criteria”

14

when using the web. Use any 0). Changing the admin port .

ser privileges externally from the

and ignores the privilege returned

length can be any number from 1

le only.

NetScreen CLI Reference Guide

portset admin port port_numunset admin port

privilegeset admin privilege ( get-external | read-write }

restrict lengthset admin password restrict length numberunset admin password restrict length

root access console

set admin root access consoleunset admin root access console

port Sets the port number (port_num) for detecting configuration changesnumber between 1024 and 32767, or use the default port number (8number might require resetting the device (see the reset command)

privilege Defines the administrative privilege level:

• get-external Instructs the NetScreen device to obtain the admin uRADIUS server.

• read-write Gives the RADIUS administrator read-write privileges, from the RADIUS server.

restrict length Sets the minimum password length of the root admin. The passwordto 31.

root access console

Restricts the root admin to logging in to the device through the conso

Page 31: netscreen_CLI

“active-user” through “common-criteria”

15

.10:

r

rver. This server receives e-mail

ing and the admin user type (local

minister NetScreen devices from ccess over unsecured channels.

ach admin.

ssion. The enable | disable _str specifies the admin user

unication occurs. The default is

NetScreen CLI Reference Guide

server-name

set admin mail server-name ip_addr

Example: The following command specifies a SMTP server at IP address 10.1.10

set admin mail server-name 10.1.10.10

settings

get admin auth settings

ssh

get admin ssh allset admin ssh password { disable | enable } username name_stset admin ssh password port port_numunset admin ssh [ port ]

server-name The IP address or name of the Simple Mail Transfer Protocol (SMTP) senotification of system alarms and traffic logs.

settings Displays admin authentication settings, including the current timeout settor remote).

ssh Provides access to the Secure Shell (SSH) utility. SSH allows you to adan Ethernet connection or a dial-in modem, thus providing secure CLI a

• all Displays the SSH PKA (Public Key Authentication) information for e

• password Sets the password for the user that establishes the SSH seswitch enables or disables password authentication. username namename.

• port port_num Specifies the logical SSH port through which the commport 22. Unsetting the port resets the SSH port to the default.

Page 32: netscreen_CLI

“active-user” through “common-criteria”

16

| read-only } ]

”, with password “swordfish”:

nge of port_num is 1024 - 32767.

The traffic log can contain a e log file to each specified e-mail

g is full, or every 24 hours,

sub-administrator). The maximum he user name is case-sensitive. r read-only).

NetScreen CLI Reference Guide

telnet

set admin telnet port port_numunset admin telnet port

traffic-log

set admin mail traffic-logunset admin mail traffic-log

user

get admin user [ cache | login ]set admin user name_str password pswd_str [ privilege { all unset admin user name_str

Example: The following command creates a non-root administrator named “rsmith

set admin user rsmith password swordfish privilege all

telnet port Provides CLI access through a Telnet connection. The acceptable ra

traffic-log Generates a log of network traffic handled by the NetScreen device.maximum of 4,096 entries. The NetScreen device sends a copy of thaddress (see mail-addr1 and mail-addr2). This happens when the lodepending upon which occurs first.

user Creates or displays a non-root administrator (super-administrator or user name length is 31 characters, including all symbols except ?. TThe privilege switch determines the privilege level of the user (all o

Page 33: netscreen_CLI

“active-user” through “common-criteria”

17

5.

enOS 5.1.0 or later.

NetScreen CLI Reference Guide

Defaults

The default admin name and password are netscreen.

The default number of access attempts is 3.

The default manager-ip is 0.0.0.0, and the default subnet mask is 255.255.255.25

The default privilege for a super-administrator is read-only.

By default, HTTP redirection is enabled on NetScreen devices that ship with Scre

The default mail alert setting is off.

The default for device reset is on.

Page 34: netscreen_CLI

“active-user” through “common-criteria”

18

alarm

the amount and type of

]

g ]

]

NetScreen CLI Reference Guide

Description: Use the alarm commands to set or display alarm parameters.

The alarm parameters determine when the device generates alarm messages, and information contained in the messages.

Syntax

clear

clear [ cluster ] alarm traffic[ policy pol_num1 [ -pol_num2 ] ]

[ end-time string ]

get

get alarm{threshold |traffic

[ policy { pol_num1 [ -pol_num2 ] } ][ service name_str ]

[ src-address ip_addr ] [ dst-address ip_addr [ detail

[ start-time string ] [ end-time strin[ minute | second

[ threshold number [ -number ] [ rate number [ -number ] ]

]] |

}

Page 35: netscreen_CLI

“active-user” through “common-criteria”

19

ropagates the change to other

r.

m entries that occurred under the ation and the time of the most

NetScreen CLI Reference Guide

set

set alarm threshold {cpu number |memory number |session { count number | percent number }}

unset

unset alarm threshold { CPU | memory | session }

Keywords and Variables

cluster

clear cluster alarm traffic [ ... ]

Example: The following command clears the alarm table entries for policy 4 and pdevice in a NSRP cluster:

clear cluster alarm traffic policy 4

detail

get alarm traffic [ ... ] detail [ ... ]

cluster Propagates the clear operation to all other devices in a NSRP cluste

detail Displays detailed information for each policy, including all traffic alarpolicy. If you omit this option, the output contains only general informrecent alarm for each policy.

Page 36: netscreen_CLI

“active-user” through “common-criteria”

20

that occur on or after January 1,

er

ies at (or after) 11:59pm,

time

] [ ... ]

tries that occurred at or before the traffic alarm entries that occurred m:ss]

year using the last two digits or all between the date and the time can

r for several policies specified by a nd the total number of established s as follows: pol_num1-pol_num2

NetScreen CLI Reference Guide

Example: The following command displays event alarm entries or traffic alarm entries2003:

get alarm traffic detail start-time 01/01/2003

end-time | start-timeclear [ cluster ] alarm traffic policy [ ... ] end-time numbget alarm traffic [ ... ] end-time numberget alarm traffic [ ... ] start-time number

Example: The following command performs a detailed display of traffic alarm entrDecember 31, 2003 and at or before 12:00am, December 31, 2004:

get alarm traffic detail start-time 12/31/2003-23:59:00 end-12/31/2004-24:00:00

policy

clear [ cluster ] alarm traffic policy pol_num1 [ -pol_num2 get alarm traffic policy pol_num

start-timeend-time

The start-time option displays event alarm entries or traffic alarm entime specified. The end-time option displays event alarm entries or at or after the time specified. The format for string is mm/dd[/yy-hh:mYou can omit the year (the current year is the default), or express thefour digits. The hour, minute, and second are optional. The delimiter be a dash or an underscore:12/31/2002-23:59:0012/31/2002_23:59:00

policy Displays traffic alarm entries for a policy specified by its ID number orange of ID numbers. The ID number can be any value between 0 apolicies. To define a range, enter the starting and ending ID number

Page 37: netscreen_CLI

“active-user” through “common-criteria”

21

:

reshold settings at bytes per

ice:

tes per second or bytes per

r policies with a flow rate at a

ries for policies with a threshold at

as TCP, ICMP, or FTP. (To not have to be complete; for not specify a Service group, note P displays traffic alarm entries for

NetScreen CLI Reference Guide

Example: The following command clears the entries for policy 2 in the alarm table

clear alarm traffic policy 2

second | minute

get alarm traffic [ ... ] detail

Example: The following command displays traffic alarm entries for policies with thsecond:

get alarm traffic detail second

service

get alarm traffic [ ... ] service name_str [ ... ]

Example: The following command displays traffic alarm entries for the HTTP serv

get alarm traffic service http

second | minute Displays traffic alarm entries for policies with threshold settings at byminute.

• The rate number [ -number ] option displays traffic alarm entries fospecified value or within a specified range.

• The threshold number [ -number ] option displays traffic alarm enta specified value or within a specified range.

service Displays traffic alarm entries for a specified service (name_str), suchdisplay all services, make the name_str value Any.) The name doesexample, both TC and CP are recognized as TCP. Although you canthat because TP is recognized as FTP, HTTP, and TFTP, entering Tall three of these Services.

Page 38: netscreen_CLI

“active-user” through “common-criteria”

22

address 10.1.9.9 and destined

ions:

(ip_addr) or from a specified

addr) or for a specified direction,

specified value or within a

cifies how many sessions can ption specifies what percentage of .

NetScreen CLI Reference Guide

src-address | dst-addr

get alarm traffic [ ... ] src-address ip_addr [ ... ]get alarm traffic [ ... ] dst-address ip_addr [ ... ]

Example: The following command displays traffic alarm entries originating from IPfor IP address 1.1.10.10:

get alarm traffic src-address 10.1.9.9 dst-address 1.1.10.10

threshold

get alarm thresholdget alarm traffic [ ... ] threshold number [ -number ]set alarm threshold { ... }unset alarm threshold { CPU | memory | session }

Example: The following command sets the session limit threshold to 75,000 sess

set alarm threshold session count 75000

src-address Displays traffic alarm entries originating from a specified IP address direction, such as inside_any or outside_any.

dst-address Displays traffic alarm entries destined for a specified IP address (ip_such as inside_any or outside_any.

threshold Displays traffic alarm entries for policies with threshold settings at a specified range.

• cpu number sets the cpu threshold.

• memory number sets the memory threshold.

• session sets the session threshold. The count number option speexist before the device generates an alarm. The percent number othe session limit is allowable before the device generates an alarm

Page 39: netscreen_CLI

“active-user” through “common-criteria”

23

ies originating from IP address

detail

NetScreen CLI Reference Guide

traffic

clear [ cluster ] alarm traffic [ ... ]get alarm traffic [ ... ]

Example: The following command performs a detailed display of traffic alarm entr10.1.9.9 and destined for IP address 1.1.10.10:

get alarm traffic src-address 10.1.9.9 dst-address 1.1.10.10

traffic Specifies traffic alarm entries.

Page 40: netscreen_CLI

“active-user” through “common-criteria”

24

algs (ALG) on the NetScreen es of traffic. ALGs are enabled

rpc ]

unrpc ]

bled).H.245 is a control signaling

) ALG on the device (the default is

NetScreen CLI Reference Guide

Description: Use the alg commands to enable or disable application layer gatewaydevice. An ALG runs as a service and can be associated in policies with specified typby default.

Syntax

set

set alg [ h245 | msrpc | q931 | ras | rtsp | sip | sql | sun

unset

unset alg [ h245 | msrpc | q931 | ras | rtsp | sip | sql | s

Keywords and Variables

h245

msrpc

h245 Enables or disables the H.245 ALG on the device (the default is enaprotocol used to exchange messages between H.323 endpoints.

msrpc Enables or disables the Microsoft Remote Procedure Call (MS-RPCenabled).

Page 41: netscreen_CLI

“active-user” through “common-criteria”

25

bled). Q.931 is a Layer 3 protocol nt, maintenance, and termination

LG on the device (the default is nd gateways) and gatekeepers, anges, status, and disengage

on the device (the default is

device (the default is enabled).

led).

NetScreen CLI Reference Guide

q931

ras

rtsp

sip

sql

q931 Enables or disables the Q.931 ALG on the device (the default is enaused for Integrated Services Digital Network (ISDN) call establishmebetween h.323 endpoints.

ras Enables or disables the Registration, Admission, and Status (RAS) Aenabled). RAS is the protocol between H.323 endpoints (terminals aand is used to perform registration, admission control, bandwidth chprocedures.

rtsp Enables or disables the Real Time Streaming Protocol (RTSP) ALGenabled).

sip Enables or disables the Session Initiation Protocol (SIP) ALG on the

sql Enables or disables the SQL ALG on the device (the default is enab

Page 42: netscreen_CLI

“active-user” through “common-criteria”

26

vice (the default is enabled).

d RAS ALGs.

NetScreen CLI Reference Guide

sunrpc

sunrpc Attaches the Sun Remote Procedure Call (Sun-RPC) ALG on the de

Note: To set or unset the H.323 ALG you must set or unset the H.245, Q.931, an

Page 43: netscreen_CLI

“active-user” through “common-criteria”

27

alias named variable containing the

e the represented command.

ethernet1/1 command, then

NetScreen CLI Reference Guide

Description: Use the alias commands to create, remove, or list aliases. An alias is ainitial characters of a CLI command. After creating an alias, you can use it to execut

Syntax

get

get alias

set

set alias name_str string

unset

unset alias name_str

Keywords and Variables

Variable Parameters

Example: The following commands create an alias representing the get interfaceexecute the command using the alias:

set alias int_1 "get interface ethernet1/1"int_1

name_str The name of the CLI command alias.

string The CLI command to which you assign the alias.

Page 44: netscreen_CLI

“active-user” through “common-criteria”

28

alldefault values.

t the device.

efault settings.

are you sure? y / [n] n”

ginal factory default settings.

NetScreen CLI Reference Guide

Description: Use the all command to return all configuration settings to the factory

Syntaxunset all

Keywords and Variables

None.

ExampleIn the following example, you reset the device to its factory default settings and rese

1. Execute the unset all command.

unset all

The following prompt appears: “Erase all system config, are you sure y / [n]?

2. Press the Y key. This action returns the system configuration to the factory d

3. Execute the reset command.

reset

The following prompt appears: “Configuration modified, save? [y] / n”

4. Press the N key. This action generates the following prompt: “System reset,

5. Press the Y key. This action restarts the system. The device now has its ori

Page 45: netscreen_CLI

“active-user” through “common-criteria”

29

arpe Address Resolution Protocol

NetScreen CLI Reference Guide

Description: Use the arp commands to create, remove, or list interface entries in th(ARP) table of the NetScreen device.

Syntax

clear

clear [ cluster ] arp [ ip_addr | all ] |

get

get arp [ all | asic id_num ]

set

set arp{ip_addr mac_addr interface |age number |always-on-dest}

unset

unset arp{ip_addr [ interface ] |age |always-on-dest}

Page 46: netscreen_CLI

“active-user” through “common-criteria”

30

tic entry in the ARP table.

static entry in the ARP table.

direct traffic to reach the more information on

ber.

ue is 1200 seconds (20 minutes).

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameters

set arp ip_addr mac_addr interface

all

get arp all

asic

get asic id_num

age

set arp age number

ip_addr The IP address of a network device to which you want to make a sta

mac_addr The MAC address of a network device to which you want to make a

interface The name of the interface through which the NetScreen device can network device with the specified IP address and MAC address. Forinterfaces, see “Interface Names” on page A-I.

all Lists all current ARP entries for every existing virtual system (vsys).

asic Lists all current ARP entries for each ASIC chip identified by ID num

age Sets the age-out value (in seconds) for ARP entries. The default val

Page 47: netscreen_CLI

“active-user” through “common-criteria”

31

ing packet with a heading his may be necessary when devices using the Hot Standby .

edundancy Protocol (NSRP)

NetScreen CLI Reference Guide

always-on-dest

set arp always-on-dest

cluster

clear [ cluster ] arp

always-on-dest Directs the NetScreen device to send an ARP request for any incomcontaining a MAC address not yet listed in the MAC address table. Tpackets originate from server load-balancing (SLB) switches or fromRouter Protocol/Virtual Router Redundancy Protocol (HSRP/VRRP)

cluster Propagates the clear operation to all other devices in a NetScreen Rcluster.

Page 48: netscreen_CLI

“active-user” through “common-criteria”

32

attackbject groups, and the attack

NetScreen CLI Reference Guide

Description: Use the attack commands to view and define attack objects, attack oobject database server settings.

Syntaxget

get attack[name_str |anomaly [ sort-by { id | name } ] |db |disable [ sort-by { def-type | id | name | type } ] |group [ name_str | sort-by { def-type | name } ] |id id_num |[ signature ] sort-by { def-type | id | name } |sort-by { def-type | id | name | type }]

set

set attack {CS:name_str

{aim-chat-room-desc |aim-chat-room-name |aim-get-file |aim-nick-name |aim-put-file |

Note: This command is available only if advanced mode is installed on the device.

Page 49: netscreen_CLI

“active-user” through “common-criteria”

33

NetScreen CLI Reference Guide

aim-screen-name |dns-cname |ftp-command |ftp-password |ftp-pathname |ftp-username |gnutella-http-get-filename |http-authorization |http-header-user-agent |http-request |http-status |http-text-html |http-url |http-url-parsed |http-url-variable-parsed |imap-authenticate |imap-login |imap-mailbox |imap-user |msn-display-name |msn-get-file |msn-put-file |msn-sign-in-name |pop3-auth |pop3-header-from |pop3-header-line |pop3-header-subject |pop3-header-to |pop3-mime-content-filename |pop3-user |smb-account-name |smb-connect-path |smb-connect-service |smb-copy-filename |

Page 50: netscreen_CLI

“active-user” through “common-criteria”

34

al } |

NetScreen CLI Reference Guide

smb-delete-filename |smb-open-filename |smtp-from |smtp-header-from |smtp-header-linesmtp-header-subjectsmtp-header-to |smtp-mime-content-filename |smtp-rcpt |stream256 |ymsg-alias |ymsg-chatroom-message |ymsg-chatroom-name |ymsg-nickname |ymsg-p2p-get-filename-url |ymsg-p2p-put-filename-url |ymsg-user-name}

[ not ] string severity { info | low | medium | high | critic

db {mode { notification | update } |schedule

{daily hh:mm |monthly number hh:mm |weekly day hh:mm} |

server url_str} |

disable name_str |group name_str1 [ add name_str2 ] |}

Page 51: netscreen_CLI

“active-user” through “common-criteria”

35

g

be prefaced with CS: .

and defines the signature string

fy any of the following levels: info,

NetScreen CLI Reference Guide

unset

unset attack {name_str |db { mode | schedule | server } |disable name_str |group name_str1 [ remove name_str2 ]}

Keywords and Variables

Variable Parameter

get attack name_strset attack name_str aim-chat-room-desc string severity strin…set attack name_str ymsg-user-name string severity stringunset attack name_str

name_str Defines the attack object name. If it is a user-defined attack, it must

Specifies one of the following contexts for Deep Inspection to searchfor which the Deep Inspection module searches:

• aim-chat-room-desc string

• ymsg-user-name string

- severity Defines the severity level of the attack. You can specilow, medium, high, critical.

Page 52: netscreen_CLI

“active-user” through “common-criteria”

36

otuser”, specifies its context as igh”:

| weekly day hh:mm }

ing your own attack objects, epts & Examples ScreenOS

tabase.

al database—either numerically

ing—in alphabetical order—first

support virtual systems, you must

NetScreen CLI Reference Guide

Example: The following command creates an attack object for FTP named “CS:ro“ftp-username”, defines its signature as “root”, and specifies its severity level as “h

set attack CS:rootuser ftp-username root severity high

anomaly

get attack anomaly [ sort-by { id | name } ]

attack

get attack

db

get attack dbset attack db mode { notification | update }set attack db schedule { daily hh:mm | monthly number hh:mm set attack db server url_strunset attack db { mode | schedule | server url_str }

Note: For a complete, descriptive list of contexts that you can specify when creatrefer to Appendix A: Contexts for User-Defined Signatures in the NetScreen ConcReference Guide: Volume 4, Attack Detection and Defense Mechanisms.

anomaly Displays protocol anomaly attack objects currently stored in the local da

sort-by Indicates the organization for the display of protocol anomalies in the locby id or alphabetically by name .

attack Displays all attack objects currently stored in the local database, displayuser-defined attacks (if any) and then predefined attacks.

db Specifies the attack object database server. On NetScreen devices that set this command at the root level.

Page 53: netscreen_CLI

“active-user” through “common-criteria”

37

server and set a schedule to the database on the server is

and updating the attack object ject database server at

n the server is more recent than nt, a notice appears on the Home vice.) The update method times and automatically updates e on the server is more recent

ject database server and updating ily, monthly of weekly schedule.

nsetting the attack object ng the server or from updating the

NetScreen CLI Reference Guide

Example: The following commands define the URL of the attack object database check the server automatically and then notify the NetScreen device admin when more recent than that on the NetScreen device:

set attack db server http://www.juniper.net/attacksset attack db schedule daily 07:00set attack db mode notification

disable

set attack disable name_strunset attack disable name_strget attack disable

• mode Selects either notification or update as the mode for checkingdatabase. The notification method automatically checks the attack obuser-defined times and notifies the NetScreen admin if the database othe one on the NetScreen device. (If the data on the server is more recepage in the WebUI, and in the CLI after you log in to the NetScreen deautomatically checks the attack object database server at user-definedthe database on the NetScreen device if it determines that the databasthan the one on the NetScreen device.

• schedule string Sets the time for automatically checking the attack obthe attack object database on the NetScreen device. You can set a da

• server url_str Defines the URL of the attack object database server. Udatabase server stops the NetScreen device from automatically checkilocal database.

Page 54: netscreen_CLI

“active-user” through “common-criteria”

38

| type } ]

device by name in alphabetical

ack objects. You can organize the

then by signature, and then

ber.

ttack name.

omaly and then by signature.

database:

the group, displaying—in ed attack groups.

up names, regardless of whether d attack group names must begin

attack group. The keywords add the specified group.

NetScreen CLI Reference Guide

get attack disable sort-by [ sort-by { def-type | id | name

group

get attack group [ name_str | sort-by { def-type | name } ]set attack group name_str1 [ add name_str2 ]unset attack group name_str1 [ remove name_str2 ]

Example: The following command displays all the attack groups on the NetScreenorder:

get attack group sort-by name

disable Disables the specified predefined attack object or a list of all disabled attdisplay of the list by one of the following attributes:

• def-type: Organizes the disabled attack object display by anomaly andwithin each of these two categories, alphabetically by protocol.

• id: Organizes the disabled attack object display numerically by ID num

• name: Organizes the disabled attack object display alphabetically by a

• type: Organizes the disabled attack object display alphabetically by an

group Specifies an attack object group.

sort-by Indicates the organization for the display of attack groups from the local

• def-type: Organizes the attack group display by the definition type of alphabetical order—first user-defined groups (if any) and then predefin

• name: Organizes the attack group display alphabetically by attack grothey are user-defined or predefined. However, because all user-definewith “CS:”, they appear together alphabetically anyway.

name_str specifies a name for the creation, deletion, or modification of anand remove indicate whether you are adding or deleting an attack from

Page 55: netscreen_CLI

“active-user” through “common-criteria”

39

in the NetScreen device:

s anything except the permitted

um

by name:

user-defined attack pattern.

tabase.

s by one of the following attributes:

the definition type of the attack (if any) and then predefined

lly by ID number, first listing edefined attack objects.

betically by attack name.

NetScreen CLI Reference Guide

idget attack id id_num

Example: The following command displays the attack object with ID number 500

get attack id 720

notset attack CS:name_str not string1 severity string2

Example: The following command defines the attack object named CS:badlogin aFTP username “jj2345” with a medium level severity:

set attack CS:badlogin ftp-username not jj2345 severity medi

signatureget attack signature [ sort-by { def-type | id | name } ]

Example: The following command displays signature attack objects alphabetically

get attack signature sort-by name

id Specifies the ID number of an attack object in the local database.

not Defines as an attack object anything in the specified context except the

signature Displays stateful signature attack objects currently stored in the local da

• sort-by: Specifies the organizational display of signature attack object

- def-type: Organizes the stateful signature attack object display byobject, displaying—in alphabetical order—first user-defined objectsattack objects.

- id: Organizes the stateful signature attack object display numericauser-defined attack objects, which have no ID number, and then pr

- name: Organizes the stateful signature attack object display alpha

Page 56: netscreen_CLI

“active-user” through “common-criteria”

40

vice organized numerically:

e by one of the following

the attack object—first anomaly

e.

d then by signature.

NetScreen CLI Reference Guide

sort-by

get attack sort-by { def-type | id | name | type }

Example: The following command displays all attack objects in the NetScreen de

get attack sort-by id

sort-by Specifies the organizational display of attack objects in the local databasattributes:

• def-type: Organizes the attack object display by the definition type of and then stateful signature attack objects.

• id: Organizes the attack object display numerically by ID number.

• name: Organizes the attack object display alphabetically by attack nam

• type: Organizes the attack object display alphabetically by anomaly an

Page 57: netscreen_CLI

“active-user” through “common-criteria”

41

attack-dbtes and checking.

key is installed on the device.

re recent than the one on the

iately with the database stored on

NetScreen CLI Reference Guide

Description: Use the attack-db commands to perform attack object database upda

Syntax

exec

exec attack-db { check | update }

Keywords and Variables

check

exec attack-db check

update

exec attack-db update

Note: This command is available only if advanced mode and the Deep Inspection db

check Immediately checks if the attack object database on the server is moNetScreen device.

update Updates the attack object database on the NetScreen device immedthe attack object database server.

Page 58: netscreen_CLI

“active-user” through “common-criteria”

42

audible-alarm.

e }

e }

NetScreen CLI Reference Guide

Description: Use the audible-alarm command to activate the audible alarm feature

Syntax

get

get audible-alarm

set

set audible-alarm{ all | battery | fan-failed | power-failed | temperatur

unset

unset audible-alarm{ all | battery | fan-failed | power-failed | temperatur

Page 59: netscreen_CLI

“active-user” through “common-criteria”

43

rface module failure, a power old.

le failure.

NetScreen CLI Reference Guide

Keywords and Variables

all

set audible-alarm allunset audible-alarm all

battery

set audible-alarm batteryunset audible-alarm battery

fan-failed

set audible-alarm fan-failedunset audible-alarm fan-failed

module-failed

set audible-alarm module-failedunset audible-alarm module-failed

all Enables or disables the audible alarm in the event of a fan failure, a intesupply failure, or a temperature increase above an admin-defined thresh

battery Enables or disables the audible alarm in the event of battery failure.

fan-failed Enables or disables the audible alarm in the event of a fan failure.

module-failed Enables or disables the audible alarm in the event of an interface modu

Page 60: netscreen_CLI

“active-user” through “common-criteria”

44

ilure.

admin-defined threshold.

NetScreen CLI Reference Guide

power-failed

set audible-alarm power-failedunset audible-alarm power-failed

temperature

set audible-alarm temperatureunset audible-alarm temperature

power-failed Enables or disables the audible alarm in the event of a power supply fa

temperature Enables or disables the audible alarm if the temperature rises above an

Page 61: netscreen_CLI

“active-user” through “common-criteria”

45

auth

tion problems occur with the r) by executing the delete

NetScreen CLI Reference Guide

Description: Use the auth commands to specify a user authentication method.

The four available methods include:

• A built-in database

• A RADIUS server

• SecurID

• Lightweight Directory Access Protocol (LDAP)

Note: If the NetScreen device uses SecurID to authenticate users, and communicaACE server, clear the current SecurID shared secret from the device (and the servenode_secret command.

Page 62: netscreen_CLI

“active-user” through “common-criteria”

46

ing | success string }

NetScreen CLI Reference Guide

Syntax

clear

clear [ cluster ] auth[history |queue |table [ id id_num | ipaddr ip_addr ]]

get

get auth[banner |history [ id id_num | ip ip_addr ] |queue |settings |table [ id id_num | ip ip_addr ]]

set

set auth{banner { ftp | http | telnet } { fail string | login strdefault auth server name_str |radius accounting

{action cleanup-session |port port_num}

}

Page 63: netscreen_CLI

“active-user” through “common-criteria”

47

NetScreen CLI Reference Guide

unset

unset auth{banner { ftp | http | telnet }

{ fail | login | success }default auth serverradius accounting

{action cleanup-session |port}

}

Page 64: netscreen_CLI

“active-user” through “common-criteria”

48

:

se banners to report success or

is unsuccessful.

prompt appears.

gin attempt is successful.

up 4000 bytes long. You can bol “/n” wherever you want a line

r.

NetScreen CLI Reference Guide

Arguments

banner

get auth bannerset auth banner { ftp | http | telnet }unset auth banner { ftp | http | telnet }

Example: The following command defines a banner for a failed FTP login attempt

set auth banner ftp fail "FTP login attempt failed"

cluster

clear [ cluster ] auth [ ... ]

banner Defines or displays firewall banners. The NetScreen device uses thefailure of login requests.

• ftp Reports on the success or failure of FTP login requests.

• http Reports on the success or failure of HTTP login requests.

• telnet Reports on the success or failure of Telnet login requests.

- fail string Specifies a message string to display a login attempt

- login string Specifies a message string to display when a login

- success string Specifies a message string to display when a lo

FTP, HTTP, and Telnet login, success, and fail banners can each beinclude multiple line breaks in the banner by inserting the special symbreak to be.

cluster Propagates the clear operation to all other devices in a NSRP cluste

Page 65: netscreen_CLI

“active-user” through “common-criteria”

49

h_Server):

tScreen device uses this server tication server.

Screen device.

NetScreen CLI Reference Guide

default

set auth default auth server name_strunset auth default auth server

Example: The following command identifies the default authentication server (Aut

set auth default auth server Auth_Server

history

clear [ cluster ] auth historyget auth history [ id id_num | ip ip_addr ]

queue

clear [ cluster ] auth queueget auth queue

default auth server

Specifies a default firewall authentication server (name_str). The Newhen a security policy does not explicitly identify a particular authen

history Clears or displays the history of users authenticated through the Net

queue Clears or displays the internal user authentication queue.

Page 66: netscreen_CLI

“active-user” through “common-criteria”

50

S server to track RADIUS session a RADIUS server might need to ey end, the number of bytes or s generally referred to as RADIUS DIUS server receives an

ng-Stop message.orized sessions. For example, a ting-Stop message from an if a subsequent user gets a ous user's session.

ice receives Accounting-Start and ure allows the device to clear out m an external RADIUS client. This e same assigned IP address, and

root level only.t is not required for the NetScreen e RADIUS server.

elds the same display as the get

NetScreen CLI Reference Guide

radius accounting

set auth radius accounting action cleanup-sessionset auth radius accounting port port_numunset auth radius accounting action cleanup-sessionunset auth radius accounting port

settings

get auth settings

radius accounting This feature allows any organization that owns or controls a RADIUinformation for billing, monitoring, or other purposes. For example, record information about when authorized sessions begin, when thpackets exchanged during each session, and so on. Such tracking iaccounting. Each RADIUS accounting session begins when the RAAccounting-Start message, and ends when it receives an AccountiRADIUS accounting allows the device to monitor and manage authdevice might clear out zombie sessions when it receives an Accounexternal RADIUS client. This could prevent misuse of wireless callsprevious user’s assigned IP address, and attempts to use the previ

The port (port_num) setting specifies the port through which the devAccounting-Stop messages. In addition, the cleanup-session featzombie sessions when it receives an Accounting-Stop message frofeature prevents misuse of wireless calls if subsequent users get thhappen to use the previous user's session in the device.Note: This feature is not supported on the vsys level, and is for theNote: This feature is only for clearing zombie sessions. Enablemendevice to support RADIUS accounting while communicating with th

settings Displays default user authentication server settings. (This option yiauth command.

Page 67: netscreen_CLI

“active-user” through “common-criteria”

51

ble:

try with source IP 10.1.10.10:

thentication), or displays such

isplays all table entries.

address (ip_addr).

NetScreen CLI Reference Guide

table

clear [ cluster ] auth table [ id id_num | ip ip_addr ]get auth table [ id id_num | ip ip_addr ]

Example1: The following command clears entry 7 from the user authentication ta

clear auth table id 7

Example2: The following command displays authentication details from a table en

get auth table ip 10.1.10.10

table Clears entries from the user authentication table (thus forcing reauentries. Entries in the user authentication table can represent:

• users currently authenticated

• users currently undergoing authentication

• users denied authentication

Without parameters (described below), the table option clears or d

• id id_num Clears or displays a particular entry by ID (id_num).

• ip ip_addr Clears or displays all entries with a common source IP

Page 68: netscreen_CLI

“active-user” through “common-criteria”

52

auth-serverr user authentication with a nd XAuth configurations use

|

NetScreen CLI Reference Guide

Description: Use the auth-server commands to configure the NetScreen device fospecified authentication server. Administrators, policies, VPN tunnel specifications, athese server specifications to gain access to the appropriate resources.

Syntax

get

get auth-server{name_str |all |id id_num}

set

set auth-server name_str{account-type { [ admin ] | [ auth ] [ l2tp ] [ xauth ] }backup1 { ip_addr | name_str } |backup2 { ip_addr | name_str } |fail-over revert-interval number |id id_num |ldap

{cn name_str |dn name_str |port port_num |server-name { ip_addr | name_str }} |

radius

Page 69: netscreen_CLI

“active-user” through “common-criteria”

53

NetScreen CLI Reference Guide

{attribute

{acct-session-id length number |calling-station-id} |

compatibility rfc-2138 |port port_num |retries number |secret shar_secret |timeout number} |

securid{auth-port port_num |duress number |encr id_num |retries number |timeout number} |

server-name { ip_addr | name_str } |src-interface interface |timeout number |type { ldap | radius | securid } |username

{domain dom_name |separator string number number}

}

Page 70: netscreen_CLI

“active-user” through “common-criteria”

54

NetScreen CLI Reference Guide

unset

unset auth-server{name_string

[account-type

{admin |[ auth ] [ ike ] [ l2tp ] [ xauth ]}

backup1 | backup2 |fail-over revert-interval |radius

{attribute

{acct-session-id length |calling-station-id} |

compatibility rfc-2138 |port port_num |retries |secret shar_secret |timeout number} |

src-interface |timeout |typeusername { domain | separator }]

id id_num}

Page 71: netscreen_CLI

“active-user” through “common-criteria”

55

ecifies type RADIUS:

[ l2tp ] [ xauth ] }

entication user, an L2TP user, or to create an auth-L2TP user, an . You cannot combine an admin

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameter

set auth-server name_str [ ... ]

Example: The following command creates a server object name (radius1) and sp

set auth-server radius1 type radius

account-type

set auth-server name_str account-type { [ admin ] | [ auth ]

all

get auth-server all

name_str Identifies the object name of the authentication server.

account-type Specifies the types of users authenticated by the server (name_str).

• admin specifies admin users.

• auth specifies authentication users.

• l2tp specifies Layer 2 Tunneling Protocol (L2TP) users.

• xauth specifies XAuth users.

You can define a user as a single user type—an admin user, an authan XAuth user. You can combine auth, L2TP, and XAuth user typesauth-XAuth user, an L2TP-XAuth user, or an auth-L2TP-XAuth useruser with another user type.

all Specifies all configured authentication servers.

Page 72: netscreen_CLI

“active-user” through “common-criteria”

56

backup2 { ip_addr |

server object named “radius1” primary backup server at

erver for an LDAP, RADIUS, or

n server for an LDAP or RADIUS .

pass after an authentication uthentication servers. When an

device tries the backup servers. If rval time interval has elapsed, the er. Otherwise, it resumes sending ) to 86400 seconds.

NetScreen CLI Reference Guide

backup1 | backup2

set auth-server name_str { backup1 { ip_addr | name_str } | name_str } }

unset auth-server name_str { backup1 | backup2 }

Example: With the following commands, you first create a RADIUS authenticationat IP address 10.1.1.50. It stores authentication user accounts. Then you define a10.1.1.51 and a secondary backup server at 10.1.1.52:

set auth-server radius1 server-name 10.1.1.50set auth-server radius1 type radiusset auth-server radius1 account-type authset auth-server radius1 backup1 10.1.1.51set auth-server radius1 backup2 10.1.1.52

fail-over

set auth-server name_str fail-over revert-interval number |unset auth-server name_str fail-over revert-interval

backup1 The IP address or DNS name of the primary backup authentication sSecurID server type.

backup2 The IP address or DNS name of the secondary backup authenticatioserver type. SecurID does not support more than one backup server

fail-over This feature specifies the interval (expressed in seconds) that must attempt, before the device attempts authentication through backup aauthentication request sent to a primary server fails, the NetScreen authentication via a backup server is successful, and the revert-intedevice sends subsequent authentication requests to the backup servthe requests to the primary server. The range is 0 seconds (disabledThis feature applies to RADIUS and LDAP servers only.

Page 73: netscreen_CLI

“active-user” through “common-criteria”

57

uthentication server radius1:

n page 64.

server. If you do not define an ID

ication.

ver to identify the individual ser ID” and “cn” means “common

the LDAP server before using the , c=us;o=netscreen, where “c”

with the LDAP server. The default

server.

NetScreen CLI Reference Guide

id

get auth-server id id_numset auth-server name_str id id_numunset auth-server id id_num

Example: The following command creates an identification number (200) for the a

set auth-server radius1 id 200

ldap

set auth-server name_str ldap { ... }

Example: For an example of this option, see “Defining an LDAP Server Object” o

id The user-defined identification number (id_num) of the authenticationnumber explicitly, the NetScreen device creates one automatically.

ldap Configures the NetScreen device to use an LDAP server for authent

• cn name_str The Common Name identifier used by the LDAP serentered in a LDAP server. For example, an entry of “uid” means “uname”.

• dn name_str The Distinguished Name identifier is the path used bycommon name identifier to search for a specific entry (for examplestands for “country”, and “o” for “organization”).

• port port_num Specifies the port number to use for communicationport number for LDAP is 389.

• server-name name_str The IP address or DNS name of the LDAP

Page 74: netscreen_CLI

“active-user” through “common-criteria”

58

tication.

thenticates the user, the device session. The accounting session counting-Start message, and the ach RADIUS access or request

sion-id in bytes. The default length of this value is 11 servers, which may have

-session-id from 6 bytes to 10 wing command:

length

ission. The calling-station-id t consist of the phone number of the setting by executing the

id

FC 2138, as compared with RFC and RFC 2138 are mutually ead of RFC 2865. In cases where RFC 2865 and RFC 2138.

NetScreen device sends change the default port number to

efore RADIUS authentication fails.

NetScreen CLI Reference Guide

radiusset auth-server name_str radius { ... }unset auth-server name_str radius { port | timeout }

radius Configures the NetScreen device to use a RADIUS server for authen

• attribute Specifies settings for RADIUS accounting.

Each time an XAuth user connects to the device and the device auestablishes a new acct-session-id, which identifies the accounting lasts between the time the device sends the RADIUS server an Actime it sends an Accounting-Stop message. To identify the user, emessage may contain the calling-station-id (described below).

- acct-session-id length number The length of the account-sesacct-session-id uniquely identifies the accounting session. Thebytes. The number setting is for accommodating some RADIUSproblems with the default length. You can set the length of acctbytes, inclusive. To restore the default setting, execute the follo

unset auth-server name_str radius attribute acct-session-id

- calling-station-id Enables or disables calling-station-id transmidentifies the originator of the call. For example, this value mighthe user originating the call. To prevent sending this ID, disablefollowing command:

unset auth-server name_str radius attribute calling-station-

• compatibility rfc-2138 Makes RADIUS accounting comply with R2865. For operations where RFC 2865 (the most recent standard) exclusive, the command works in accordance with RFC 2138, instthe behavior is additive, the command works compatibly with both

• port port_num The port number on a RADIUS server to which theauthentication requests. The default port number is 1645. You can any number between 1024 and 65535, inclusive.

• retries number The number of retries sent to the RADIUS server bThe range is 1 to 20 retries.

Page 75: netscreen_CLI

“active-user” through “common-criteria”

59

ct” on page 63.

ret) that is shared between the uses this secret to encrypt the

ce waits before sending another t does not elicit a response. The

tication.

ications with the SecurID server.

e, a value of 0 deactivates it and 1 ecial duress PIN number when al to the SecurID server, indicating SecurID auth server blocks

urID server admin.

traffic. A value of 0 specifies SDI, n type DES.

NetScreen CLI Reference Guide

Example: For an example of these options, see “Defining a RADIUS Server Obje

securid

set auth-server name_str securid{auth-port port_num |duress number |encr id_num |retries number |timeout number}

• secret shar_secret Specifies the RADIUS shared secret (shar_secNetScreen device and the RADIUS server. The NetScreen device user’s password that it sends to the RADIUS server.

• timeout number The interval (in seconds) that the NetScreen deviauthentication request to the RADIUS server if the previous requesdefault is three seconds.

securid Configures the NetScreen device to use a SecurID server for authen

• auth-port port_num Specifies the port number to use for communThe default SecurID port number is 5500.

• duress { 0 | 1 } If the SecurID server is licensed to use duress modactivates it. When duress mode is activated, a user can enter a splogging in. The NetScreen device allows the login, but sends a signthat someone is forcing the user to login against his or her will. Thefurther login attempts by that user until he or she contacts the Sec

• encr { 0 | 1 } Specifies the encryption algorithm for SecurID networkand 1 specifies DES. NetScreen recommends the default encryptio

Page 76: netscreen_CLI

“active-user” through “common-criteria”

60

n page 63.

or authentication.

NetScreen device waits between

SecurID) through the specified

authentication, L2TP, or XAuth ult timeout value is 10 minutes, ession before the countdown ate and the timeout countdown

of inactivity must elapse before efault is 10 minutes and the

NetScreen CLI Reference Guide

Example: For an example of this option, see “Defining a SecurID Server Object” o

server-name

set auth-server name_str server-name { ip_addr | name_str }

src-interface

set auth-server name_str src_interface interface

timeout

set auth-server name_str timeout numberunset auth-server name_str timeout

• retries number Specifies the number of retries between requests f

• timeout number Specifies the length of time (in seconds) that the authentication retry attempts.

server-name The IP address or DNS name of the authentication server.

src-interface Instructs the device to transmit authentication requests (RADIUS or interface.

timeout Specifies how many minutes must elapse after the termination of anuser’s last session before the user needs to reauthenticate. The defaand the maximum setting is 255 minutes. If the user initiates a new sreaches the timeout threshold, the user does not have to reauthenticresets.

If the user is an admin user, this setting specifies how many minutesthe NetScreen device times out and closes an admin session. The dmaximum is 1000 minutes.

Page 77: netscreen_CLI

“active-user” through “common-criteria”

61

n page 63.

on page 63.

mber

IUS. The unset command sets

a username from which to strip be present in the username during

curs. Stripping removes all us the character itself. The device

to perform the character stripping.

e actual number of separator available separator character.

NetScreen CLI Reference Guide

Example: For an example of this option, see “Defining a SecurID Server Object” o

type

set auth-server name_str type { ldap | radius | securid }

Example: For an example of this option, see “Defining a RADIUS Server Object”

username

set auth-server name_str username domain dom_nameset auth-server name_str username separator string number nuunset auth-server name_str username domainunset auth-server name_str username separator

type Specifies the type of authentication server—LDAP, SecurID or RADtype to radius.

username Specifies a domain name for a particular auth server, or a portion ofcharacters. If you specify a domain name for the auth server, it must authentication.The device uses a separator character to identify where stripping occharacters to the right of each instance of the specified character, plstarts with the right most separator character.The parameters for this feature are as follows:

• string is the character separator.

• number is the number of character separator instances with which

If the specified number of separator characters (number) exceeds thcharacters in the username, the command stops stripping at the lastNote: The device performs domain-name matching before stripping.

Page 78: netscreen_CLI

“active-user” through “common-criteria”

62

s of a separator character in a

r.com number 2

NetScreen CLI Reference Guide

Example: In the following example you strip characters to the right of two instanceusername.

• auth server name Acme_Server

• username bob@[email protected]

• separator is @

• number of instances 2

set auth-server Acme_Server username separator bob@hello@jnp

The resulting username is bob.

Page 79: netscreen_CLI

“active-user” through “common-criteria”

63

the RADIUS server.

NetScreen CLI Reference Guide

Defining a RADIUS Server Object

The following commands define an auth-server object for a RADIUS server:

set auth-server radius1 type radiusset auth-server radius1 account-type auth l2tp xauthset auth-server radius1 server-name 10.1.1.50set auth-server radius1 backup1 10.1.1.51set auth-server radius1 backup2 10.1.1.52set auth-server radius1 radius port 4500set auth-server radius1 radius timeout 4set auth-server radius1 radius secret A56htYY97klsave

If you are using vendor-specific attributes, you must load the netscreen.dct file on

Defining a SecurID Server Object

The following commands define an auth-server object for a RADIUS server:

set auth-server securid1 type securidset auth-server securid1 server-name 10.1.1.100set auth-server securid1 backup1 10.1.1.110set auth-server securid1 timeout 60set auth-server securid1 account-type adminset auth-server securid1 securid retries 3set auth-server securid1 securid timeout 10set auth-server securid1 securid auth-port 15000set auth-server securid1 securid encr 1set auth-server securid1 securid duress 0save

Page 80: netscreen_CLI

“active-user” through “common-criteria”

64

NetScreen CLI Reference Guide

Defining an LDAP Server Object

The following commands define an auth-server object for an LDAP server:

set auth-server ldap1 type ldapset auth-server ldap1 account-type authset auth-server ldap1 server-name 10.1.1.150set auth-server ldap1 backup1 10.1.1.151set auth-server ldap1 backup2 10.1.1.152set auth-server ldap1 timeout 40set auth-server ldap1 ldap port 15000set auth-server ldap1 ldap cn cnset auth-server ldap1 ldap dn c=us;o=netscreen;ou=marketingsave

The following command lists all auth-server settings:

get auth-server all

Page 81: netscreen_CLI

“active-user” through “common-criteria”

65

av view an internal antivirus (AV) on statistics.

gure the device for internal AV

on number |

ckling }

y.

NetScreen CLI Reference Guide

Description: On select NetScreen devices, use the av commands to configure andscanner (scan-mgr), to download or update AV pattern files, and to clear AV operati

The AV scanner resides inside the NetScreen device as part of ScreenOS. To confiscanning, use the scan-mgr option (described below).

Syntax

clear

clear av { scan-mgr scanned-bytes | statistics }

exec

exec av scan-mgr{pattern-download tftp-server ip_addr file filename versipattern-update}

get

get av { name_str | all | http | scan-mgr | statistics | tri

set

set av{ name_str

{

Note: To activate antivirus features, you must first obtain and load an AV license ke

Page 82: netscreen_CLI

“active-user” through “common-criteria”

66

mber ] } |

} |

| path string }

number ] |

NetScreen CLI Reference Guide

content { http [ timeout number ] | smtp [ timeout nuserver-name { ip_addr | dom_name } [ port port_num ]} |

all{fail-mode { scanner threshold number | traffic permitmax-connections number |resources number} |

http{keep-alive |skipmime |trickling { number1 number2 number3 | default }webmail

{enable |url-pattern-name name { args string | host string}

} |scan-mgr

{content { ftp | http | imap | pop3 | smtp } [ timeoutdecompress-layer number |max-content-size { drop | number } |max-msgs { drop | number } |pattern-update-url url_str interval number |queue size number}

}

Page 83: netscreen_CLI

“active-user” through “common-criteria”

67

] |

NetScreen CLI Reference Guide

unset

unset av{all [fail-mode traffic | resources ]|http |

{keep-alive |skipmime |trickling |webmail

{enable |url-pattern-name string [ args | host | path ]}

}scan-mgr

{content { ftp | http | imap | pop3 | smtp } [ timeoutdecompress-layer |max-content-size [ drop ] |max-msgs [ drop ] |pattern-update-url |queue-size}

}

Keywords and Variables

Variable Parameter

get av name_strset av name_str [ ... ]

Page 84: netscreen_CLI

“active-user” through “common-criteria”

68

allowed concurrently between

virus feature is not supported in

e NetScreen device does when it able to scan traffic.

f times the device can attempt to ld, the device changes state to

s feature is not supported in

after it enters fail-mode. The

d SMTP traffic, even if a policy

ltaneous TCP connections The external antivirus feature is

d per AV client. Possible settings

NetScreen CLI Reference Guide

unset av name_str [ ... ]

all

get av allset av all { ... }unset av all { ... }

Example: The following command sets the maximum number of TCP connectionsthe NetScreen device and the AV scanner.

set av all max-connections 10

name_str Identifies the object name of an AV scanner. Note: The external antiScreenOS 5.1.0.

all Enables and disables all defined AV scanners.

• fail-mode Sets the fail-mode parameters, which determine what thloses connectivity with an external AV scanner or is in any way un

- scanner threshold number Specifies the maximum number oconnect with an external AV scanner. After passing this threshofail-mode. The default value is 150. Note: The external antiviruScreenOS 5.1.0.

- traffic permit When enabled, directs the device to pass traffic default setting for this parameter is disabled.

Note: When traffic permit is disabled, the device blocks HTTP anexists that permits AV checking.

• max-connections number Defines the maximum number of simubetween the NetScreen device and an external AV scanner. Note:not supported in ScreenOS 5.1.0.

• resources number The maximum percent of AV resources allowerange from 1 to 100, inclusive. The default setting is 70%.

Page 85: netscreen_CLI

“active-user” through “common-criteria”

69

it cannot complete a scanning

etScreen device sent to the AV

r) or the specified external AV re is not supported in ScreenOS

downloads and uploads.

) traffic.

P3) traffic.

P) traffic.

on a per-protocol basis. By . The range is 1 to 1800 seconds.

NetScreen CLI Reference Guide

Example: The following command instructs the NetScreen device to drop traffic ifoperation:

unset av all fail-mode traffic

av statistics

clear av statistics

content

set av { scan-mgr | string } content{ ftp | http | imap | pop3 | smtp } [ timeout number ]

unset av { scan-mgr | string } content{ ftp | http | imap | pop3 | smtp } [ timeout ]

av statistics Clears the statistics concerning the total sessions per hour that the Nscanner, including the peak number sessions.

content Identifies the kind of traffic that the internal Scan Manager (scan-mgscanner (string) scans for viruses. Note: The external antivirus featu5.1.0.

• ftp Enables AV scanning of File Transfer Protocol (FTP) traffic.

• http Enables AV scanning of Hypertext Transfer Protocol (HTTP)

• imap Enables AV scanning of Internet Mail Access Protocol (IMAP

• pop3 Enables AV scanning of Post Office Protocol, version 3 (PO

• smtp Enables AV scanning of Simple Mail Transfer Protocol (SMT

- timeout number Changes the timeout value for an AV sessiondefault, an AV session times out after 180 seconds of inactivity

Page 86: netscreen_CLI

“active-user” through “common-criteria”

70

traffic scanner, and defines the

. } }

live” connection option. Using this dicate termination of data ction option, which automatically

ernet Mail Extensions (MIME) TTP entities:

NetScreen CLI Reference Guide

Example: The following command creates an AV object, classifies it as an HTTP timeout as 120 seconds:

set av scanner1 content http timeout 120

http

get av httpset av http keep-aliveset av http skipmimeset av http trickling number1 number2 number3set av http trickling defaultset av http webmail { enable | url-pattern-name url_str { ..unset av http { ... }

http Displays or sets HTTP configuration options for AV scanning.

• keep-alive Directs the NetScreen device to use the HTTP “keep-aoption prevents the device from sending a TCP FIN message to intransmission. (By default, the device uses the HTTP “close” connesends the TCP FIN message.)

• skipmime Disables the scanning of the following Multipurpose Intcontent types and—when present following a slash—subtypes of H

- application/x-director

- application/pdf

- image/

- video/

- audio/

- text/css

- text/html

By default, the skipmime option is enabled.

Page 87: netscreen_CLI

“active-user” through “common-criteria”

71

f content for every 2 megabytes

RL pattern named URL_Acme.

comketing

ally forwards specified amounts of events the client from timing out

to trigger the trickling action. The

o the AV scanner for scanning.

TP traffic that the NetScreen

er2, and number3) to their default

forms a full HTTP scan only if a disabled.

certain type of WebMail to llowing parameters, the AV ifies URL arguments, which begin e included in the URL. The path of webmail.

NetScreen CLI Reference Guide

Example: The following command configures HTTP trickling to trickle 800 bytes oscanned, and to initiate trickling when the HTTP file is 6 megabytes or larger:

set av http trickling 6 2 800

Example: The following commands enable WebMail scanning only and create a U

• URL host name “www.acme.com”

• path “/acme/marketing”

set av http webmail enableset av http webmail url-pattern-name URL_Acme host www.acme.set av http webmail url-pattern-name URL_Acme path /acme/mar

• trickling Configures the device for HTTP trickling, which automaticunscanned HTTP traffic to the requesting HTTP client. Trickling prwhile the AV scanner is busy examining downloaded HTTP files.

- number1 The minimum HTTP file size (in megabytes) needed default value is 3 megabytes.

- number2 The size (in megabytes) of each block of traffic sent tThe default value is 1 megabyte.

- number3 The length (in bytes) of each trickle of unscanned HTdevice forwards to the client. The default value is 500 bytes.

- default Resets the HTTP trickling parameters (number1, numbvalues.

• webmail Configures the NetScreen device for WebMail scanning.

- enable Enables WebMail scanning only. Note: The device perpolicy exists that enables HTTP and the webmail parameter is

- url-pattern-name url_str Specifies a URL pattern identifying a examine for virus patterns. When the URL matches all of the foscanner performs a virus scan. The args string parameter specwith “?”. The host name_str parameter specifies the host namstring parameter specifies the download URL path for the type

Page 88: netscreen_CLI

“active-user” through “common-criteria”

72

internal AV scanning.

otocols to examine for virus

during which the internal AV if the time interval expires before

ompressed files the internal AV ample, if a message contains a re are two compression layers, g of 2. Valid settings are between pressed files. The default is 2.

ytes) of content for a single If you enable the drop option for he maximum, the NetScreen e NetScreen device passes ,000 kilobytes, inclusive. The

messages that the internal AV and the number of messages essage content. The range for

NetScreen CLI Reference Guide

scan-mgrexec av scan-mgr { ... }get av scan-mgrset av scan-mgr { ... }unset av scan-mgr { ... }

scan-mgr Configures, displays, or performs actions on parameters that control

• content { ftp | http | imap | smtp | pop3 } Specifies the type of prpatterns.

• timeout number Specifies a time interval (expressed in seconds) scanner can complete an initiated virus scan. The scan terminatescompletion. The default setting is 180 seconds.

• decompress-layer number Specifies how many layers of nested cscanner can decompress before it executes the virus scan. For excompressed .zip file that contains another compressed .zip file, theand decompressing both files requires a decompress-layer settin1 and 4, so the AV scanner can decompress up to 4 layers of com

• max-content-size number Specifies the maximum size (in megabmessage that the internal AV scanner can scan for virus patterns. fail-mode and the total content of an incoming message exceeds tdevice drops the message content. If you unset the drop option, thunexamined traffic. The range for max-content-size is 4000 to 16default maximum content size is 10,000 kilobytes.

• max-msgs number Specifies the maximum number of concurrentscanner can scan for virus patterns. If you enable the drop optionexceeds the maximum, the internal AV scanner drops the latest mmax-msgs is between 1 and 16 messages, inclusive.

Page 89: netscreen_CLI

“active-user” through “common-criteria”

73

a host. This is used for manual

Screen device retrieves an

ed from a host.

ttern file. This is required to verify

r from which the NetScreen device should be in the format

) during which the NetScreen

ueues can support the internal scanner or to an it scanning. The size of each

ner. port port_num specifies the nication between the NetScreen rforms this operation on a e external antivirus feature is not

NetScreen CLI Reference Guide

server-name

set av name_str server-name name_str [ port port_num ]unset av name_str server-name name_str [ port ]

• pattern-download Retrieves an updated pattern file directly from updates only.

- The tftp-host parameter specifies the host from which the Netupdated pattern file.

- The file parameter specifies the name of the pattern file retriev

- The version parameter specifies the version number of the pathat the pattern file is valid.

• pattern-update-url url_str Specifies the URL address of the serveretrieves updates to its pattern file. The value of the URL address <http://<host>[:port]/server.ini].

The interval number setting specifies the time interval (in minutesdevice starts an automatic update process.

• queue-size Determines the number of messages that each of 16 qsimultaneously. After the NetScreen device sends 16 data units toexternal scanner, it stores subsequent data units in queues to awaqueue can range between 1 and 16. The default queue size is 16.

server-name Sets the IP address or DNS name for an external antivirus (AV) scanport number that Content Scanning Protocol (CSP) uses for commudevice and a Trend Micro InterScan VirusWall server. The device peper-AV-object basis. The default CSP port number is 3300. Note: Thsupported in ScreenOS 5.1.0.

Page 90: netscreen_CLI

“active-user” through “common-criteria”

74

BGP Commandseen virtual router.

assume that vrouter is the

outing instance resides. Once u no longer have to enter the

lay the default route in the current

gate addresses.g addresses into a single route gates can reduce the size of the

dition, aggregates can reduce the

NetScreen CLI Reference Guide

Description: Use the bgp context to configure the BGP routing protocol in a NetScr

Context Initiation

Initiating the bgp context requires two steps:

1. Enter the vrouter context by executing the set vrouter command:

set vrouter vrouter

where vrouter is the name of the virtual router. (For all examples that follow,trust-vr virtual router.)

2. Enter the bgp context by executing the set protocol bgp command.

ns(trust-vr)-> set protocol bgp as_num

where as_num is the number of the autonomous system in which the BGP ryou define an autonomous system number for the BGP routing instance, yonumber in the set protocol bgp command.

BGP Command List

The following commands are executable in the bgp context.

advertise-def-route Use the advertise-def-route commands to advertise or dispvirtual router to peers.Command options: set, unset

aggregate Use aggregate commands to create, display, or delete aggreAggregation is a technique for summarizing a range of routinentry, expressed as an IP address and a subnet mask. Aggrerouting table, while maintaining its level of connectivity. In adnumber of advertised addresses, thus reducing overhead.Command options: get, set, unset

Page 91: netscreen_CLI

“active-user” through “common-criteria”

75

ble the NetScreen device from he Multi-Exit Discriminator (MED). t suitable route to the neighbor

stem number configured for the ance in a virtual router, you must

splay a regular expression in an

m. The NetScreen device can the regular expressions

access lists.

outing information base learned

ity list, to remove a route from the

, to remove a confederation, or to

ub-ASs and grouping them. Using AS, thus simplifying full mesh

NetScreen CLI Reference Guide

always-compare-med Use the always-compare-med commands to enable or disacomparing paths from each autonomous system (AS) using tThe MED value is one of the criteria that determines the mosdevice.Command options: get, set, unset

as-number Use the as-number command to display the autonomous syBGP routing instance. When you create the BGP routing instspecify the autonomous system (AS) in which it resides.Command options: get

as-path-access-list Use as-path-access-list commands to create, remove, or diAS-Path access list.An AS-path access list serves as a packet filtering mechanisconsult such a list and permit or deny BGP packets based oncontained in the list. The system can have up to 99 AS-path Command options: get, set, unset

comm-rib-in Use the comm-rib-in command to display the BGP internal rfrom peers within a community.Command options: get

community-list Use community-list commands to enter a route in a communlist, or to display the list. Command options: get, set, unset

confederation Use the confederation commands to create a confederationdisplay confederation information.Confederation is a technique for dividing an AS into smaller sconfederations reduces the number of connections inside antopology.Command options: get, set, unset

config Use the config command to display the BGP configuration.Command options: get

Page 92: netscreen_CLI

“active-user” through “common-criteria”

76

ting protocol in a virtual router.

ap-damping setting.l the route becomes stable. Flap ability at an AS border router,

um amount of time (in seconds) the BGP neighbor.

in seconds) that elapses between that the TCP connection between

e BGP routing protocol. The ice to express preferences for one

Exit Discriminator (MED).

parameters for communicating

ork and subnet entries. The BGP t first requiring redistribution into

by external routers that use tion settings.

NetScreen CLI Reference Guide

enable Use the enable commands to enable or disable the BGP rouCommand options: set, unset

flap-damping Use the flap-damping commands to enable or disable the flEnabling this setting blocks the advertisement of a route untidamping allows the NetScreen device to prevent routing instadjacent to the region where instability occurs.Command options: get, set, unset

hold-time Use the hold-time commands to specify or display the maximthat can elapse between keepalive messages received from Command options: get, set, unset

keepalive Use the keepalive commands to specify the amount of time (keepalive packet transmissions. These transmissions ensurethe local BGP router and a neighbor router stays up.Command options: get, set, unset

local-pref Use this command to configure a LOCAL_PREF value for thLOCAL_PREF attribute is the metric most often used in practset of paths over another for IBGP.Command options: get, set, unset

med Use the med commands to specify or display the local Multi-Command options: get, set, unset

neighbor Use the neighbor commands to set or display configuration with BGP peers.Command options: clear, exec, get, set, unset

network Use the network commands to create, display, or delete netwvirtual router advertises these entries to peer devices, withouBGP (as with static routing table entries).Command options: get, set, unset

redistribute Use the redistribute commands to import routes advertised protocols other than BGP, or to display the current redistribuCommand options: set, unset

Page 93: netscreen_CLI

“active-user” through “common-criteria”

77

bution rules.

uter to serve as a route reflector.learned routes to specified IBGP in a full mesh to talk to every other to the entire autonomous system

r display the reject-default-route ore default route advertisements

seconds) after failing to establish e retries to initiate the session.

ation base learned from peers.

irtual router.

n with Interior Gateway Protocol

NetScreen CLI Reference Guide

redistribution Use the redistribution command to display the BGP redistriCommand options: get

reflector Use the reflector commands to allow the local BGP virtual roA route reflector is a router that passes Interior BGP (IBGP) neighbors (clients), thus eliminating the need for each router router. The clients use the route reflector to readvertise routes(AS).Command options: get, set, unset

reject-default-route Use the reject-default-route commands to enable, disable, osetting. Enabling this setting makes the NetScreen device ignfrom a BGP peer router.Command options: get, set, unset

retry-time Use the retry-time command to specify the amount of time (ina BGP session with a peer that the local BGP routing instancCommand options: set, unset

rib-in Use the rib-in command to display the internal routing informCommand options: get

router-id Use the router-id command to display the router ID for the vCommand options: get

synchronization Use the synchronization command to enable synchronizatio(IGP).Command options: set, unset

Page 94: netscreen_CLI

“active-user” through “common-criteria”

78

vertise-def-routefault route in the current virtual

context. (See “Context

NetScreen CLI Reference Guide

adDescription: Use the advertise-def-route commands to advertise or display the derouter to BGP peers.

Before you can execute a advertise-def-route command, you must initiate the bgpInitiation” on page 74.)

Syntax

set

set advertise-def-route

unset

unset advertise-def-route

Keywords and Variables

None.

Page 95: netscreen_CLI

“active-user” through “common-criteria”

79

aggregateresses.

route entry. Each aggregate is n can reduce the size of a

tion can reduce the number of

(See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use aggregate commands to create, display, or delete aggregate add

Aggregation is a technique for summarizing a range of routing addresses into a singlean address range expressed as an IP address and a subnet mask value. Aggregatiorouter’s routing table, while maintaining its level of connectivity. In addition, aggregaadvertised addresses, thus reducing overhead.

Before you can execute an aggregate command, you must initiate the bgp context.page 74.)

Syntax

get

get aggregate [ ip_addr/mask ]

set

set aggregate[ ip_addr/mask [ as-set ]

[ summary-only | suppress-map name_str ][ advertise-map name_str ] [ attribute-map name_str ]

]

unset

unset aggregate [ ip_addr/mask ]

Page 96: netscreen_CLI

“active-user” through “common-criteria”

80

d set of AS numbers, while

th path attribute of the aggregate

the AS-Set field is set in the uence field is set in the AS-Path ifferent AS-Paths.

d route map.

prefix range are not advertised.

NetScreen CLI Reference Guide

Keywords and Variables

advertise-map

set aggregate ip_addr/mask advertise-map name_str

as-set

set aggregate ip_addr/mask as-set [ ... ]

attribute-map

set aggregate ip_addr/mask attribute-map name_str

summary-only

set aggregate ip_addr/mask [ as-set ] summary-only

Example: The following command specifies that the aggregate uses an unorderesuppressing more specific routes.

set aggregate 3.3.3.3/24 as-set summary-only

advertise-map Selects the routes that match the specified route-map for the AS-Paroute entry.

as-set Specifies that the aggregate uses an unordered set of AS numbers (AS-Path path attribute) instead of an ordered sequence (the AS-Seqpath attribute). This option supports the aggregation of routes with d

attribute-map Changes the attributes of the aggregate route to those in the specifie

summary-only Specifies that more specific routes that fall into the aggregate route

Page 97: netscreen_CLI

“active-user” through “common-criteria”

81

NetScreen CLI Reference Guide

suppress-map

set aggregate ip_addr/mask suppress-map name_str

supress-map Suppresses the routes that match the specified route map.

Page 98: netscreen_CLI

“active-user” through “common-criteria”

82

s-compare-medtScreen device from comparing The MED is one of the criteria

gp context. (See “Context

NetScreen CLI Reference Guide

alwayDescription: Use the always-compare-med commands to enable or disable the Nepaths from each autonomous system (AS) using the Multi-Exit Discriminator (MED).that determines the most suitable route to the neighbor device.

Before you can execute an always-compare-med command, you must initiate the bInitiation” on page 74.)

Syntax

get

get always-compare-med

set

set always-compare-med

unset

unset always-compare-med

Keywords and Variables

None.

Page 99: netscreen_CLI

“active-user” through “common-criteria”

83

as-numberber configured for the BGP ust specify the autonomous

t. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the as-number command to display the autonomous system numrouting instance. When you create the BGP routing instance in a virtual router, you msystem (AS) in which it resides.

Before you can execute the as-number command, you must initiate the bgp contexpage 74.)

Syntax

get

get as-number

Keywords and Variables

None.

Page 100: netscreen_CLI

“active-user” through “common-criteria”

84

-path-access-listgular expression in an AS-Path

ce can consult such a list and

context. (See “Context

NetScreen CLI Reference Guide

asDescription: Use as-path-access-list commands to create, remove, or display a reaccess list.

An AS-path access list serves as a packet filtering mechanism. The NetScreen devipermit or deny BGP packets based on the regular expressions contained in the list.

Before you can execute an as-path-access-list command, you must initiate the bgpInitiation” on page 74.)

Syntax

get

get as-path-access-list

set

set as-path-access-list id_num { deny | permit } string

unset

unset as-path-access-list id_num { deny | permit } string

Page 101: netscreen_CLI

“active-user” through “common-criteria”

85

he following in the regular

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameters

set as-path-access-list id_num { deny | permit } stringunset as-path-access-list id_num { deny | permit } string

id_num The identification number of the access list (range 1 - 99 inclusive).

string The regular expression used for BGP packet filtering. You can use texpression:

• ‘^’ The start of a path

• ‘$’ The end of a path

• ‘{‘ The start of an AS_SET

• ‘}’ The end of an AS_SET

• ‘(‘ The start of an AS_CONFED_SET or AS_CONFED_SEQ

• ‘)’ The end of an AS_CONFED_SET or AS_CONFED_SEQ

• ‘.’ Matches any single character

• ‘.*’ Matches zero or more characters

• ‘.+’ Matches one or more characters

• ‘_’ Matches zero or one instance of a punctuation character

• ‘[]’ Specifies a set of characters

• ‘-’ Used within brackets to specify a range of AS numbers

• ‘^’ Used as the first item within brackets to exclude AS numbers

Page 102: netscreen_CLI

“active-user” through “common-criteria”

86

th access list with ID number

tring).

NetScreen CLI Reference Guide

deny | permit

set as-path-access-list id_num { deny | permit } stringunset as-path-access-list id_num { deny | permit } string

Example: The following command places the regular expression “23” in an AS-Pa10:

set as-path-access-list 10 permit 23

deny | permit Denies or permits BGP packets containing the regular expression (s

Page 103: netscreen_CLI

“active-user” through “common-criteria”

87

comm-rib-inormation base learned from

xt. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the comm-rib-in command to display the BGP internal routing infpeers within a community.

Before you can execute the comm-rib-in command, you must initiate the bgp contepage 74.)

Syntax

get

get comm-rib-in

Keywords and Variables

None.

Page 104: netscreen_CLI

“active-user” through “common-criteria”

88

community-list community attributes of routes

can use the community

ext. (See “Context Initiation” on

}

none

t }

none

NetScreen CLI Reference Guide

Description: Use community-list commands to create a community list that definesthat are permitted or denied.

A community consists of routes that are associated with the same identifier. Routersidentifier when they need to treat two or more advertised routes in the same way.

Before you can execute a community-list command, you must initiate the bgp contpage 74.)

Syntax

get

get community-list

set

set community-list id_num1 { default-permit | deny | permit [ number | as id_num2 id_num3 |

no-advertise | no-export | no-export-subconfed | ]

unset

unset community-list id_num1 { default-permit | deny | permi[ number | as id_num2 id_num3 |

no-advertise | no-export | no-export-subconfed | ]

Page 105: netscreen_CLI

“active-user” through “common-criteria”

89

numbert} number

s with the community value 200.

um3_num3

ermits the community 11 in AS

m2) and a community number between 0-65535 inclusive.

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameters

set community-list id_num1 { deny | permit | default-permit}unset community-list id_num1 { deny | permit | default-permi

Example: The following command defines the community list 20 that denies route

set community-list 20 deny 200

as

set community-list id_num1 { deny | permit } as id_num2 id_nunset community-list id_num1 { deny | permit } as id_num2 id

Example: The following command creates a community list with an ID of 10 that p10000:

set community-list 10 permit as 10000 11

deny | permit | default-permit

set community-list id_num1 { deny | permit } [ ... ]unset community-list id_num1 { deny | permit } [ ... ]

id_num1 The identifier of the community list (range 1 - 99 inclusive).

number The community number, which can be between 0-65535 inclusive.

as Defines a private community, in the form of an AS number (id_nudefined within the AS (id_num3). The community number can be

deny | permit Denies or permits routes with the specified community value.

Page 106: netscreen_CLI

“active-user” through “common-criteria”

90

s with the community value 200.

nfednfed

ified in the community list. By unity list are denied.

ith this community value in the

his community value to EBGP

with this community value to any

NetScreen CLI Reference Guide

Example: The following command defines the community list 20 that denies route

set community-list 20 deny 200

no-advertise

set community-list id_num1 { deny | permit } no-advertiseset community-list id_num1 { deny | permit } no-advertise

no-export

set community-list id_num1 { deny | permit } no-exportset community-list id_num1 { deny | permit } no-export

no-export-subconfed

set community-list id_num1 { deny | permit } no-export-subcoset community-list id_num1 { deny | permit } no-export-subco

default-permit Permits the route if it does not match any community value specdefault, routes that do not match community values in the comm

no-advertise Specifies that the NetScreen device does not advertise routes wcommunities attribute to any peer devices.

no-export Specifies that the NetScreen device does not advertise routes with tpeers, except sub-autonomous systems within the confederation.

no-export-subconfed Specifies that the NetScreen device does not advertise routes external peers.

Page 107: netscreen_CLI

“active-user” through “common-criteria”

91

.

NetScreen CLI Reference Guide

none

set community-list id_num1 { deny | permit } noneset community-list id_num1 { deny | permit } none

none Specifies that the NetScreen device remove community values

Page 108: netscreen_CLI

“active-user” through “common-criteria”

92

confederatione a confederation, or to display

hem. Using confederations eated by meshes.

xt. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the confederation commands to create a confederation, to removconfederation information.

Confederation is a technique for dividing an AS into smaller sub-ASs and grouping treduces the number of connections inside an AS, simplifying the routing matrices cr

Before you can execute a confederation command, you must initiate the bgp contepage 74.)

Syntax

get

get confederation

set

set confederation { id id_num1 | peer id_num2 | rfc3065 }

unset

unset confederation { id | peer id_num2 | rfc3065 }

Page 109: netscreen_CLI

“active-user” through “common-criteria”

93

compliance with RFC 1965.

NetScreen CLI Reference Guide

Keywords and Variables

id

set confederation id id_num1unset confederation id

Example: The following command creates a confederation with an ID of 10:

set confederation id 10

peer

set confederation peer id_num2unset confederation peer id_num2

Example: The following command adds AS 45040 to the confederation:

set confederation peer 45040

rfc3065

set confederation rfc3065unset confederation rfc3065

id The identification number (id_num1) of the confederation.

peer id_num2 The identifier of a new peer autonomous system (AS) entry.

rfc3065 Specifies configuration in compliance with RFC 3065. The default is

Page 110: netscreen_CLI

“active-user” through “common-criteria”

94

configP configuration in the current

e “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the config command to display the CLI commands used in the BGvirtual router.

Before you can execute the config command, you must initiate the bgp context. (Se74.)

Syntax

get

get config

Keywords and Variables

None.

Page 111: netscreen_CLI

“active-user” through “common-criteria”

95

enablecol in a virtual router.

e “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the enable commands to enable or disable the BGP routing proto

Before you can execute an enable command, you must initiate the bgp context. (Se74.)

Syntax

set

set enable

unset

unset enable

Keywords and Variables

None.

Page 112: netscreen_CLI

“active-user” through “common-criteria”

96

flap-dampinging setting.

ble. Flap damping allows the region where instability occurs.

xt. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the flap-damping commands to enable or disable the flap-damp

Enabling this setting blocks the advertisement of a route until the route becomes staNetScreen device to contain routing instability at an AS border router, adjacent to the

Before you can execute a flap-damping command, you must initiate the bgp contepage 74.)

Syntax

set

set flap-damping

unset

unset flap-damping

Keywords and Variables

None.

Page 113: netscreen_CLI

“active-user” through “common-criteria”

97

hold-timent of time (in seconds) that can e elapses before any message seconds.

ee “Context Initiation” on page

e.

NetScreen CLI Reference Guide

Description: Use the hold-time commands to specify or display the maximum amouelapse between keepalive messages received from the BGP neighbor. If the hold-timis received from a BGP neighbor, the session is considered down. The default is 180

Before you can execute a hold-time command, you must initiate the bgp context. (S74.)

Syntax

get

get hold-time

set

set hold-time number

unset

unset hold-time

Keywords and Variables

Variable Parameter

set hold-time number

Note: The default keepalive value is always one third of the current hold-time valu

number The maximum length of time (in seconds) between messages.

Page 114: netscreen_CLI

“active-user” through “common-criteria”

98

keepaliveds) that elapses between n between the local BGP router (for the default hold-time value

ee “Context Initiation” on page

ges.

NetScreen CLI Reference Guide

Description: Use the keepalive commands to specify the amount of time (in seconkeepalive packet transmissions. These transmissions ensure that the TCP connectioand a neighbor router stays up. The default value is one-third of the hold-time value of 180 seconds, the default keepalive value is 60 seconds).

Before you can execute a keepalive command, you must initiate the bgp context. (S74.)

Syntax

get

get keepalive

set

set keepalive number

unset

unset keepalive

Keywords and Variables

Variable Parameter

number The maximum length of time (in seconds) between keepalive messa

Page 115: netscreen_CLI

“active-user” through “common-criteria”

99

local-prefe for the BGP routing protocol.

’s preference for the route. The al peers (peers in the same AS) 100.

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the local-pref commands to configure the Local-Pref path attribut

The Local-Pref path attribute is a metric used to inform IBGP peers of the local routerhigher the value, the greater the preference. Routers advertise this attribute to internand to neighboring confederations, but never to external peers. The default value is

Before you can execute a local-pref command, you must initiate the bgp context. (S74.)

Syntax

get

get local-pref

set

set local-pref number

unset

unset local-pref

Keywords and Variables

Variable Parameter

set local-pref number

number The preference level for the virtual router.

Page 116: netscreen_CLI

“active-user” through “common-criteria”

100

mediminator (MED).

use when there are multiple stance sends the MED to all values received in update

the MED value to decide which s chosen. The default MED

ontext Initiation” on page 74.)

NetScreen CLI Reference Guide

Description: Use the med commands to specify or display the local Multi-Exit Discr

The MED is an attribute that notifies a neighbor in another AS of the optimal path to entry points to the AS. If an EBGP update contains a MED value, the BGP routing inIBGP peers within the AS. If you assign a MED value, this value overrides any MEDmessages from external peers.

Note that although you set the MED in the local AS, the neighbor in another AS usesentry point to use. If all other factors are equal, the path with the lowest MED value ivalue is 0.

Before you can execute a med command, you must initiate the bgp context. (See “C

Syntax

get

get med

set

set med id_num

unset

unset med

Page 117: netscreen_CLI

“active-user” through “common-criteria”

101

r:

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameter

set med id_num

Example: The following command specifies MED 100 for the virtual router trust-v

set med 100

id_num The identification number of the MED.

Page 118: netscreen_CLI

“active-user” through “common-criteria”

102

neighborarameters for communicating

ee “Context Initiation” on page

ts }

NetScreen CLI Reference Guide

Description: Use the neighbor commands to set or display general configuration pwith BGP peers.

Before you can execute a neighbor command, you must initiate the bgp context. (S74.)

Syntax

clear

clear neighbor ip_addr1{ flap-route ip_addr2 [ add ] | soft-in | soft-out | sta

exec

exec neighbor ip_addr{ connect | disconnect | tcp-connect }

get

get neighbor { ip_addr | peer-group name_str }

set

set neighbor { ip_addr[advertise-def-route |ebgp-multihop number |enable |force-reconnect |hold-time number |keepalive number |

Page 119: netscreen_CLI

“active-user” through “common-criteria”

103

NetScreen CLI Reference Guide

md5-authentication string |med number |nhself-enable |peer-group name_str |reflector-client |reject-default-route |remote-as number

[local-ip ip_addr/mask |outgoing-interface interface |src-interface interface] |

remove-private-asretry-time number |route-map name_str { in | out } |send-community |weight number] |

peer-group name_str[ebgp-multihop number |force-reconnect |hold-time number |keepalive number |md5-authentication string |nhself-enable |reflector-client |remote-as number |retry-time number |route-map name_str { in | out } |send-community |weight number]

}

Page 120: netscreen_CLI

“active-user” through “common-criteria”

104

NetScreen CLI Reference Guide

unset

unset neighbor {ip_addr

[advertise-def-route |ebgp-multihop |enable |force-reconnect |hold-time |keepalive |md5-authentication |med |nhself-enable |peer-group string |reflector-client |reject-default-route |remote-as number

[local-ip ip_addr/mask |outgoing-interface interface |src-interface interface] |

remove-private-as |retry-time |route-map name_str { in | out } |send-community |weight ]

peer-group name_str[ebgp-multihop |force-reconnect |hold-time |

Page 121: netscreen_CLI

“active-user” through “common-criteria”

105

t IP address 1.1.100.101:

P peer.

NetScreen CLI Reference Guide

keepalive |md5-authentication |nhself-enable |reflector-client |remote-as number |retry-time |route-map name_str { in | out } |send-community |weight]

}

Keywords and Variables

Variable Parameter

clear neighbor ip_addrget neighbor ip_addrset neighbor ip_addr { ... }unset neighbor ip_addr { ... }

Example: The following command displays information about a neighbor device a

get neighbor 1.1.100.101

advertise-def-route

set neighbor ip_addr advertise-def-routeunset neighbor ip_addr advertise-def-route

ip_addr The IP address of the neighboring peer device.

advertise-def-route Advertises the default route in the current virtual router to the BG

Page 122: netscreen_CLI

“active-user” through “common-criteria”

106

numberop

ing route nodes between the

mand for troubleshooting a BGP

mmand for troubleshooting a BGP

the local BGP router and the BGP multihop feature. packets transmitted to the

NetScreen CLI Reference Guide

connect

exec neighbor ip_addr connect

disconnect

exec neighbor ip_addr disconnect

ebgp-multihop

set neighbor { ip_addr | peer-group name_str } ebgp-multihopunset neighbor { ip_addr | peer-group name_str } ebgp-multih

Example: The following command directs the virtual router to allow three intervenvirtual router and a neighbor device at IP address 1.1.100.101:

set neighbor 1.1.100.101 ebgp-multihop 3

connect Establishes a BGP connection to the neighbor. You can use this comconnection.

disconnect Terminates the BGP connection to the neighbor. You can use this coconnection.

ebgp-multihop The number of intervening routing nodes (number) allowed between neighbor (ip_addr). A setting of zero (the default value) disables the The local BGP router uses the ebgp-multihop value as TTL in all IPneighbor.

Page 123: netscreen_CLI

“active-user” through “common-criteria”

107

ctnect

ber

ew connection. You can use this ough that the BGP peer still tempts.

aker waits to receive a message

NetScreen CLI Reference Guide

enable

set neighbor ip_addr enableunset neighbor ip_addr enable

force-reconnect

set neighbor { ip_addr | peer-group name_str } force-reconneunset neighbor { ip_addr | peer-group name_str } force-recon

hold-time

set neighbor { ip_addr | peer-group name_str } hold-time numunset neighbor { ip_addr | peer-group name_str } hold-time

Example: The following command specifies a hold-time value of 60:

set neighbor 1.1.10.10 hold-time 60

enable Enables or disables peer communications.

force-reconnect Causes the peer to drop the existing BGP connection and accept a noption when NSRP failover occurs but the failover interval is long enconsiders the connection to be active and rejects new connection at

hold-time Specifies the number of seconds (number) that the current BGP spefrom its neighbor. The default is 180 seconds.

Page 124: netscreen_CLI

“active-user” through “common-criteria”

108

ber

ation stringication string

k094):

099 for a neighbor with IP

pse between keepalive packet connection to the neighbor. The

e value of 180 seconds, the

length is 32 characters.

r (MED). The default value is 0.

NetScreen CLI Reference Guide

keepalive

set neighbor { ip_addr | peer-group name_str } keepalive numunset neighbor { ip_addr | peer-group name_str } keepalive

Example: The following command specifies a keepalive value of 90 seconds:

ns(trust-vr/bgp)-> set neighbor 1.1.100.101 keepalive 90

md5-authentication

set neighbor { ip_addr | peer-group name_str } md5-authenticunset neighbor { ip_addr | peer-group name_str } md5-authent

Example: The following command specifies an MD5 authentication string (5784ld

set neighbor 1.1.100.101 md5-authentication 5784ldk094

med

set neighbor ip_addr med id_numunset neighbor ip_addr med

Example: The following command specifies the Multi-Exit Discriminator (MED) 20address 1.1.10.10:

set neighbor 1.1.10.10 med 20099

keepalive Specifies the maximum amount of time (in seconds) that can elatransmissions before the local BGP virtual router terminates the default is one-third of the hold-time value (for the default hold-timdefault keepalive value is 60 seconds).

md5-authentication Specifies the BGP peer MD5 authentication string. The maximum

med Specifies the ID number (id_num) of the local Multi-Exit Discriminato

Page 125: netscreen_CLI

“active-user” through “common-criteria”

109

le

e for the peer 1.1.10.10:

entlient

is set to the interface IP address

er group shares the same update ers instead of creating a separate p and configure peer-group

luster. The local BGP routing

NetScreen CLI Reference Guide

nhself-enable

set neighbor { ip_addr | peer-group name_str } nhself-enableunset neighbor { ip_addr | peer-group name_str } nhself-enab

Example: The following command makes the local virtual router the next hop valu

set neighbor 1.1.10.10 nhself-enable

peer-group

get neighbor peer-group name_strset neighbor ip_addr peer-group name_str [ ... ]set neighbor peer-group name_str [ ... ]unset neighbor ip_addr peer-group name_str [ ... ]unset neighbor peer-group name_str [ ... ]

reflector-client

set neighbor { ip_addr | peer-group name_str } reflector-cliunset neighbor { ip_addr | peer-group name_str } reflector-c

nhself-enable Specifies that the Next-Hop path attribute for routes sent to this peerof the local virtual router.

peer-group The name of a group of BGP neighbors. Each BGP neighbor in a pepolicies. This allows you to set up policies that apply to all the BGP pepolicy for each peer. Use this command to both create the peer-grouparameters.

reflector-client Specifies that the neighbor is a reflector client in the route reflector cinstance is the route reflector.

Page 126: netscreen_CLI

“active-user” through “common-criteria”

110

Acme_Peers are reflector

terface interface )

1.1.10.10:

route advertisements from the the local routing table.

GP speaker.eer.h BGP binds.P binds.

NetScreen CLI Reference Guide

Example: The following command specifies that the neighbors in the peer group clients:

set neighbor peer-group Acme_Peers reflector-client

reject-default-route

set neighbor ip_addr reject-default-routeunset neighbor ip_addr reject-default-route

remote-as

set neighbor { ip_addr | peer-group name_str }remote-as number [ local-ip ip_addr ]

set neighbor { ip_addr | peer-group name_str }remote-as number ( outgoing-interface interface | src-in

unset neighbor { ip_addr | peer-group name_str }remote-as number [ local-ip ip_addr ]

Example: The following command identifies AS 30 as the remote AS for the peer

set neighbor 1.1.10.10 remote-as 30

reject-default-route Specifies that the local BGP routing instance is to ignore defaultpeer. By default, default routes advertised by peers are added to

remote-as Identifies the remote AS (number) to be the neighbor of the current Blocal-ip ip_addr specifies the local IP address for EBGP multi-hop poutgoing-interface interface specifies the outgoing interface to whicsrc-interface interface specifies the source interface to which the BG

Page 127: netscreen_CLI

“active-user” through “common-criteria”

111

mbernumber

e_str { in | out }ame_str { in | out }

to incoming routes from the

y

to establish a session with the default is 120 seconds.

itches determine if the route map

NetScreen CLI Reference Guide

remove-private-as

set neighbor ip_addr remove-private-asunset neighbor ip_addr remove-private-as

retry-time

set neighbor { ip_addr | peer-group name_str } retry-time nuunset neighbor { ip_addr | peer-group name_str } retry-time

route-map

set neighbor { ip_addr | peer-group name_str } route-map namunset neighbor { ip_addr | peer-group name_str } route-map n

Example: The following command specifies that the route map Mkt_Map applies neighbor at IP address 1.1.10.10:

set neighbor 1.1.10.10 route-map Mkt_Map in

send-community

set neighbor { ip_addr | peer-group name_str } send-communit

remove-private-as

Removes the private AS number from the AS-Path for this neighbor.

retry-time Specifies the time (in seconds) that the BGP routing instance retriespeer after an unsuccessful BGP session establishment attempt. The

route-map Specifies the route map to use for the BGP neighbor. The in | out swapplies to incoming or outgoing routes.

Page 128: netscreen_CLI

“active-user” through “common-criteria”

112

ity

to the neighbor. By default, the

st to the neighbor.

the neighbor.

ics.

nd for troubleshooting a TCP

NetScreen CLI Reference Guide

unset neighbor { ip_addr | peer-group name_str } send-commun

soft-in

clear neighbor ip_addr soft-in

soft-out

clear neighbor ip_addr soft-out

stats

clear neighbor ip_addr stats

tcp-connect

exec neighbor ip_addr tcp-connect

send-community Directs the BGP routing protocol to transmit the community attributecommunity attribute is not sent to neighbors.

soft-in Specifies that the NetScreen device send a route-refresh reque

soft-out Specifies that the NetScreen device send a full routing table to

stats Specifies that the NetScreen device clear the neighbor’s statist

tcp-connect Tests the TCP connection to the neighbor. You can use this commaconnection.

Page 129: netscreen_CLI

“active-user” through “common-criteria”

113

hbor at IP address 1.1.10.10:

value, the more preference given

NetScreen CLI Reference Guide

weight

set neighbor { ip_addr | peer-group name_str } weight numberunset neighbor { ip_addr | peer-group name_str } weight

Example: The following command assigns a weight of 200 to the path to the neig

set neighbor 1.1.10.10 weight 200

weight The preference for routes learned from this neighbor. The higher theto the routes learned from this neighbor. The default value is 100.

Page 130: netscreen_CLI

“active-user” through “common-criteria”

114

networkk and subnet entries that are out first requiring redistribution

e “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the network commands to create, display, or delete static networreachable from the virtual router. BGP advertises these entries to peer devices, withinto BGP (as with static routing table entries).

Before you can execute a network command, you must initiate the bgp context. (Se74.)

Syntax

get

get network

set

set network ip_addr1/mask1[ weight number | route-map name_str ]

[ check ip_addr2/mask2 | no-check ]

unset

unset network ip_addr1/mask1[ weight | route-map name_str ]

[ check ip_addr2/mask2 | no-check ]

Page 131: netscreen_CLI

“active-user” through “common-criteria”

115

rtual router trust-vr:

t have to be the same as the network to be advertised by BGP. ess range.

efore advertising ip_addr1/mask1 dr1/mask1 to its peers. If

_addr1/mask1 from its peers.

ap.

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameters

set network ip_addr1/mask1 [ ... ]unset network ip_addr1/mask1

Example: The following command creates a network entry (10.1.0.0/16) for the vi

set network 10.1.0.0/16

check

set network ip_addr1/mask1 check ip_addr2/mask2

no-check

set network ip_addr1/mask1 no-check

route-map

set network ip_addr1/mask1 route-map name_str

ip_addr1/mask1 The IP address and subnet mask of the network. The mask does nosubnet mask used in the network. For example, 10.0.0.0/8 is a valid When the check option is used, ip_addr1/mask1 can be a MIP addr

check Directs the device to check ip_addr2/mask2 for network reachability bto BGP peers. If ip_addr2/mask2 is reachable, BGP advertises ip_adip_addr2/mask2 becomes unreachable, BGP withdraws the route ip

no-check Directs the device not to check for network reachability.

route-map Sets the attributes of this route entry to those in the specified route m

Page 132: netscreen_CLI

“active-user” through “common-criteria”

116

e between 0 and 65535.

NetScreen CLI Reference Guide

weight

set network ip_addr1/mask1 weight number

weight Sets the weight of this route entry to the specified value. Enter a valu

Page 133: netscreen_CLI

“active-user” through “common-criteria”

117

redistributeal routers that use protocols on settings.

. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the redistribute commands to import routes advertised by externother than BGP. Use the get redistribution command to display current redistributi

Before you can execute a redistribute command, you must initiate the bgp contextpage 74.)

Syntax

get

get redistribution

set

set redistribute route-map name_str protocol{ connected | imported | ospf | rip | static }

unset

unset redistribute route-map name_str protocol{ connected | imported | ospf | rip | static }

Page 134: netscreen_CLI

“active-user” through “common-criteria”

118

can be one of the following:

NetScreen CLI Reference Guide

Keywords and Variables

protocol

set redistribute route-map name_str protocol [ ... ]unset redistribute route-map name_str protocol [ ... ]

route-map

set redistribute route-map name_str protocol [ ... ]unset redistribute route-map name_str protocol [ ... ]

protocol The protocol from which the redistributed routes were learned. This connected, imported, ospf, rip, static.

route-map The name (name_str) of the route map to be used to filter routes.

Page 135: netscreen_CLI

“active-user” through “common-criteria”

119

redistribution

ext. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the redistribution command to display BGP redistribution rules.

Before you can execute the redistribution command, you must initiate the bgp contpage 74.)

Syntax

get

get redistribution

Keywords and Variables

None.

Page 136: netscreen_CLI

“active-user” through “common-criteria”

120

reflectors a route reflector to clients in a

ied IBGP neighbors (clients), cluster consists of multiple ts. Routers outside of the idual router in full mesh. This flector, while the route reflector

mands.

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the reflector commands to allow the local virtual router to serve acluster.

A route reflector is a router that passes Interior BGP (IBGP) learned routes to specifthus eliminating the need for each router in a full mesh to talk to every other router. Arouters, with a single router designated as the route reflector, and the others as cliencluster treat the entire cluster as a single entity, instead of interfacing with each indivarrangement greatly reduces overhead. The clients exchange routes with the route rereflects routes between clients.

To configure clients in the cluster, use the reflector-client option of the neighbor com

Before you can execute a reflector command, you must initiate the bgp context. (S74.)

Syntax

get

get reflector

set

set reflector [ cluster-id id_num ]

unset

unset reflector [ cluster-id id_num ]

Page 137: netscreen_CLI

“active-user” through “common-criteria”

121

s a route reflector, and sets the

P routing instance to append the you can set the cluster ID.

NetScreen CLI Reference Guide

Keywords and Variables

cluster-id

set reflector cluster-id id_numunset reflector cluster-id id_num

Example: The following command allows the local BGP routing instance to serve acluster ID to 20:

set reflectorset reflector cluster-id 20

cluster-id The ID number (id_num) of the cluster. The cluster ID allows the BGcluster ID to the cluster list of a route. BGP must be disabled before

Page 138: netscreen_CLI

“active-user” through “common-criteria”

122

ct-default-route the reject-default-route tisements from a BGP peer

p context. (See “Context

NetScreen CLI Reference Guide

rejeDescription: Use the reject-default-route commands to enable, disable, or displaysetting. Enabling this setting makes the NetScreen device ignore default route adverrouter. By default, BGP accepts default routes advertised by BGP peers.

Before you can execute an reject-default-route command, you must initiate the bgInitiation” on page 74.)

Syntax

get

get reject-default-route

set

set reject-default-route

unset

unset reject-default-route

Keywords and Variables

None.

Page 139: netscreen_CLI

“active-user” through “common-criteria”

123

retry-times) after failing to establish a ssion. The default is 120

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the retry-time command to specify the amount of time (in secondBGP session with a peer that the local BGP routing instance retries to initiate the seseconds.

Before you can execute a retry-time command, you must initiate the bgp context. (S74.)

Syntax

set

set retry-time number

unset

unset retry-time

Keywords and Variables

None.

Page 140: netscreen_CLI

“active-user” through “common-criteria”

124

rib-inn base (RIB) learned from

“Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the rib-in command to display the BGP internal routing informatiopeers.

Before you can execute the rib-in command, you must initiate the bgp context. (See74.)

Syntax

get

get rib-in [ ip_addr/mask ]

Keywords and Variables

Variable Parameter

ip_addr/mask The network prefix for which you want to see RIB information.

Page 141: netscreen_CLI

“active-user” through “common-criteria”

125

router-ider.

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the router-id command to display the router ID for the virtual rout

Before you can execute the router-id command, you must initiate the bgp context. (S74.)

Syntax

get

get router-id

Keywords and Variables

None.

Page 142: netscreen_CLI

“active-user” through “common-criteria”

126

synchronization Interior Gateway Protocol

ia an IGP, traffic forwarded ynchronization prevents this

so learned the route through an

text. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the synchronization command to enable synchronization with an(IGP), such as OSPF.

If an EBGP router advertises a route before other routers in the AS learn the route vwithin the AS could be dropped if it reaches a router that has not learned the route. Sfrom occurring by ensuring that a BGP router does not advertise a route until it has alIGP.

Before you can execute a synchronization command, you must initiate the bgp conpage 74.)

Syntax

set

set synchronization

unset

unset synchronization

Keywords and Variables

None.

Page 143: netscreen_CLI

“active-user” through “common-criteria”

127

chassisr to set the normal and severe

ture } |

ture } |

NetScreen CLI Reference Guide

Description: Use the set chassis command to activate the audible alarm feature, otemperature thresholds for triggering temperature alarms.

Syntax

get

get chassis

set

set chassis{audible-alarm

{ all | battery | fan-failed | power-failed | temperatemperature-threshold

{ alarm | severe }{ celsius number | fahrenheit number }

unset

unset chassis{audible-alarm

{ all | battery | fan-failed | power-failed | temperatemperature-threshold

{ alarm | severe }{ celsius number | fahrenheit number }

Page 144: netscreen_CLI

“active-user” through “common-criteria”

128

e fans in the fan assembly fails:

vents.

, a interface module failure, a ined threshold.

failure.

n failure.

an interface module failure.

power supply failure.

re rises above an admin-defined

egular alarm or a severe alarm. A ates a greater number of event log

NetScreen CLI Reference Guide

Arguments

Example: To enable the audible alarm to sound in the event that one or more of th

set chassis audible-alarm fan-failed

audible-alarm Enables or disables the audible alarm to announce hardware failure e

• all Enables or disables the audible alarm in the event of a fan failurepower supply failure, or a temperature increase above an admin-def

• battery Enables or disables the audible alarm in the event of battery

• fan-failed Enables or disables the audible alarm in the event of a fa

• module-failed Enables or disables the audible alarm in the event of

• power-failed Enables or disables the audible alarm in the event of a

• temperature Enables or disables the audible alarm if the temperatuthreshold.

temperature-threshold

Defines the temperature (celsius or fahrenheit) required to trigger a rsevere alarm sounds a greater frequency of audible alarms and generentries.

Page 145: netscreen_CLI

“active-user” through “common-criteria”

129

clockvice.

}

:

ylight saving time.

e. Specify the date and time using ).

NetScreen CLI Reference Guide

Description: Use the clock commands to set the system time on the NetScreen de

Syntax

get

get clock

set

set clock { date [ time ] | dst-off | ntp | timezone number

unset

unset clock { dst-off | ntp | timezone }

Keywords and Variables

Variable Parameter

set clock date time

Example: The following command sets the clock to December 15, 2002, 11:00am

set clock 12/15/2002 11:00

Note: By default, the NetScreen device automatically adjusts its system clock for da

date time Configures the correct current date and time on the NetScreen devicthe following formats: (mm/dd/yyyy hh:mm or mm/dd/yyyy hh:mm:ss

Page 146: netscreen_CLI

“active-user” through “common-criteria”

130

hronizes computer clocks in the

ence between GMT standard time the clock is already set forward tes accurately. Set the number

NetScreen CLI Reference Guide

dst-off

set clock dst-offunset clock dst-off

ntp

set clock ntpunset clock ntp

timezone

set clock timezone numberunset clock timezone number

dst-off Turns off the automatic time adjustment for daylight saving time.

ntp Configures the device for Network Time Protocol (NTP), which syncInternet.

timezone Sets the current time zone value. This value indicates the time differand the current local time (when DST is OFF). When DST is ON andone hour, decrease the time difference by one hour and set the minubetween -12 and 12.

Page 147: netscreen_CLI

“active-user” through “common-criteria”

131

common-criteria. Only the root admin can set

etScreen device displays an

NetScreen CLI Reference Guide

Description: Use the common-criteria command to disable all internal commandsthis command. If someone other than the root admin tries to set this command, the Nerror message.

Syntax

set

set common-criteria no-internal-commands

unset

unset common-criteria no-internal-commands

Keywords and Variables

no-internal-commands

set common-criteria no-internal-commandsunset common-criteria no-internal-commands

no internal commands Disables all internal commands.

Page 148: netscreen_CLI

“active-user” through “common-criteria”

132

NetScreen CLI Reference Guide
Page 149: netscreen_CLI

2

133

ce (CLI) commands config

you may find that certain reen platform. A good example

etScreen-5XP device. Similarly, ion of the vpn command. This

NetScreen CLI Reference Guide

2

“config” through “interface”

This section lists and describes Juniper Networks NetScreen Command Line Interfathrough interface .

Note: As you execute CLI commands using the syntax descriptions in this section,commands and command features are unavailable on your Juniper Networks NetScis the vsys command, which is available on a NetScreen-500 device, but not on a Nsome command options are unavailable on certain platforms, as with the df-bit optoption is available on a NetScreen-500, but not on a NetScreen-5XP.

Page 150: netscreen_CLI

“config” through “interface”

134

configtScreen device or interface.

ns (stored in flash memory).

le | disable ] }

NetScreen CLI Reference Guide

Description: Use the config command to display the configuration settings for a Ne

You can display recent configuration settings (stored in RAM), or saved configuratio

Syntax

exec

exec config { lock { abort | end | start } | rollback [ enab

get

get config[all |datafile |hash |lock |nsmgmt-dirty |rollback |saved |timestamp]

set

set config lock timeout number

unset

unset config lock timeout

Page 151: netscreen_CLI

“config” through “interface”

135

een device and contains current yntax schema. ScreenOS

e Security Manager management

NetScreen CLI Reference Guide

Keywords and Variables

all

get config all

datafile

get config datafile

hash

get config hash

all Displays all configuration information.

datafile Displays the Security Manager datafile, which resides on the NetScrdevice configurations formatted according to the Security Manager sgenerates the datafile from the current device configuration when thsystem queries the device.

hash Displays the MD5 hash of the currently running configuration.

Page 152: netscreen_CLI

“config” through “interface”

136

for a specified time interval.

ou can also abort the lockout and reviously locked in memory.

h is five minutes.

a ScreenOS setting or parameter

such as a WebUI session or a message contains a flag named

that a local change occurred. The ny further locally-executed

response, it issues the clear ty” flag.

NetScreen CLI Reference Guide

lock

exec config lock startexec config lock endexec config lock abortset config lock timeout numberunset config lock timeout

nsmgmt-dirty

clear config nsmgmt-dirtyget config nsmgmt-dirty

lock Instructs the NetScreen device to lock a configuration file in memory

• exec config lock Locks/unlocks the configuration file in memory. Yimmediately restart the device with the configuration file that was p

• set config lock timeout Changes the default lockout period, whic

nsmgmt-dirty Clears the “dirty” flag, which indicates that an adminstrator changedlocally, instead of through NSM (NetScreen Security Manager).ScreenOS pushes a message to NSM whenever a non-NSM entity, CLI-capable console session, modifies the device configuration. ThisNSP_DEVICE_DIRECTIVE_NSMGMT_DIRTY, which informs NSMdevice sends the message only once, so it does not send notice of achanges until NSM (or a local administrator) clears the flag.After NSM receives the message and finishes all necessary tasks inconfig nsmgmt-dirty command to the device, thus clearing the “dir

Page 153: netscreen_CLI

“config” through “interface”

137

ration—providing that a LKG

to the LKG configuration in case

ature on the NetScreen device. If a configuration rollback manually

and also indicates if the

mmand displays:

isplays “= yes” at the end of the

d of “yes”.

NetScreen CLI Reference Guide

rollback

exec config rollbackexec config rollback enableexec config rollback disableget config rollback

saved

get config saved

rollback • exec config rollback

Reverts the NetScreen device to the LKG (last-known-good) configuconfiguration is available.

• exec config rollback

- enable Enables the NetScreen device to automatically rollbackof a problem when loading a new configuration.

- disable Disables the automation of the configuration rollback feyou disable the automation of this feature, you can still performusing the exec config rollback command.

• get config rollback

Indicates if a LKG configuration is available for configuration rollbackautomatic config rollback feature is enabled.If there is a LKG configuration saved in memory, the output of the co“$lkg$.cfg” (the name of the LKG file). The config rollback feature is enabled if the output of the command dstring. For example:""$lkg$.cfg"" = yes”

If the feature is not enabled, the output displays a blank space instea

Page 154: netscreen_CLI

“config” through “interface”

138

nning configuration.

NetScreen CLI Reference Guide

timestamp

get config timestamp

timestamp Displays the time of the latest local change made on the currently-ru

Page 155: netscreen_CLI

“config” through “interface”

139

consolers.

dow

ctivity

isable command through a

NetScreen CLI Reference Guide

Description: Use the console commands to define or list the CLI console paramete

The console parameters determine the following:

• Whether the NetScreen device displays messages in the active console win

• The number of lines that may appear on a console window page

• The maximum time that can pass before automatic logout occurs due to ina

If console access is currently disabled, you can enable it using the unset console dTelnet connection.

Syntax

get

get console

set

set console{aux disable |disable |page number |timeout number}

unset

unset console { aux disable | disable | page | timeout }

Page 156: netscreen_CLI

“config” through “interface”

140

ms have this auxiliary port, in modem console port to execute the port, when you need to

are required to disable access to iguration and closes the current non-serial console sessions can

tween page breaks. When you set a continual stream.

NetScreen CLI Reference Guide

Keywords and Variables

aux disable

set console aux disableunset console aux disable

disable

set console disableunset console disable

page

set console page numberunset console page

Example: To define 20 lines per page displayed on the console:

set console page 20

aux disable Enables or disables the auxiliary modem console port. Some platforaddition to the standard console port. An admin can use the auxiliaryCLI configuration commands. Use the aux disable switch to disableenforce strict security by excluding admin access through this port.

disable Disables console access through the serial port. Two confirmations the console. Executing this option saves the current NetScreen conflogin session. Note: After you execute the console disable option, still function (as with SSH and Telnet).

page An integer value specifying how many lines appear on each page bethis value to zero, there are no page breaks, and the text appears in

Page 157: netscreen_CLI

“config” through “interface”

141

active adminstrator session. If you

NetScreen CLI Reference Guide

timeout

set console timeout numberunset console timeout

Example: To define the console timeout value to 40 minutes:

set console timeout 40

Defaults

Access to the serial console is enabled.

The console displays 22 lines per page.

The default inactivity timeout is 10 minutes.

The NetScreen device sends console messages to the buffer by default.

timeout Determines how many minutes the device waits before closing an inset the value to zero, the console never times out.

Page 158: netscreen_CLI

“config” through “interface”

142

counter traffic counters.

flow. NetScreen devices

particular interface

ies

umber of packets containing

vel

NetScreen CLI Reference Guide

Description: Use the counter commands to clear or display the values contained in

Traffic counters provide processing information, which you can use to monitor trafficmaintain the following categories of counters:

• Screen counters, for monitoring firewall behavior for the entire zone or for a

• Policy counters, for reporting the amount of traffic affected by specified polic

• Hardware counters, for monitoring hardware performance and tracking the nerrors

• Flow counters, for monitoring the number of packets inspected at the flow le

Syntax

clear

clear [ cluster ] counter{all |ha |screen [ interface interface | zone zone ]}

get

get counter{flow | statistics

[ interface interface | zone zone ] |screen { interface interface | zone zone }policy pol_num { day | hour | minute | month | second }}

Page 159: netscreen_CLI

“config” through “interface”

143

devices in the cluster:

ter.

el inspection examines various

(HA) link between two NetScreen ts and packet errors.

at the interface level. The kets according to established Names” on page A-I.

NetScreen CLI Reference Guide

Keywords and Variables

cluster

clear [ cluster ] counter [ ... ]

Example: To clear the contents of all counters and propagate the operation to all

clear cluster counter all

flow

get counter flow [ ... ]

ha

clear [ cluster ] counter ha

interface

clear [ cluster ] counter screen interface interface

cluster Propagates the clear operation to all other devices in a NSRP clus

flow Specifies counters for packets inspected at the flow level. A flow-levaspects of a packet to gauge its nature and intent.

ha Specifies counters for packets transmitted across a high-availability devices. An HA-level inspection keeps count of the number of packe

interface The name of the interface. Specifies counters for packets inspected inspection checks for packet errors and monitors the quantity of pacthreshold settings. For more information on interfaces, see “Interface

Page 160: netscreen_CLI

“config” through “interface”

144

econd }

e zone ]

e amount of traffic that the policy

r monitoring traffic permitted by a

ifies the name of a particular on page A-I.

he zone level. The inspection ing to established threshold on page A-I.

NetScreen CLI Reference Guide

policy

get counter policy pol_num { day | hour | minute | month | s

screen

clear [ cluster ] counter screen [ interface interface | zonget counter screen { interface interface | zone zone }

statistics

get counter statistics [ ... ]

zone

get counter screen zone zone

policy Identifies a particular policy (pol_num). This allows you to monitor thpermits.

day | hour | minute | month | second Specifies the period of time foparticular policy.

screen Clears the screen counters. The interface interface parameter specinterface. For more information on interfaces, see “Interface Names”

statistics Displays the counter statistics.

zone Identifies the zone, and specifies counters for packets inspected at tchecks for packet errors and monitors the quantity of packets accordsettings. For more information on interfaces, see “Interface Names”

Page 161: netscreen_CLI

“config” through “interface”

145

delete

NetScreen CLI Reference Guide

Description: Use delete to delete persistent information in flash memory.

Syntax

delete

delete [ cluster ]{crypto { auth-key | file } |file dev_name:filename |node_secret ipaddr ip_addr |nsmgmt keys |pki object-id { system | id_num } |ssh device all}

Keywords and Variables

crypto

delete [ cluster ] crypto auth-keydelete [ cluster ] crypto file

crypto Removes encrypted items from flash memory.

• auth-key Removes image signature verification key.

• file Remove all crypto hidden files.

Page 162: netscreen_CLI

“config” through “interface”

146

emory on the memory board:

rd memory. Flash is the only e that was saved on the flash

key shared between the SecurID . The server and the clients use e secret to the NetScreen device

wise, there can be no You can detect communication t the node secret is invalid. If you

tScreen device) to say that the

uthorizes the ACE Server to send

th the outgoing IP address of the

NetScreen CLI Reference Guide

file

delete file dev_name:filename

Examples: The following command deletes a file named myconfig in the flash m

delete file flash:myconfig

node_secret ipaddr

delete node_secret ipaddr ip_addr

dev_name:filename The file residing on the module named dev_name from the flash cadev_name available. The filename is the file that you want to deletcard.

node_secret ipaddr

Deletes the SecurID stored node secret. The node secret is a 16-byteAce server and its clients (which may include the NetScreen device)this key to encrypt exchanged traffic. The Ace Server sends the nodduring initial authentication.The node secret must remain consistent with the ACE Server. Othercommunication between the NetScreen device and the ACE Server.problems by checking the ACE Server log for a message saying thafind such a message, the solution is as follows.

• Execute delete node_secret.

• On the ACE Server, change the configuration for the client (the Neserver did not send the node secret.

This causes the NetScreen device to request the node secret, and aa new one. This action resyncs communication.The ipaddr ip_addr parameter clears the node secret associated wiinterface that communicates with the SecurID server (ip_addr).

Page 163: netscreen_CLI

“config” through “interface”

147

vice uses these keys to

identify a pki object in a

device. The information

NetScreen CLI Reference Guide

nsmgmt

delete nsmgmt keys

pki object-id

delete pki object-id { system | id_num }

ssh device all

delete ssh device all

nsmgmt keys Deletes the public and private keys for nsmgmt. The NetScreen deencrypt and decrypt the Configlet file.

pki obect-id Deletes a particular PKI object, which is a four diget value used toNetScreen device.

system Deletes the system generated self-signed certificate.

ssh device all Clears all sessions and keys and disables SSH for all vsys on the removed includes:

• Active SSH sessions

• SSH enablement for the current vsys

• PKA keys

• Host keys

Page 164: netscreen_CLI

“config” through “interface”

148

diI (Deep Inspection) on packets

ection examines Layer 3 and 4 fort to detect and prevent any

tures.

NetScreen CLI Reference Guide

Description: Use the di commands to configure the NetScreen device to perform Dthat use specified protocols.

DI is a mechanism for filtering traffic permitted by the NetScreen firewall. Deep Insppacket headers and Layer 7 application content and protocol characteristics in an efattacks or anomalous behavior that might be present.

Syntax

get

get di{disable_tcp_checksum |service

{aim

[max_flap_length |max_icmb_length |max_oft_frame |max_tlv_length] |

dns[cache_size |cache_time |nxt_length |report_unexpected |report_unknowns |

Note: To use this command, you must install a license key to enable advanced fea

Page 165: netscreen_CLI

“config” through “interface”

149

NetScreen CLI Reference Guide

udp_message_limit] |

ftp[failed_logins |line_length |password_length |pathname_length |sitestring_length |username_length] |

gnutella[max_line_length |max_query_size |max_ttl_hops] |

http[alternate_ports |auth_length |brute_search |content_type_length |cookie_length |failed_logins |header_length |host_length |referer_length |request_length |user_agent_length] |

imap[failed_logins |flag_length |line_length |

Page 166: netscreen_CLI

“config” through “interface”

150

NetScreen CLI Reference Guide

literal_length |mbox_length |pass_length |ref_length |user_length] |

msn[max_display_name |max_group_name |max_ip_port |max_phone_number |max_url |max_user_name |max_user_state] |

msrpc[epm_max_num_entries |epm_max_tower_len |max_frag_len |] |

nbname[pointer_loop_limit |] |

pop3[apop_length |failed_logins |line_length |max_msg_num |pass_length |user_length] |

smb

Page 167: netscreen_CLI

“config” through “interface”

151

NetScreen CLI Reference Guide

[failed_logins |regkey_length |] |

smtp[check_headers_in_body |cmdline_length |content_filename_length |content_name_length |domain_length |multipart_depth |num_rcpt |parse_cnt_length |path_length |replyline_length |textline_length |user_length] |

ymsg[max_activity |max_buddy_list |max_challenge |max_chatroom_msg |max_chatroom_name | max_conf_msg |max_conference_name |max_cookie_length |max_crypt |max_file_name |max_group_name |max_mail_address |max_mail_subject |max_message_size |max_url_name |

Page 168: netscreen_CLI

“config” through “interface”

152

NetScreen CLI Reference Guide

max_user_name |max_webcam_key |max_yahoo_message]

}}

set

set di{disable_tcp_checksum |service

{aim

[max_flap_length number |max_icmb_length number |max_oft_frame number |max_tlv_length number] |

dns{cache_size number |cache_time number |nxt_length number |report_unexpected number | report_unknowns number |udp_message_limit number} |

ftp{failed_logins number |line_length number |password_length number |

Page 169: netscreen_CLI

“config” through “interface”

153

NetScreen CLI Reference Guide

pathname_length number |sitestring_length number |username_length number} |

gnutella{max_line_length number |max_query_size number |max_ttl_hops number} |

http{alternate_ports number |auth_length number |brute_search number |content_type_length number |cookie_length number |failed_logins number |header_length number |host_length number |referer_length number |request_length number |user_agent_length number} |

imap{failed_logins number |flag_length number |line_length number |literal_length number |mbox_length number |pass_length number |ref_length number |user_length number} |

msn

Page 170: netscreen_CLI

“config” through “interface”

154

NetScreen CLI Reference Guide

[max_display_name number |max_group_name number |max_ip_port number |max_phone_number number |max_url number |max_user_name number |max_user_state number] |

msrpc[epm_max_num_entries number |epm_max_tower_len number |max_frag_len number |] |

nbname[pointer_loop_limit number |] |

pop3{apop_length number |failed_logins number |line_length number |max_msg_num number |pass_length number |user_length number} |

smb[failed_logins number |regkey_length number] |

smtp{check_headers_in_body number |

Page 171: netscreen_CLI

“config” through “interface”

155

NetScreen CLI Reference Guide

cmdline_length number |content_filename_length number |content_name_length number |domain_length number |multipart_depth number |num_rcpt number |parse_cnt_length number |path_length number |replyline_length number |textline_length number |user_length number}

}}

unset

unset di{disable_tcp_checksum |service

{aim

{max_flap_length |max_icmb_length |max_oft_frame |max_tlv_length} |

dns{cache_size |cache_time |nxt_length |report_unexpected |

Page 172: netscreen_CLI

“config” through “interface”

156

NetScreen CLI Reference Guide

report_unknowns |udp_message_limit} |

ftp{failed_logins |line_length |password_length |pathname_length |sitestring_length |username_length} |

gnutella{max_line_length |max_query_size |max_ttl_hops} |

http{alternate_ports |auth_length |brute_search |content_type_length |cookie_length |failed_logins |header_length |host_length |referer_length |request_length |user_agent_length} |

imap{failed_logins |flag_length |

Page 173: netscreen_CLI

“config” through “interface”

157

NetScreen CLI Reference Guide

line_length |literal_length |mbox_length |pass_length |ref_length |user_length} |

msn{max_display_name |max_group_name |max_ip_port |max_phone_number |max_url |max_user_name |max_user_state} |

msrpc{epm_max_num_entries |epm_max_tower_len |max_frag_len |} |

nbname{pointer_loop_limit |} |

pop3{apop_length |failed_logins |line_length |max_msg_num |pass_length |user_length} |

Page 174: netscreen_CLI

“config” through “interface”

158

NetScreen CLI Reference Guide

smb{failed_logins |regkey_length |{ |

smtp{check_headers_in_body |cmdline_length |content_filename_length |content_name_length |domain_length |multipart_depth |num_rcpt |parse_cnt_length |path_length |replyline_length |textline_length |user_length} |

ymsg{max_activity |max_buddy_list |max_challenge |max_chatroom_msg |max_chatroom_name | max_conf_msg |max_conference_name |max_cookie_length |max_crypt |max_file_name |max_group_name |max_mail_address |max_mail_subject |max_message_size |

Page 175: netscreen_CLI

“config” through “interface”

159

e uses TCP checksums in

es, it may be useful to disable it. default.

NetScreen CLI Reference Guide

max_url_name |max_user_name |max_webcam_key |max_yahoo_message}

}}

Keywords and Variables

disable_tcp_checksum

get disable_tcp_checksumset disable_tcp_checksumunset disable_tcp_checksum

Examples: The following command disables the checksum operation:

set di disable_dhcp_checksum

The following command enables the checksum operation:

unset di disable_dhcp_checksum

disable_tcp_checksum Disables the TCP checksum operation. The NetScreen devicexchanged packets to detect TCP transmission errors.Because the checksum operation uses up processor resourcThe NetScreen device performs the checksum operation by

Page 176: netscreen_CLI

“config” through “interface”

160

ssaging (AIM) traffic. AIM makes t structuring.

LAP packet—6-byte header +

inter-client-message block s it into multiple ICMBs and sends 0.

SCAR file transfer (OFT) frame.

(TLV) unit. A TLV unit consists of ue field. TLVs often appear in the

S) traffic and how it caches DNS

e NetScreen device.

n device stores a query in its

NetScreen CLI Reference Guide

aim

get di service aim { ... }set di service aim { ... }unset di service aim { ... }

dns

get di service dns { ... }set di service dns { ... }unset di service dns { ... }

aim Determines how the NetScreen device evaluates America Online Instant Meuse of the OSCAR protocol, which in turn uses the FLAP protocol for packe

• max_flap_length number Specifies the maximum number of bytes in a Fdata. Minimum: 6 bytes; maximum 10,000 bytes; default: 10,000 bytes.

• max_icmb_length number Specifies the maximum number of bytes in an(ICMB). When an instant message is transmitted, the FLAP protocol breakeach block in a separate TLV. Minimum: 0; maximum: 10,000; default: 200

• max_oft_frame number Specifies the maximum number of bytes in an OMinimum: 0; maximum: 10,000; default: 10,000.

• max_tlv_length number Specifies the length of a Type, Length, and Valuea 2-byte type code + a 2-byte value for Length + the actual data in the ValFLAP data field. Minimum: 0; maximum: 100,000; default: 8000.

dns Determines how the NetScreen device evaluates Domain Name System (DNqueries.

• cache_size number The maximum size, in bytes, of the DNS cache on thMinimum: 0; maximum: 1,000,000; default: 100.

• cache_time number The maximum number of seconds that the NetScreecache. Minimum: 0; maximum: 3600; default: 60.

Page 177: netscreen_CLI

“config” through “interface”

161

urce record (NXT RR) in a DNS

ted DNS parameters. A value of 0 nexpected DNS parameters:

reater than 252 are reserved for Specification“.)

TYPE 249 is for the Transaction NS server and resolver can onses passing between them.

wn DNS TYPE and CLASS nown DNS TYPE or CLASS is 3, 2535, 1712, 1876, 1886, 1995, own DNS parameters is disabled.

a UDP message sent during a

P) traffic. The NetScreen device be normal FTP traffic. The us.

pts per minute to an FTP server

ommand line.

NetScreen CLI Reference Guide

ftp

get di service ftp { ... }set di service ftp { ... }unset di service ftp { ... }

• nxt_length number The maximum number of bytes in a nonexistent resoresponse message. Minimum: 1024; maximum: 8192; default: 4096.

• report_unexpected { 0 | 1 } Enables or disables the reporting of unexpecdisables such reporting, and 1 enables it. The following are examples of u

- The TYPE value is equal to or greater than 252. Values equal to and gQTYPE fields. (See RFC 1035, “Domain Names – Implementation and

- The RR TYPE code is 249 but the CLASS code is not 255 (any class).Key (TKEY) RR. The TKEY RR provides a mechanism with which a Destablish shared secret keys to authenticate the DNS queries and resp(See RFC 2930, “Secret Key Establishment for DNS (TKEY RR)“.)

By default, the reporting of unexpected DNS parameters is disabled.

• report_unknowns { 0 | 1 } Enables or disables the reporting of any unknoparamenter. A value of 0 disables such reporting, and 1 enables it. An unkanything not defined in one of the following DNS-related RFCs: 1035, 1182053, 2065, 2538, 2671, 2672, and 2930. By default, the reporting of unkn

• udp_message_limit number Specifies the maximum number of bytes in DNS exchange. Minimum: 512; maximum: 4096; default: 512.

ftp Determines how the NetScreen device evaluates File Transfer Protocol (FTcompares actual FTP traffic with maximum settings of what you consider toNetScreen device considers any traffic exceeding such settings as anomalo

• failed_logins number Specifies the maximum number of failed login attemfrom a single host. Minimum: 2; maximum: 100; default: 8.

• line_length number Specifies the maximum number of bytes in an FTP cMinimum: 1; maximum: 8192; default: 1024.

Page 178: netscreen_CLI

“config” through “interface”

162

FTP password.

FTP path name.

FTP site string.

FTP user name.

a peer-to-peer (P2P) file-sharing

nutella command line. Minimum:

ery sent between two Gnutella

ding devices (hops) already lla header.

NetScreen CLI Reference Guide

gnutella

get di service gnutella { ... }set di service gnutella { ... }unset di service gnutella { ... }

• password_length number Specifies the maximum number of bytes for anMinimum: 1; maximum: 8192; default: 64.

• pathname_length number Specifies the maximum number of bytes in anMinimum: 1; maximum: 8192; default: 512.

• sitestring_length number Specifies the maximum number of bytes in an Minimum: 1; maximum: 8192; default: 512.

• username_length number Specifies the maximum number of bytes for anMinimum: 1; maximum: 8192; default: 32.

gnutella Determines how the NetScreen device evaluates Gnutella traffic. Gnutella isprotocol and application that does not make use of centralized servers.

• max_line_length number Specifies the maximum number of bytes in a G1; maximum 4096; default: 2048.

• max_query_size number Specifies the maximum number of bytes in a qupeers. Minimum: 256; maximum: 4096; default: 256.

• max_ttl_hops number Specifies the maximum number of network forwarpassed plus the remaining Time to Live (TTL) value indicated in the GnuteMinimum:1; maximum: 10; default: 8.

Page 179: netscreen_CLI

“config” through “interface”

163

ol (HTTP) traffic. The NetScreen nsider to be normal HTTP traffic. malous.

on the default HTTP port of 80 as and 9080. A value of 0 disables ault, this is enabled.

header authorization line.

r minute. If the NetScreen device Found), and 405 (Method Not omalous event.

r a HTTP header Content Type packet.

ie.

ol anomaly HTTP-HEADER-ice generates too many log

pts per minute to an HTTP server

TTP packet header.

NetScreen CLI Reference Guide

http

get di service http { ... }set di service http { ... }unset di service http { ... }

http Determines how the NetScreen device evaluates Hypertext Transfer Protocdevice compares actual HTTP traffic with maximum settings of what you coThe NetScreen device considers any traffic exceeding such settings as ano

• alternate_ports { 0 | 1 } Enables or disables the inspection of HTTP trafficwell as on the following ports: 7001, 8000, 8001, 8100, 8200, 8080, 8888,HTTP traffic inspection on these alternative ports, and 1 enables it. By def

• auth_length number Specifies the maximum number of bytes in an HTTPMinimum: 1; maximum: 1024; default: 512.

• brute_search number Specifies the maximum number of HTTP errors pedetects more HTTP 301 (Moved Permanently), 403 (Forbidden), 404 (NotAllowed) errors than the specified maximum, the device considers it an anMinimum: 2; maximum: 100; default: 16.

• content_type_length number Specifies the maximum number of bytes fofield. This field specifies the media type of the data contained in the HTTPMinimum: 1; maximum: 8192; default: 512.

• cookie_length number Specifies the maximum number of bytes in a cookMinimum: 1; maximum: 8192; default: 8192.

Note: Cookies that exceed the cookie length setting can match the protocOVERFLOW and produce unnecessary log records. If the NetScreen devrecords for this anomaly, increase the cookie length setting.

• failed_logins number Specifies the maximum number of failed login attemfrom a single host. Minimum: 2; maximum: 100; default: 8.

• header_length number Specifies the maximum number of bytes for an HMinimum: 1; maximum: 8192; default: 8192.

Page 180: netscreen_CLI

“config” through “interface”

164

header host, which can be an

ader referer field, which the client a formatted string that identifies a

TTP request, which includes he resource, and the protocol

a HTTP header user-agent field, t.

Protocol (IMAP) traffic. The hat you consider to be normal ttings as anomalous.

pts per minute to an IMAP server

flag.

line.

NetScreen CLI Reference Guide

imap

get di service imap { ... }set di service imap { ... }unset di service imap { ... }

• host_length number Specifies the maximum number of bytes for a HTTPInternet host domain name or IP address.Minimum: 1; maximum: 8192; default: 64.

• referer_length number Specifies the maximum number of bytes for the heuses to specify the address URI (Uniform Resource Identifier). The URI is network resource by a characteristic such as a name or a location.Minimum: 1; maximum: 8192; default: 8192.

• request_length number Specifies the maximum number of bytes for an Hinformation such as a network resource identifier, the method to apply to tversion. Minimum: 1; maximum: 8192; default: 8192.

• user_agent_length number Specifies the maximum number of bytes for which contains information about the user agent that originated the requesMinimum: 1; maximum: 8192; default: 256.

imap Determines how the NetScreen device evaluates Internet Message Access NetScreen device compares actual IMAP traffic with maximum settings of wIMAP traffic. The NetScreen device considers any traffic exceeding such se

• failed_logins number Specifies the maximum number of failed login attemfrom a single host. Minimum: 2; maximum: 100; default: 8.

• flag_length number Specifes the maximum number of bytes for an IMAPMinimum: 1; maximum: 8192; default: 64.

• line_length number Specifies the maximum number of bytes for an IMAPMinimum: 1; maximum: 8192; default: 2048.

Page 181: netscreen_CLI

“config” through “interface”

165

l string. In IMAP4, a string can be ssage Access Protocol – Version

refix-quoted with an octet count in and CRLF.

P mailbox.

P password.

reference.

user name.

NetScreen CLI Reference Guide

• literal_length number Specifies the maximum number of octets in a literain one of two forms: literal or quoted. As defined in RFC 2060 “Internet Me4rev1”:

A literal is a sequence of zero or more octets (including CR and LF), pthe form of an open brace ("{"), the number of octets, close brace ("}"),

Minimum: 1; maximum: 16,777,215; default: 65,535.

• mbox_length number Specifies the maximum number of bytes for an IMAMinimum: 1; maximum: 8192; default: 64.

• pass_length number Specifies the maximum number of bytes for an IMAMinimum: 1; maximum: 8192; default: 64.

• ref_length number Specifies the maximum number of bytes for an IMAP Minimum: 1; maximum: 8192; default: 64.

• user_length number Specifies the maximum number of bytes for an IMAPMinimum: 1; maximum: 8192; default: 64.

Page 182: netscreen_CLI

“config” through “interface”

166

Instant Messaging ettings of what you ffic exceeding such

n MSN display incipals. A display name”.

n MSN group. Every st one group: the

ddress:port number ard session.

r a phone number in N principals.

ess in an MSN

NetScreen CLI Reference Guide

msn

get di service msn { ... }set di service msn { ... }unset di service msn { ... }

msn Determines how the NetScreen device evaluates Microsoft Network (MSN) traffic. The NetScreen device compares actual MSN traffic with maximum sconsider to be normal MSN traffic. The NetScreen device considers any trasettings as anomalous.

• max_display_name number Specifies the maximum number of bytes in aname, which is the name that you use to identify yourself to other MSN prname is also known as a “friendly name”, “custom name” or “custom user Minimum: 1; maximum: 1024; default: 128.

• max_group_name number Specifies the maximum number of bytes for agroup has a name and an ID number, and every principal belongs to at leadefault group named “~” (tilde) with ID 0.Minimum: 1; maximum: 1024; default: 84.

• max_ip_port number Specifies the maximum number of bytes for the IP aof an MSN server (notification server or switchboard server) for a switchboMinimum: 30; maximum: 40; default: 30.

Note: All MSN notification and switchboard servers use port 1863.

• max_phone_number number Specifies the maximum number of bytes foan MSN Forward List (FL). The FL is essentially a contact list of other MSMinimum: 20; maximum: 50; default: 20.

• max_url number Specifies the maximum number of bytes for a URL addrmessage. Minimum: 1; maximum: 2000; default: 1024.

Page 183: netscreen_CLI

“config” through “interface”

167

MSN user’s name.

SN user state. A . Some examples:

that are substates of t Back).

re Call (MSRPC) settings of what you

raffic exceeding such

es in an MSRPC

a protocol tower an interface identifier to make a remote

PC fragment.

NetScreen CLI Reference Guide

msrpc

get di service msrpc { ... }set di service msrpc { ... }unset di service msrpc { ... }

• max_user_name number Specifies the maximum number of bytes in anyMinimum: 1; maximum: 1024; default: 84.

• max_user_state number Specifies the maximum number of bytes in an Muser state is a 3-letter code that indicates the status of a user’s connectionNLN (online), FLN (offline), HDN (hidden/invisible). There are other statesNLN. Some examples of those: BSY (Busy), IDL (Idle), and BRB (Be RighMinimum: 3; maximum: 15; default: 3.

msrpc Determines how the NetScreen device evaluates Microsoft Remote Procedutraffic. The NetScreen device compares actual MSRPC traffic with maximumconsider to be normal MSRPC traffic. The NetScreen device considers any tsettings as anomalous.

• epm_max_num_entries number Specifies the maximum number of entriendpoint mapper (EPM) message.Minimum: 100; maximum: 8192; default: 100.

• epm_max_tower_len number Specifies the maximum number of bytes inrepresentation in an MSRPC EPM message. A protocol tower consists of and binding information between a client and server that permits the clientprocedure call to the server.Minimum: 8192; maximum: 268,435,456; default: 8192.

• max_frag_len number Specifies the maximum length, in bytes, of an MSRMinimum: 4096; maximum: 65,535; default: 8192.

Page 184: netscreen_CLI

“config” through “interface”

168

traffic. The f what you consider eeding such settings

p levels for NetBIOS

n 3 (POP3) traffic. of what you consider ding such settings as

enticated Post Office g himself to a POP3

pts per minute to a

3 line.

a single mailbox on a

NetScreen CLI Reference Guide

nbname

get di service nbname { ... }set di service nbname { ... }unset di service nbname { ... }

pop3

get di service pop3 { ... }set di service pop3 { ... }unset di service pop3 { ... }

nbname Determines how the NetScreen device evaluates NetBIOS name (Nbname)NetScreen device compares actual NBname traffic with maximum settings oto be normal Nbname traffic. The NetScreen device considers any traffic excas anomalous.

• pointer_loop_limit number Specifies the maximum number of pointer loonames. Minimum: 0; maximum: 24; default: 8.

pop3 Determines how the NetScreen device evaluates Post Office Protocol versioThe NetScreen device compares actual POP3 traffic with maximum settingsto be normal POP3 traffic. The NetScreen device considers any traffic exceeanomalous.

• apop_length number Specifies the maximum number of bytes for an AuthProtocol (APOP) command, which a POP3 user issues when authenticatinmail server. Minimum: 1; maximum: 8192; default: 100.

• failed_logins number Specifies the maximum number of failed login attemPOP3 server from a single host. Minimum: 2; maximum: 100; default: 4.

• line_length number Specifies the maximum number of bytes for any POPMinimum: 1; maximum: 8192; default: 512.

• max_msg_num number Specifies the maximum number of messages in POP3 server. Minimum:100; maximum: 10,000,000; default: 10,000,000.

Page 185: netscreen_CLI

“config” through “interface”

169

password.

user name.

MB) traffic. The at you consider to be uch settings as

pts per minute to an

B registry key.

NetScreen CLI Reference Guide

smb

get di service smb { ... }set di service smb { ... }unset di service smb { ... }

• pass_length number Specifies the maximum number of bytes in a POP3Minimum: 1; maximum: 8192; default: 64.

• user_length number Specifies the maximum number of bytes in an POP3Minimum: 1; maximum: 8192; default: 64.

smb Determines how the NetScreen device evaluates Server Message Block (SNetScreen device compares actual SMB traffic with maximum settings of whnormal SMB traffic. The NetScreen device considers any traffic exceeding sanomalous.

• failed_logins number Specifies the maximum number of failed login attemSMB server from a single host. Minimum: 2; maximum: 100; default: 8.

• regkey_length number Specifies the maximum number of bytes in an SMMinimum: 32; maximum: 64,535; default: 8192.

Page 186: netscreen_CLI

“config” through “interface”

170

trol how the NetScreen device normal SMTP traffic. Traffic that col anomalies. The default SMTP

MTP traffic for e-mail headers in e contains an attachment. message, and 1 enables it. By

ommand line sent from an SMTP

es for the name of a file in a n about the content-disposition

Internet Messages: The

in the content-type name attribute ame=”CLI.pdf” , and nt types, see RFC 2046 “

omain name component of the mand in an SMTP message

verse-path field indicates the main_name

NetScreen CLI Reference Guide

smtp

get di service smtp { ... }set di service smtp { ... }unset di service smtp { ... }

smtp Use the SMTP (Simple Mail Transfer Protocol) threshold parameters to conhandles SMTP packets. The threshold parameters define the boundaries ofexceeds these boundaries is considered abnormal, and might contain protothresholds are below:

• check_headers_in_body { 0 | 1 } Enables or disables the inspection of Sthe body of an e-mail message, which can occur when a bounced messagA value of 0 disables checking for SMTP headers in the body of an e-maildefault, this is disabled.

• cmdline_length number Specifies the maximum number of bytes in any cclient within an SMTP message envelope.Minimum: 1; maximum: 8192; default: 1024.

• content_filename_length number Specifies the maximum number of bytcontent-disposition filename parameter in an SMTP header. For informatioheader field, see RFC 2183, “Communicating Presentation Information in Content-Disposition Header Field“.Minimum: 1; maximum: 1024; default: 128.

• content_name_length number Specifies the maximum number of bytes in an SMTP header. Two examples of content-type names are text/plain; napplication/zip; name=”nsremote.zip”. For information about various conteMultipurpose Internet Mail Extensions (MIME) Part Two: Media Types“.Minimum: 1; maximum: 1024; default: 128.

• domain_length number Specifies the maximum number of bytes in the dforward-path field in a RCPT command or reverse-path field in a MAIL comenvelope. The forward-path field indicates the destination mailbox. The resender’s mailbox. The mailbox names consist of two parts: usr_name@doMinimum: 1; maximum: 8192; default: 64.

Page 187: netscreen_CLI

“config” through “interface”

171

ultipart content-type. For an “Multipurpose Internet Mail

TP message.

coded MIME data that the

pear in the forward-path field in a TP message envelope. The consists of the sender’s mailbox.

ly line sent from an SMTP server.

le SMTP text line, including the

ame component of the mand in an SMTP message

verse-path field indicates the omain_name

NetScreen CLI Reference Guide

• multipart_depth number Specifies the number of nested elements in a mexample, see “Appendix A – A Complex Multipart Example” in RFC 2049,Extensions (MIME) Part Five: Conformance Criteria and Examples“.Minimum: 1; maximum: 16; default: 4.

• num_rcpt number Specifies the maximum number of recipients for an SMMinimum: 1; maximum: 1000; default: 100.

• parse_cnt_length number Specifies the maximum number of bytes of enNetScreen device must decode.Minimum: 1; maximum: 8192; default: 128.

• path_length number Specifies the maximum number of bytes that can apRCPT command or in the reverse-path field in a MAIL command in an SMforward-path typically consists of the destination mailbox. The reverse-pathMinimum: 1; maximum: 8192; default: 256.

• replyline_length number Specifies the maximum number of bytes in a repThe total length includes the three-digit reply code and the <CRLF>.Minimum: 1; maximum: 8192; default: 512.

• textline_length number Specifies the maximum number of bytes in a sing<CRLF>. Minimum: 1; maximum: 8192; default: 512.

• user_length number Specifies the maximum number of bytes in a user nforward-path field in a RCPT command or reverse-path field in a MAIL comenvelope. The forward-path field indicates the destination mailbox. The resender’s mailbox. The mailbox names consist of two parts: usr_name@dMinimum: 1; maximum: 8192; default: 256.

Page 188: netscreen_CLI

“config” through “interface”

172

) traffic. The NetScreen device to be normal YMSG traffic. The us.

th of a data type activity value. and TYPING.

ddy list that a YMSG server

llenge string that a YMSG server

message sent in a chatroom.

a YMSG chatroom name.

SG conference join message.

of a YMSG conference session

the cookie that a YMSG server

ted password sent during the

NetScreen CLI Reference Guide

ymsg

get di service ymsg { ... }set di service ymsg { ... }unset di service ymsg { ... }

ymsg Determines how the NetScreen device evaluates Yahoo! Messenger (YMSGcompares actual YMSG traffic with maximum settings of what you consider NetScreen device considers any traffic exceeding such settings as anomalo

• max_activity number Specifies the maximum number of bytes in the lengData type activities can be such activities as PEERTOPEER, FILEXFER, Minimum: 1; maximum: 20; default: 15.

• max_buddy_list number Specifies the maximum length in bytes of the busends. Minimum: 20; maximum: 8000; default: 8000.

• max_challenge number Specifies the maximum length in bytes of the chasends during the authentication process.Minimum: 1; maximum: 1024; default: 84.

• max_chatroom_msg number Specifies the maximum length in bytes of aMinimum: 1; maximum: 8000; default: 2000.

• max_chatroom_name number Specifies the maximum length in bytes ofMinimum: 1; maximum: 8000; default: 1024.

• max_conf_msg number Specifies the maximum number of bytes in a YMMinimum: 1; maximum: 8000; default: 1024.

• max_conference_name number Specifies the maximum length in bytes name. Minimum: 1; maximum: 8000; default: 1024.

• max_cookie_length number Specifies the maximum number of bytes in sends to a client.Minimum: 1; maximum: 1000; default: 400.

• max_crypt number Specifies the maximum number of bytes in the encrypYMSG authorization process.Minimum: 1; maximum: 8000; default: 1024.

Page 189: netscreen_CLI

“config” through “interface”

173

me of a file that YMSG peers can

ame of a group of buddies.

address in an e-mail message

e in an e-mail message that a

YMSG instant message.

rm resource locator (URL).

SG username.

e webcam key that YMSG uses to

es of a YMSG instant message.

NetScreen CLI Reference Guide

• max_file_name number Specifies the maximum length in bytes of the natransfer to each other.Minimum: 1; maximum: 8000; default: 1000.

• max_group_name number Specifies the maximum length in bytes for a nMinimum: 1; maximum: 1024; default: 84.

• max_mail_address number Specifies the maximum length in bytes of thethat a YMSG server sends as part of a new e-mail alert.Minimum: 1; maximum: 1024; default: 84.

• max_mail_subject number Specifies the length in bytes of the subject linYMSG server sends as part of a new e-mail alert.Minimum: 1; maximum: 1024; default: 128.

• max_message_size number Specifies the maximum length in bytes of a Minimum: 1; maximum: 1024; default: 128.

• max_url_name number Specifies the maximum length in bytes of a unifoMinimum: 1; maximum: 8000; default: 1024.

• max_user_name number Specifies the maximum length in bytes of a YMMinimum: 1; maximum: 1024; default: 84.

• max_webcam_key number Specifies the maximum number of bytes in thsupport webcam transmissions. Minimum: 1; maximum: 1024; default: 124.

• max_yahoo_message number Specifies the maximum total length in bytMinimum: 200; maximum: 8192; default: 8192.

Page 190: netscreen_CLI

“config” through “interface”

174

diproup information, or assign the ncurrent sessions (“sticky dip”).

ddresses defined on a Layer 3 el interface. When multiple s translation and referencing a When that traffic arrives at a VSI in an inactive virtual d DIP pool to use for address different egress VSIs, the its active VSD.

IP address, the pool must l IP addresses (MIPs and VIPs) tended interface, the pool must

NetScreen CLI Reference Guide

Description: Use dip commands to set up a Dynamic IP (DIP) group, display DIP gsame IP address from a port-translating DIP pool to a host that originates multiple co

A DIP group contains one or more DIP pools, each pool consisting of a range of IP asecurity zone interface, Layer 3 security zone extended interface, or numbered tunnNetScreen devices are in a high availability cluster, a policy requiring source addresDIP pool defined on one virtual security interface (VSI) can result in dropped traffic. physical NetScreen device on which the DIP pool specified in the policy belongs to asecurity device (VSD), the device drops the traffic because it cannot find the specifietranslation. If, instead, the policy references a DIP group that contains DIP pools on NetScreen device receiving the traffic can use the DIP pool belonging to the VSI for

Syntax

get

get dip [ all ]

set

set dip{group { id_num1 [ member id_num2 ] } |sticky}

Note: If the range of addresses in a DIP pool is in the same subnet as the interfaceexclude the interface IP address, router IP addresses, and any mapped IP or virtuathat might also be in that subnet. If the range of addresses is in the subnet of an exexclude the extended interface IP address.

Page 191: netscreen_CLI

“config” through “interface”

175

entification number you assign to mber of a DIP pool.

a host for multiple concurrent

NetScreen CLI Reference Guide

unset

unset dip { group { id_num1 [ member id_num2 ] } | sticky }

Keywords and Variables

group

set dip group id_num1 [ member id_num2 ]unset dip group id_num1 [ member id_num2 ]

Example: The following commands create DIP pools and a DIP group.

• DIP pool with ID 5 for interface ethernet3, which has IP address 1.1.1.1/24

• DIP pool with ID 6 for interface ethernet3:1, which has IP address 1.1.1.2/24

• DIP group with ID number 7. Both DIP pools added to the DIP group

set interface ethernet3 dip 5 1.1.1.10 1.1.1.10set interface ethernet3:1 dip 6 1.1.1.11 1.1.1.11set dip group 7set dip group 7 member 5set dip group 7 member 6

sticky

set dip stickyunset dip sticky

group Creates a DIP group or adds a DIP pool to a group. id_num1 is the idthe new DIP group. member id_num2 specifies the identification nu

sticky Specifies that the NetScreen device assigns the same IP address tosessions.

Page 192: netscreen_CLI

“config” through “interface”

176

dnsisplay DNS configuration

addresses. Support for DNS is addresses. For example, using een.com) in addition to using

ddresses for DNS servers (the

NetScreen CLI Reference Guide

Description: Use dns commands to configure Domain Name System (DNS) or to dinformation.

DNS allows network devices to identify each other using domain names instead of IPprovided by a DNS server, which keeps a table of domain names with associated IPDNS makes it possible to reference locations by domain name (such as www.netscrthe routable IP address (which for www.netscreen.com is 209.125.148.135).

DNS translation is supported in all the following applications:

• Address Book

• Syslog

• E-mail

• WebTrends

• Websense

• LDAP

• SecurID

• RADIUS

• NetScreen-Global PRO

Before you can use DNS for domain name/address resolution, you must enter the aprimary and secondary DNS servers) in the NetScreen device.

Page 193: netscreen_CLI

“config” through “interface”

177

NetScreen CLI Reference Guide

Syntax

clear

clear [ cluster ] dns[ddns [ id id_num ] |proxy |server-select [ domain dom_name ]]

exec

exec dns{ddns [ id id_num ] |refresh}

get

get dns{ddns [ id id_num ] |host { cache | report | settings } |name dom_name |proxy |server-select}

Page 194: netscreen_CLI

“config” through “interface”

178

str ]

NetScreen CLI Reference Guide

set

set dns{ddns

[enableid id_num

}[ server name_str ] server-type { ddo | dyndns }

[ refresh-interval number ][ minimum-update-interval number ]

[ clear-text ]src-interface interface [ host-name name_str ] |username name_str password pswd_str [ agent name_}

] |host

{dns1 ip_addr |dns2 ip_addr |schedule time [ interval number ]} |

proxy [ enable ] |server-select domain

[ [ outgoing-interface interface ]failover |primary-server ip_addr

[ failover |secondary-server ip_addr

[ failover |tertiary-server ip_addr

Page 195: netscreen_CLI

“config” through “interface”

179

table. Each entry represents a frees the resources allocated for

NetScreen CLI Reference Guide

[ failover ]]

]]

}

unset

unset dns host { dns1 | dns2 | schedule }

Keywords and Variables

cluster

clear [ cluster ] dns

ddns

get dns ddns [ id id_num ] [ ... ]set dns ddns enableset dns ddns [ id id_num ] [ ... ]unset dns ddns

cluster Propagates the clear operation to all other devices in a NSRP cluster.

ddns Initiates or deletes the DDNS (Dynamic DNS) entry in the DDNS Entriesmodule that allocates all resources needed for DDNS. Deleting an entrythe module.

Page 196: netscreen_CLI

“config” through “interface”

180

update IP addresses for , or XAuth to dynamically change ts a web server. Thus, any clients if the IP address of the CPE

which contains the e CPE updates these DDNS anges.

ry already exists with this ID formation for that entry. If not, the

DDNS server. The maximum

server.

yption, for both servers.

) between refreshing of the DDNS 760 hours.

essed in minutes) between 1-1440 minutes.

municates with the DDNS server. e for the Netscree device. Note: , not DDO.

NetScreen CLI Reference Guide

Dynamic DNS (DDNS) is a mechanism that allows clients to dynamicallyregistered domain names. This is useful when an ISP uses PPP, DHCPthe IP address for a CPE router (such as a NetScreen device) that protecfrom the internet can access the web server using a domain name, evenrouter previously changed dynamically.This is made possible by a DDNS server such as dyndns.org or ddo.jp, dynamically-changed addresses and their associated domain names. Thservers with this information, periodically or in response to IP address ch

• enable Enables the DDNS module.

• id id_num Identifies a DDNS entry in the DDNS Entries table. If an entnumber, the set dns ddns id id_num command updates the server incommand creates a new entry.

- server name_str The FQDN (Fully-Qualified Domain Name) of thelength is 63 characters.

- server-type { ddo | dyndns } The type (DDO or DYNDNS) of DDNS

- clear-text Disables HTTPS. The default is to use HTTPS encr

- refresh-interval number The time interval (expressed in hoursentry. The default is 168 hours, and the allowable range is 1-8

- minimum-update-interval number The minimum period (exprupdates. The default is 10 minutes, and the allowable range is

- src-interface interface The interface through which the device comThe optional host-name name_str parameter identifies a host namThis value is necessary only if the DDNS server is of type DYNDNS

Page 197: netscreen_CLI

“config” through “interface”

181

tifies the username and password ings is 63 characters.

alue is:

ook up an IP address for the given

representing a host device with a the NetScreen device using the .2.25 creates a DNS table entry ws you to reach the host from the

s only as a proxy for the actual listed names using the NetScreen or an external host and to access

NetScreen CLI Reference Guide

host

get dns host { ... }set dns host { ... }unset dns host { ... }

- username name_str password pswd_str [ agent name_str ] Idenfor the DDNS account. The maximum length for each of these sett

- agent name_str Specifies the name of the agent. The default v

string1-string2-id_num, where:

- string1 the company name

- string2 the software version

- id_num the serial number

The maximum length of the total agent string is 63 characters.

host • cache Displays the DNS cache table.

• dns1 ip_addr Specifies the primary DNS server.

• dns2 ip_addr Specifies the backup DNS server.

• name The domain name of the host, listed in the DNS table.

- Using the name option with get directs the NetScreen device to ldomain name.

- Using the name option with set places an entry in the DNS table,host name and IP address. This allows you to reach the host from host name. For example, executing set dns host name acme 2.2for a host at address 2.2.2.25, with a host name of acme. This alloNetScreen device, as with the command ping acme.

Note: The DNS table is local to the NetScreen device, and functionDNS server. Consequently, other network nodes cannot query the device. The main purpose of the table is to let you create an alias fthat host from the NetScreen device.

Page 198: netscreen_CLI

“config” through “interface”

182

P address 1.2.2.45:

and a DNS table refresh

ormat of this parameter is hh:mm. rval between DNS table refresh cheduled DNS lookup time. Use

g, and the number of UDP

needed for the proxy. The enable

lients to make split DNS queries. , according to partial or complete l links provide multiple network ork, and other queries to another

NetScreen CLI Reference Guide

Example1: The following command sets up a host as the primary DNS server at I

set dns host dns1 1.2.2.45

Example2: The following command schedules a refresh time at 23:59 each day,interval of 12 hours:

set dns host schedule 23:59 interval 12

proxy

get dns proxyset dns proxy [ enable ]unset dns proxy [ enable ]

• report Displays the DNS lookup table.

• schedule time Specifies the time of day to refresh DNS entries. The fThe interval number parameter specifies a 4-, 6-, 8-, or 12-hour inteoperations. The default interval is 24 hours; that is, once a day at the sthis option to refresh the DNS table more frequently.

• settings Displays DNS settings, including IP addresses, refresh settinsessions.

proxy Initializes or deletes the DNS proxy. Initialization allocates all resources switch enables or disables the DNS proxy itself.The DNS proxy feature provides a transparent mechanism that allows cThe proxy redirects the DNS queries selectively to specific DNS serversdomain specifications. This is useful when VPN tunnels or PPPoE virtuaconnectivity, and it is necessary to direct some DNS queries to one netwnetwork.

Page 199: netscreen_CLI

“config” through “interface”

183

nterface { ... } ]

meant for the corporate domain r, while all others go to the ISP

et, thus preventing malicious

e to perform a manual DNS

lly-Qualified Domain Name)

urrently active server fails.ully-filled entry for a DNS proxy rect DNS queries to different DNS ining a particular domain name to denote these other, unspecified

NetScreen CLI Reference Guide

refresh

exec dns refresh

server-select

clear [ cluster ] dns server-select domain dom_nameget dns server-selectset dns server-select domain dom_name [ outgoing-interface i

The most important advantages of a DNS proxy are as follows.

• Domain lookups are usually more efficient. For example, DNS queries(such as marketing.acme.com) could go to the corporate DNS serveDNS server, thus reducing the load on the corporate server.

• DNS proxy can prevent domain information from leaking into the internusers from learning about internal network configuration.

refresh Refreshes all DNS entries. Using the option directs the NetScreen deviclookup.

server-select Identifies external DNS servers according to all or part of the FQDN (Fucontained in each DNS query. This process is called proxy DNS.

• primary-server ip_addr

• secondary-server ip_addr

• tertiary-server ip_addr

The failover switch directs the DNS to fail over to another server if the cUse the set dns server-select commands to create a partially-filled or fdomain lookup. Such entries allow the NetScreen device to selectively diservers. For example, you can direct all DNS queries with FQDNs contaa corporate server, and direct all other DNS queries to an ISP server. Toqueries, use the asterisk symbol (see example below).

Page 200: netscreen_CLI

“config” through “interface”

184

forward DNS queries to

gh interface tunnel.1, to the S proxy could query this server

at IPv4 address 1.1.1.23.

nnel.1 primary-server

primary-server 1.1.1.23

gh which the NetScreen device specifying a tunnel interface.)xy using the set dns proxy and see “proxy” on page 182.

NetScreen CLI Reference Guide

Example: The following commands create two proxy-DNS entries that selectivelydifferent servers.

• All DNS queries for FQDNs containing the domain name acme.com go throuDNS server at IPv6 address 3aff:7483:ad33::33ff:fe34. For example, the DNfor the FQDN intranet.acme.com.

• All other DNS queries go out through interface ethernet3 to the DNS server

set dns proxyset dns proxy enableset dns server-select domain .acme.com outgoing-interface tu

2.2.2.2set dns server-select domain * outgoing-interface ethernet3

The optional outgoing-interface parameter specifies the interface throutransmits the DNS query. (Note: You can make such queries secure byBefore you can use the server-select options, you must enable DNS proset dns proxy enable commands. For more information on proxy DNS,

Page 201: netscreen_CLI

“config” through “interface”

185

domainNetScreen device.

allows other devices to access g an explicit IP address.

me:

NetScreen CLI Reference Guide

Description: Use the domain commands to set or display the domain name of the

A domain name is a character string that identifies the NetSceen device. This namethe NetScreen device through a DNS server, thus identifying the device without usin

Syntax

get

get domain

set

set domain name_str

unset

unset domain

Keywords and Variables

Variable Parameter

Example: The following command sets the domain of the NetScreen device to ac

set domain acme

name_str Defines the domain name of the NetScreen device.

Page 202: netscreen_CLI

“config” through “interface”

186

downgradefrom ScreenOS 5.0.X to

sfer data from the TFTP server

uter

in ScreenOS 5.0.0 are not

ion Guide for ScreenOS 5.0.0.

e NetScreen ScreenOS

NetScreen CLI Reference Guide

Description: Use the downgrade command to downgrade the ScreenOS firmware ScreenOS 4.0.X.

To use this command to perform a downgrade, you must have the following.

• Root or Read-Write privileges to the NetScreen device

• A console connection to the NetScreen device

• A TFTP server application running on your computer

• An Ethernet connection from your computer to the NetScreen device (to tranon your computer)

• A ScreenOS 4.0.X image file saved to the TFTP server folder on your comp

• A configuration file that was saved in ScreenOS 4.0.X (configurations savedsupported by ScreenOS 4.0.X)

For information on the downgrade process, refer to the NetScreen ScreenOS Migrat

Syntax

exec

exec downgrade

Keywords and Variables

None.

Warning: Execute this command with extreme caution. Before execution, refer to thMigration Guide for further details.

Page 203: netscreen_CLI

“config” through “interface”

187

reen-Security Manager),

NetScreen CLI Reference Guide

Downgrades and NSM

Before downgrading ScreenOS from 5.x to 4.x on a device that uses NSM (NetScexecute the following commands:

unset nsmgmt enableunset nsmgmt init otpunset nsmgmt init idunset nsmgmt server primarydel nsmgmt keyssave

Page 204: netscreen_CLI

“config” through “interface”

188

envar

t startup.

as file2.cfg in slot2:

NetScreen CLI Reference Guide

Description: Use the envar commands to define environment variables.

The NetScreen device uses environment variables to make special configurations a

Syntax

get

get envar [ resource ]

set

set envar string

unset

unset envar string

Keywords and Variables

Variable Parameter

set envar stringunset envar string

Example: The following command defines the location of the system configuration

set envar config=slot2:file2.cfg

string The location of the environment variables files.

Page 205: netscreen_CLI

“config” through “interface”

189

NetScreen CLI Reference Guide

resource

get envar resource

resource Displays the following information:

• (max-session) Maximum number of sessions

• (max-sa) Maximum number of security associations (SAs)

• (max-l2tp-tunnel) Maximun number of L2TP tunnels

Page 206: netscreen_CLI

“config” through “interface”

190

event

en device categorizes logged

ttacks not included in the

s changes, and global

ng of Death attacks.

nfiguration changes.

out, and user authentication

NetScreen CLI Reference Guide

Description: Use the event commands to display or clear event log messages.

The event log monitors and records system events and network traffic. The NetScresystem events by the following severity levels:

• Alert: Messages for multiple user authentication failures and other firewall aemergency category.

• Critical: Messages for URL blocks, traffic alarms, high availability (HA) statucommunications.

• Debugging: All messages.

• Emergency: Messages concerning SYN attacks, Tear Drop attacks, and Pi

• Error: Messages for admin log on failures.

• Information: Any kind of message not specified in other categories.

• Notification: Messages concerning link status changes, traffic logs, and co

• Warning: Messages for admin logins and logouts, failures to log on and logfailures, successes, and timeouts.

The event log displays the date, time, level and description of each system event.

Page 207: netscreen_CLI

“config” through “interface”

191

time ] ]

_netmask mask ] ]dst_netmask mask ] ]

NetScreen CLI Reference Guide

Syntax

clear

clear [ cluster ] event [ end-time time ]

get

get event[ module name_str ]

[ level{alert |critical |debug |emergency |error |information |notification |warning}

][ type id_num1 ] [ -id_num2 ]

[ start-date date [ time ] ] [ end-date date [[ start-time time ] [ end-time time ]

[ include string ] [ exclude string ][src-ip ip_addr1 [ -ip_addr2 | src

[dst-ip ip_addr1 [ -ip_addr2 | sort-by

{date

[ start-date date [ time ] ]

Page 208: netscreen_CLI

“config” through “interface”

192

mask ] ]

. ]

r.

IP address or address range. The

s string of characters (string).

NetScreen CLI Reference Guide

[ end-date date [ time ] ] dst-ip [ ip_addr [ -ip_addr | dst-netmask mask ] ]src-ip [ ip_addr [ -ip_addr | src-netmask mask ] ]time

[ start-time time ][ end-time time ]

}

]

Keywords and Variables

cluster

clear cluster event [ ... ]

dst-ip

get event dst-ip ip_addr [ -ip_addr | dst-netmask mask ]get event sort by dst-ip [ ip_addr [ -ip_addr | dst-netmask

include | exclude

get event [ ... ] [ include string ] [ exclude string ] [ ..

cluster Propagates the clear operation to all other devices in a NSRP cluste

dst-ip Directs the device to display event logs with the specified destinationdevice can also sort event logs by destination IP address.

includeexclude

Directs the device to exclude or include events containing a specifie

Page 209: netscreen_CLI

“config” through “interface”

193

mask ]

re as follows:

out normal operation.

leshooting purposes.

e can also display event logs with

NetScreen CLI Reference Guide

level

get event module name_str level { ... }

module

get event module name_str [ ... ]

src-ip

get event src-ip ip_addr1 [ -ip_addr2 | src-netmask mask ]get event sort by src-ip ip_addr1 [ -ip_addr2 | src-netmask

level Specifies the priority level of the event message. The priority levels a

• emergency (Level 0) The system is unusable.

• alert (Level 1) Immediate action is necessary.

• critical (Level 2) The event affects functionality.

• error (Level 3) Error condition exists.

• warning (Level 4) The event might affect functionality.

• notification (Level 5) The event is a normal occurrence.

• information (Level 6) The event generates general information ab

• debug (Level 7) The event generates detailed information for troub

module Specifies the name of the system module that generated the event.

src-ip Directs the device to sort event logs by source IP address. The devicthe specified source IP address or address range.

Page 210: netscreen_CLI

“config” through “interface”

194

. ]

at 11:30am:

] ] te date [ time ] ]

When you specify a start-time e specified times, regardless of

ou specify the date and optionally

vent. The format is:

s the year using the last two digits e delimiter between the date and

NetScreen CLI Reference Guide

start-time | end-time

clear [ cluster ] event end-time timeget event [ ... ] [ start-time time ] [ end-time time ] [ ..

Example: The following command clears all events generated before May 1, 2002

get event end-time 05/01/02-11:30:00

start-date | end-date

get event [ start-date date [ time ] ] [end-date date [ timeget event sort-by date [ start-date date [ time ] ] [ end-da

type

get event module name_str level { ... } type id_num1 [ ... ]

end-time timestart-time time

Specifies the lower and upper ends of a range of times for an event.and/or end-time, the device sorts or filters the event logs based on ththe date. The format is: hh:mm:ss.When you use the end-time option with the clear event command, ythe time in the following format: mm/dd/yy-hh:mm:ss.

start-date end-date Specifies the lower and upper ends of a range of times for an emm/dd/yy-hh:mm:ssYou can omit the year (the current year is the default), or expresor all four digits. The hour, minute, and second are optional. Ththe time can be a dash or an underscore:12/31/2001-23:59:0012/31/2001_23:59:00

type Specifies a priority level or a range of priority levels.

Page 211: netscreen_CLI

“config” through “interface”

195

exit to terminate and log out from a

the command context to the

command context), you must

NetScreen CLI Reference Guide

Description: Use the exit command to exit a command context, a virtual system, orCLI session.

Syntaxexit

Keywords and Variables

None.

Example: The following exit command exits the context of policy ID 1 and returnstop command level:

ns-> set policy id 1ns(policy:1)-> set dst-addr 2.2.2.5/32ns(policy:1)-> exitns->

Notes

When issuing the exit command at the top command level (that is, not from within alog back in to the console to configure a NetScreen device.

Page 212: netscreen_CLI

“config” through “interface”

196

failovercreen device.

NetScreen CLI Reference Guide

Description: Use the failover commands to configure failover settings on the NetS

Syntax

set

set failover{auto |

enable |holddown number |type { track-ip | tunnel-if }}

unset

unset failover{auto |

enable |holddown}

exec

exec failover{force |revert}

Page 213: netscreen_CLI

“config” through “interface”

197

interface to the backup and from dministrator must use the CLI or ackup interface to the primary).

NetScreen CLI Reference Guide

Keywords and Variables

auto

set failover autounset failover auto

enable

set failover enableunset failover enable

force

exec failover force

auto Directs the NetScreen device to automatically fail over from the primarythe backup interface to the primary. By default, failover is manual (the aWebUI to switch from the primary interface to the backup and from the b

enable Enables failover mode on the NetScreen device.

force Forces traffic to be switched to the backup interface.

Page 214: netscreen_CLI

“config” through “interface”

198

ice delays failover actions. This

the primary interface, when the

econds.

y interface.

n specify the following types:

r.

e failover.

NetScreen CLI Reference Guide

holddown

set failover holddown numberunset failover holddown

Example: The following command sets a failover delay of 45 seconds:

set failover holddown 45

revert

exec failover revert

type

set failover type { track-ip | tunnel-if }

holddown Specifies the time interval (number), in seconds, the NetScreen devvalue has an effect in the following situations:

• The NetScreen device switches traffic to the backup interface.

• The NetScreen device switches traffic from the backup interface toprimary interface becomes available again.

The default holddown interval is 30 seconds. The range is 1-32767 s

revert Forces traffic to be switched from the backup interface to the primar

type Specifies the type of event that determines interface failover. You ca

• track-ip instructs ScreenOS to use IP tracking to determine failove

• tunnel-if instructs ScreenOS to use VPN tunnel status to determin

Page 215: netscreen_CLI

“config” through “interface”

199

file the flash memory.

t from the flash card memory:

y.

ter.

NetScreen CLI Reference Guide

Description: Use the file commands to clear or display information for files stored in

Syntax

get

get file [ filename | info ]

Keywords and Variables

Variable Parameters

clear [ ... ] file dev_name:filenameget file filename

Example: The following command displays information for the file named corpne

get file corpnet

cluster

clear cluster file dev_name:filename

dev_name:filename Deletes the file with the name filename from the flash card memor

filename Defines the file name stored in the flash card memory.

cluster Propagates the clear operation to all other devices in a NSRP clus

Page 216: netscreen_CLI

“config” through “interface”

200

NetScreen CLI Reference Guide

info

get file info

info Displays the base sector and address.

Page 217: netscreen_CLI

“config” through “interface”

201

firewallackets targeting an interface U by a Packet Process Unit

ou configure individual zones

NetScreen CLI Reference Guide

Description: Use the firewall commands to enable or disable logging of dropped paddress on the NetScreen device, or to specify thresholds for packets sent to the CP(PPU).

Syntax

get

get firewall

set

set firewall{log-self [ exclude ] [ icmp | ike | multicast | snmp ] |ppu-threshold packet-drop

{ { non-ip | other-ip | system-critical }number1 number2 }

}

unset

unset firewall{log-self [ exclude ] [ icmp | ike | multicast | snmp ] |ppu-threshold packet-drop

{ { non-ip | other-ip | system-critical }}

Note: NetScreen devices perform most firewall services at the security zone level. Yto perform these services. For more information, see the “zone” on page 683.

Page 218: netscreen_CLI

“config” through “interface”

202

snmp ] | snmp ]

P packets destined for the

s in the self log. Using the ecified traffic types.

Protocol) packets.

ge) packets.

ement Protocol (SNMP) packets.

s enables logging to the self log. ll log-self command without any

NetScreen CLI Reference Guide

Keywords and Variables

firewall

get firewall

log-self

set firewall log-self [ exclude ] [ icmp | ike | multicast |unset firewall log-self [ exclude ] [ icmp | ike | multicast

firewall Displays the settings for logging dropped ICMP, IKE, multicast, and SNMNetScreen device. Log entries appear in the self log.

log-self Directs the NetScreen device to log or not log dropped packets and pingexclude switch directs the device not to perform logging at all or for sp

• icmp Enables or disables logging of ICMP (Internet Control Message

• ike Enables or disables logging of dropped IKE (Internet Key Exchan

• multicast Enables or disables logging of multicast packets.

• snmp Enables or disables logging of dropped Simple Network Manag

Entering the set firewall log-self command without any other keyword(By default, logging to the self log is enabled.) Entering the unset firewaother keywords disables it.

Page 219: netscreen_CLI

“config” through “interface”

203

h forward packets to the flow ticular type the PPU can send to U protection thresholds prevent eature adds another layer of ens. If effect, PPU protection CPU responsive to critical tasks

CP or UDP.

includes BGP, OSPF, RIP, SNMP,

number1, the device drops s linearly with the subsequent ds threshold number2, the device

NetScreen CLI Reference Guide

ppu-threshold

set firewall ppu-threshold packet-drop { ... }unset firewall ppu-threshold packet-drop { ... }

ppu-threshold Defines protection thresholds for the Packet Process Units (PPU), whicCPU. PPU protection thresholds determine how many packets of a parthe CPU, before the device drops subsequent packets of that type. CPexcessive traffic to the flow CPU, thus preventing CPU overload. This fprotection to the device, similar to the SYN-cookie and SYN-proxy screprevents DoS attacks from overwhelming the flow CPU, and keeps theeven under heavy traffic.PPU protection processes three categories of traffic:

• non-ip number1 number2 Packets that do not use IP protocol.

• other-ip number1 number2 IP packets carrying contents other than T

• system-critical number1 number2 System-critical IP packets, which system management, SIP, and H323 traffic.

When the packet arrival rate for a specified category exceeds thresholdsubsequent packets randomly. The probability of packet-dropping growpacket arrival rate for that category. When the packet arrival rate exceedrops all subsequent packets that exceed the threshold.

Page 220: netscreen_CLI

“config” through “interface”

204

flownages packet flow.

the MAC learning table.

w-watermark number }

NetScreen CLI Reference Guide

Description: Use the flow commands to determine how the NetScreen device ma

The device can regulate packet flow in the following ways:

• Enable or disable DNS replies when there is no matching DNS request.

• Pass or block packets containing destination MAC addresses that are not in

• Set or display the initial session timeout values.

• Control or prevent packet fragmentation.

Syntax

get

get flow [ perf | tcpmss ]

set

set flow{aging { early-ageout number | high-watermark number | loall-tcp-mss [ number ] |allow-dns-reply |check tcp-rst-sequence |gre-in-tcp-mss |gre-out-tcp-mss |hub-n-spoke-mip |initial-timeout number |mac-cache mgt |mac-flooding |max-frag-pkt-size number |no-tcp-seq-check |path-mtu |

Page 221: netscreen_CLI

“config” through “interface”

205

NetScreen CLI Reference Guide

syn-proxy syn-cookie |tcp-mss [ number ] |tcp-rst-invalid-session |tcp-syn-check |tcp-syn-check-in-tunnel}

unset

unset flow{aging { early-ageout | high-watermark | low-watermark }allow-dns-reply |check tcp-rst-sequence |gre-in-tcp-mss |gre-out-tcp-mss |hub-n-spoke-mip |initial-timeout |mac-cache mgt |mac-flooding |max-frag-pkt-size |no-tcp-seq-check |path-mtu |syn-proxy syn-cookie |tcp-mss |tcp-rst-invalid-session |tcp-syn-check |tcp-syn-check-in-tunnel}

Page 222: netscreen_CLI

“config” through “interface”

206

r }mark }

en the session table reaches ggressive ageout value at 30

ns when the number of entries in when the number of sessions falls ther state, the normal session r HTTP, it is 5 minutes; and for rocess is in effect, the NetScreen at the rate you specify.

tScreen device aggressively ages m 2 to 10 units, each unit

is 2, or 20 seconds.

ging out process begins. The the session table capacity in 1%

ing out process ends. The number n table capacity in 10% units. The

NetScreen CLI Reference Guide

Keywords and Variables

aging

set flow aging early-ageout numberset flow aging { high-watermark number | low-watermark numbeunset flow aging { early-ageout | high-watermark | low-water

Example: The following commands activate the aggressive aging-out process wh70% capacity and deactivate the process when it drops below 60%, and set the aseconds:

set flow aging low-watermark 60set flow aging high-watermark 70set flow aging early-ageout 3

aging Directs the NetScreen device to begin aggressively aging out sessiothe session table exceeds the high-watermark setting, and then stop below the low-watermark setting. When the session table is in any otimeout value is applied—for TCP, session timeout is 30 minutes; foUDP, it is 1 minute. During the time when the aggressive aging out pdevice ages out sessions—beginning with the oldest sessions first—

• early-ageout number Defines the the ageout value before the Neout a session from its session table. The value you enter can be frorepresenting a 10-second interval. The default early-ageout value

• high-watermark number Sets the point at which the aggressive anumber you enter can be from 1 to 100 and indicates a percent of units. The default is 100, or 100%.

• low-watermark number Sets the point at which the aggressive agyou enter can be from 1 to 10 and indicates a percent of the sessiodefault is 10, or 100%.

Page 223: netscreen_CLI

“config” through “interface”

207

t.t has dst-port 53, the device (QR) bit is 0—which denotes a essage—the device drops the k flow counter for the interface.ply directs the NetScreen device

TCP packets for network traffic. s option (described below) is not errides the all-tcp-mss option for

the all-tcp-mss option is unset.

NetScreen CLI Reference Guide

allow-dns-reply

set flow allow-dns-replyunset flow allow-dns-reply

all-tcp-mss

set flow all-tcp-mss numberunset flow all-tcp-mss

allow-dns-reply Allows an incoming DNS reply packet without a matched requesIf allow-dns-reply is disabled and an incoming UDP first-packechecks the DNS message packet header to verify that the queryquery message. If the QR bit is 1—which denotes a response mpacket, does not create a session, and increments the illegal paBy default, allow-dns-reply is disabled. Enabling allow-dns-reto skip the check.

all-tcp-mss Sets the TCP-MSS (TCP-Maximum Segment Size) value for all This also sets the TCP-MSS for IPSec VPN traffic if the tcp-msset. If you enter the set flow tcp-mss command, that setting ovVPN traffic.The TCP-MSS range can be from 0 to 65,535 bytes. By default,

Page 224: netscreen_CLI

“config” through “interface”

208

he RST bit enabled matches the next higher number incrementally. numbers, the NetScreen device

he correct sequence number. By s does not support this option.)

) for Generic Routing N tunnel. If the NetScreen device -MSS option set and the

cified by the NetScreen device, .

ed, the default TCP-MSS is 1320

NetScreen CLI Reference Guide

check tcp-rst-sequence

set flow check tcp-rst-sequenceunset flow check tcp-rst-sequence

gre-in-tcp-mss

set flow gre-in-tcp-mss [ number ]unset flow gre-in-tcp-mss

check tcp-rst-sequence

Checks that the TCP sequence number in a TCP segment with tprevious sequence number for a packet in that session or is the If the sequence number does not match either of these expecteddrops the packet and sends the host a TCP ACK segment with tdefault, this check is disabled. (Note: The NetScreen-5000 serie

gre-in-tcp-mss Enables and specifies the TCP-MSS (TCP-Maximum Segment SizeEncapsulation (GRE) packets that are about to go into an IPSec VPreceives a GRE-encapsulated TCP packet with the SYN bit and TCPTCP-MSS option specified in the packet exceeds the TCP-MSS spethen the NetScreen device modifies the TCP-MSS value accordingly

By default, a TCP-MSS for GRE packets is not set. When it is enablbytes. The TCP-MSS can be between 64 and 1420 bytes inclusive.

Page 225: netscreen_CLI

“config” through “interface”

209

) for Generic Routing If the NetScreen device receives a on set and the TCP-MSS option creen device, then the NetScreen

ed, the default TCP-MSS is 1320

a VPN tunnel to a mapped IP d of another VPN tunnel. The two ping back on the same outgoing rface is bound to the Untrust zone.

-second intervals) that the able before dropping it, or until the 20 seconds (setting of 2) to 300

NetScreen CLI Reference Guide

gre-out-tcp-mss

set flow gre-out-tcp-mss [ number ]unset flow gre-out-tcp-mss

hub-n-spoke-mip

set flow hub-n-spoke-mipunset flow hub-n-spoke-mip

initial-timeout

set flow initial-timeout numberunset flow initial-timeout

gre-out-tcp-mss Enables and specifies the TCP-MSS (TCP-Maximum Segment SizeEncapsulation (GRE) packets that are leaving an IPSec VPN tunnel. GRE-encapsulated TCP packet with the SYN bit and TCP-MSS optispecified in the packet exceeds the TCP-MSS specified by the NetSdevice modifies the TCP-MSS value accordingly.

By default, a TCP-MSS for GRE packets is not set. When it is enablbytes. The TCP-MSS can be between 64 and 1420 bytes inclusive.

hub-n-spoke-mip Permits the NetScreen device to forward traffic arriving through(MIP) address on one tunnel interface to the MIP host at the entunnels form a hub-and-spoke configuration, with the traffic loointerface. This option only has an effect when the outgoing inte

initial-timeout Defines the length of time in seconds (number, expressed in 10NetScreen device keeps an initial TCP session in the session tdevice receives a FIN or RST packet. The range of time is fromseconds (setting of 30).

Page 226: netscreen_CLI

“config” through “interface”

210

seconds):

traffic for use when replying. This urce-based routing. By default,

wall even if its destination MAC is enabled.

NetScreen CLI Reference Guide

Example: The following command sets the initial timeout value to one minute (60

set flow initial-timeout 6

mac-cache

set flow mac-cache mgtunset flow mac-cache mgt

mac-flooding

set flow mac-floodingunset flow mac-flooding

mac-cache mgt Caches the source MAC address from incoming administrativeoption might be necessary when the NetScreen device uses sothis option is unset.

mac-flooding Enables the NetScreen device to pass a packet across the fireaddress is not in the MAC learning table. By default, this option

Page 227: netscreen_CLI

“config” through “interface”

211

y the NetScreen device to 1024

by the NetScreen device. You can

-pkt-size is 1460 bytes, the and the second is 40 bytes. If you 1024 bytes and the second is 476

ck sequence numbers in TCP ce number checking is enabled. oth source and destination hosts equence numbers according to

rs the sequence numbers in ects a sequence number outside

n devices is to monitor sequence earlier ScreenOS release, the nce number checking. Therefore, grading.

NetScreen CLI Reference Guide

max-frag-pkt-size

set flow max-frag-pkt-size numberunset flow max-frag-pkt-size

Example: The following command sets the maximum size of a packet generated bbytes:

set flow max-frag-pkt-size 1024

no-tcp-seq-check

set flow no-tcp-seq-checkunset flow no-tcp-seq-check

max-frag-pkt-size The maximum allowable size for a packet fragment generated set the number value between 1024 and 1500 bytes inclusive.For example, if a received packet is 1500 bytes and max-fragdevice generates two fragment packets. The first is 1460 bytesreset max-frag-pkt-size to 1024, the first fragment packet is bytes.

no-tcp-seq-check When this command is set, the NetScreen device does not chesegments during stateful inspection. When unset, TCP sequenThe NetScreen device detects the window scale specified by bin a session and adjusts a window for an acceptable range of stheir specified parameters. The NetScreen device then monitopackets sent between these hosts. If the NetScreen device detthis range, it drops the packet.

Starting with ScreenOS 5.1.0, the default behavior of NetScreenumbers in TCP segments. However, when upgrading from anNetScreen device maintains the existing setting for TCP sequeif it was disabled before upgrading, it remains disabled after up

Page 228: netscreen_CLI

“config” through “interface”

212

ost an ICMP message that a eeded and DF set”) when it

um transfer unit (MTU) of the

ice sends the source host the e NetScreen device ignores the

none of the fragmented packets rough the appropriate VPN

NetScreen CLI Reference Guide

path-mtu

set flow path-mtuunset flow path-mtu

perf

get flow perf

tcp-mss

get flow tcp-mssset flow tcp-mss [ number ]

path-mtu Determines whether the NetScreen device sends the source hpacket size is too large (ICMP type 3, code 4 “Fragmentation nreceives a packet meeting the following conditions:

• The Don’t Fragment (DF) bit is set in the IP header.

• The packet is intended for IPSec encapsulation.

• The size of the packet after encapsulation exceeds the maximegress interface, which is 1500 bytes.

When you enable (set) the path-mtu option, the NetScreen devabove ICMP message. When you disable (unset) this option, thDF bit, encapsulates the packet, fragments the packet so that exceeds the MTU of the egress interface, and forwards them thtunnel. By default, this option is disabled.

perf Displays performance information.

Page 229: netscreen_CLI

“config” through “interface”

213

for all TCP SYN packets for S value in the TCP packet to

s a TCP reset (RST) segment. By en device applies the normal minutes; for HTTP, it is 5 minutes;

fault, the NetScreen device ion. If it is not set, the NetScreen

neled packets. By default, the st packet of a VPN session. If it is

NetScreen CLI Reference Guide

unset flow tcp-mss

tcp-rst-invalid-session

set flow tcp-rst-invalid-sessionunset flow tcp-rst-invalid-session

tcp-syn-check

set flow tcp-syn-checkunset flow tcp-syn-check

tcp-syn-check-in-tunnel

set flow tcp-syn-check-in-tunnelunset flow tcp-syn-check-in-tunnel

tcp-mss Sets the TCP-MSS (TCP-Maximum Segment Size) valueIPSec VPN traffic. The NetScreen device modifies the MSavoid fragmentation caused by the IPSec operation.

tcp-rst-invalid-session Marks a session for immediate termination when it receivedefault, this command is unset. When unset, the NetScresession timeout interval—for TCP, session timeout is 30 and for UDP, it is 1 minute.

tcp-syn-check Checks the TCP SYN bit before creating a session. By dechecks that the SYN bit is set in the first packet of a sessdevice drops it.

tcp-syn-check-in-tunnel Checks the TCP SYN bit before creating a session for tunNetScreen device checks that the SYN bit is set in the firnot set, the NetScreen device drops it.

Page 230: netscreen_CLI

“config” through “interface”

214

gaten device, how many are in use,

etScreen device creates the

NetScreen CLI Reference Guide

Description: Use the gate command to check the number of gates on the NetScreeand how many are still available.

Gates are logical access points in the firewall for FTP and similar applications. The Ngates, then converts a gate for each new session when data traffic occurs.

Syntax

get

get gate

Keywords and Variables

None.

Defaults

The default number of gates on NetScreen devices are:

NetScreen-5000 Series 8192

NetScreen-500 4096

NetScreen-200 Series 1024

NetScreen-100 1024

NetScreen-25/50 256

NetScreen-5XT 256

NetScreen-5GT 256

Page 231: netscreen_CLI

“config” through “interface”

215

groupices under a single name.

in a policy. This eliminates the a service group that includes

}

] |

, the NetScreen device oups with high member counts

NetScreen CLI Reference Guide

Description: Use the group commands to group several addresses or several serv

A group allows you to reference a group of addresses or services by a single name need for a separate policy for each address or service. For example, you can createFTP, HTTP, and HTTPS services, and then reference that group in a policy.

Syntax

get

get group { address zone [ grp_name ] | service [ grp_name ]

set

set group{address zone grp_name [ add name_str ] [ comment string service grp_name [ add name_str ] [ comment string ]}

unset

unset group{address zone grp_name [ remove mbr_name | clear ] |service grp_name [ remove mbr_name | clear ]

}

Note: Although a single policy might reference a service group with three membersgenerates multiple internal rules from that policy. Overusing address and service grcan unexpectedly consume internal resources.

Page 232: netscreen_CLI

“config” through “interface”

216

tring ] ]

g for the Trust zone and adds

e service AOL to the group:

quarters) for the Trust zone:

ies the zone to which the address efined zone. For more information

NetScreen CLI Reference Guide

Keywords and Variables

add

set group address zone grp_name [ add mbr_name ] [ comment sset group service grp_name [ add mbr_name [ comment string ]

Examples: The following command creates an address group named engineerinthe address hw-eng to the group:

set group address trust engineering add hw-eng

The following command creates a service group named inside-sales and adds th

set group service inside-sales add AOL

address

get group address zone [ ... ]set group address zone grp_name [ ... ]unset group address zone grp_name [ ... ]

Example: The following command creates an empty address group (named head

set group address trust headquarters

add name_str Adds an address or service named mbr_name.

address Performs the operation on an address group. The zone value specifgroup is bound. This zone is either a default security zone or a user-don zones, see “Zone Names” on page B-I.

Page 233: netscreen_CLI

“config” through “interface”

217

engineering) bound to the

for the Trust zone, adds the

neering Group”

cify an address (or service) group e entire address group or service

NetScreen CLI Reference Guide

clear

unset group address zone grp_name clearunset group service grp_name clear

Example: The following command removes all members from an address group (Trust zone:

unset group address trust engineering clear

comment

set group address zone grp_name [ ... ] [ comment string ]set group service grp_name [ ... ] [ comment string ]

Example: The following command creates an address group named engineeringaddress hw-eng to the group, and includes a comment about the group:

set group address trust engineering add hw-eng comment “Engi

remove

unset group address zone grp_name remove name_strunset group service grp_name remove name_str

clear Removes all the members of an address or service group.

comment Adds a comment string to the service group or address group entry.

remove Removes the address (or service) named name_str. If you do not spemember, the unset group { address | service } command deletes thgroup.

Page 234: netscreen_CLI

“config” through “interface”

218

neering address group:

eb_browsing:

cannot use the same address

n modify it.

NetScreen CLI Reference Guide

Example: The following command removes the address admin-pc from the engi

unset group address trust engineering remove admin-pc

service

get group service grp_nameset group service grp_name [ ... ]unset group service grp_name [ ... ]

Example: The following command creates an empty service group and names it w

set group service web_browsing

Notes

Each address group and service group you create must have a unique name. Yougroup name as a service group name.

You cannot add the predefined address or service named “any” to a group.

While a policy references a group, you cannot remove the group, although you ca

From the console, you can add only one member to a group at a time.

service grp_name Performs the operation on a service group.

Page 235: netscreen_CLI

“config” through “interface”

219

roup-expressionessions for use in security

to NOT, AND, or OR operators.

NetScreen CLI Reference Guide

gDescription: Use the group-expression commands to set up or display group exprpolicies.

A group expression allows you to include or exclude users or user groups, according Such expressions are only usable for external users and user groups.

Syntax

get

get group-expression{name_str |all |id number}

set

set group-expression name_str{not name_str |name_str { and | or } name_str |id number |}

unset

unset group-expression{ name_str | id number }

Page 236: netscreen_CLI

“config” through “interface”

220

roup, place them in an OR

oup expressions.

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameters

get group-expression name_strset group-expression name_strunset group-expression name_str

all

get group-expression all

and | or

set group-expression name_str name_str and name_strset group-expression name_str name_str or name_str

Example: The following commands create group expressions SalesM and SM_Grelationship, and then place SM_Group and Office_1 in an AND relationship:

set user-group Sales_Group location externalset user-group Marketing_Group location externalset group-expression SalesM Sales_Group or Marketing_Groupset group-expression SM_Group Office_1 and SalesM

name_str The name of the group expression.

all Specifies all group expressions.

and | or Specifies AND or OR relationship between users, user groups, or gr

Page 237: netscreen_CLI

“config” through “interface”

221

allow the Office_1 user:

NetScreen CLI Reference Guide

id

get group-expression id numberset group-expression name_str id numberunset group-expression id number

not

set group-expression name_str not name_str

Example: The following command creates a NOT group expression that does not

set group-expression Total_Users not Office_1

id number Specifies an identification number for the group expression.

not Specifies negation.

Page 238: netscreen_CLI

“config” through “interface”

222

hostnameThis name always appears in

e a host name for the device he domain command), you can tunnel.

me:

NetScreen CLI Reference Guide

Description: Use the hostname commands to define the NetScreen device name. the console command prompt.

The host name is a character string that identifies the NetScreen device. If you defin(such as ns500gate) and a domain name for the device (such as “netscreen,” using tuse the host name and domain name (ns500gate.netscreen) as a gateway for a VPN

Syntax

get

get hostname

set

set hostname string

unset

unset hostname

Keywords and Variables

Variable Parameters

Example: The following command changes the NetScreen device hostname to ac

set hostname acme

string Sets the name of the NetScreen device.

Page 239: netscreen_CLI

“config” through “interface”

223

igmprotocol) messages, display

formation.

r | all }

NetScreen CLI Reference Guide

Description: Use the igmp command to send IGMP (Internet Group Management PIGMP settings and monitor IGMP states on a NetScreen device, or to clear IGMP in

Syntax

exec

exec igmp interface interface{

query [ mcst_addr [ s_bit ] [ ip_addr ] ] | report mcst_addr | leave mcst_addr }

get

get igmp{configgroup [ ip_addr [ source ] ] [ all ] |interface [ all ] |source ip_addr [ all ] |statistic [ all ]

}

clear

clear igmp interface interface { statistic | group mcast_add

Page 240: netscreen_CLI

“config” through “interface”

224

isplay information for all multicast

IGMP messages for the specified

NetScreen CLI Reference Guide

Keywords and Variables

config

get igmp config

group

get igmp group [ mcast_addr | all ]

interface

exec igmp interface interface { . . . }get igmp interface [ all ]

clear igmp interface interface statistic

clear igmp interface interface group mcast_addr | all

config Displays the configuration settings for IGMP.

group Displays information for the multicast group specified. Specify all to dgroups.

interface Displays and clears statistics or multicast groups. You can also sendinterface.

Page 241: netscreen_CLI

“config” through “interface”

225

ip_addr ] ]

from interface ethernet4:

lticast group:

ecute this command if the

ress, the interface sends a pecify a multicast group address, .0.0.1).

t they are to suppress the normal

command if the interface is in host

NetScreen CLI Reference Guide

leave

exec igmp interface interface leave mcst_addr

query

exec igmp interface interface query [ mcst_addr [ s_bit ] [

Example: The following command sends a general query to the “all hosts” group

exec igmp interface ethernet4 query

report

exec igmp interface interface report mcst_addr

Example: The following command sends a membership report to the specified mu

leave Sends a leave message for the specified multicast group. You can exinterface is in host mode only.

query Sends an IGMP query message. If you specify a multicast group addgroup-specific query to the specified multicast group. If you do not sthen the interface sends a general query to the “all hosts” group (224For IGMPv3, you can specify the following:

• s_bit: Specify this keyword to indicate to other multicast routers thatimer updates they perform when they hear a query.

• ip_addr: You can specify a source address.

Enter this command only if the interface is in router mode.

report Sends an IGMP membership report to the specified group. Enter this mode.

Page 242: netscreen_CLI

“config” through “interface”

226

e is in router mode.

NetScreen CLI Reference Guide

exec igmp interface ethernet4 report 224.2.1.1

source

get igmp source ip_addr [ all ]

statistic

get igmp statistic [ all ]

clear igmp interface interface statistic

source Displays <$$$ description TBD $$$>

statistic Displays or clears IGMP statistics. Enter this command if the interfac

Page 243: netscreen_CLI

“config” through “interface”

227

iked the gateway for an AutoKey

otiation are required:

te the IPSec SAs.

thenticating the ensuing

en device establishes the VPN

] ] |

NetScreen CLI Reference Guide

Definition: Use the ike commands to define the Phase 1 and Phase 2 proposals anIKE (Internet Key Exchange) VPN tunnel, and to specify other IKE parameters.

To establish an AutoKey IKE IPSec tunnel between peer devices, two phases of neg

• In Phase 1, the peer devices establish a secure channel in which to negotia

• In Phase 2, the peer devices negotiate the IPSec SAs for encrypting and auexchanges of user data.

The gateway definition identifies the devices or remote users with which the NetScretunnel.

Syntax

exec

exec ike preshare-gen name_str usr_str

get

get ike{accept-all-proposal |ca-and-type |cert |conn-entry |cookies |gateway [ name_str ] |heartbeat |id-mode |initial-contact [ all-peers | single-gateway [ name_str initiator-set-commit |member-sa-hold-time |

Page 244: netscreen_CLI

“config” through “interface”

228

NetScreen CLI Reference Guide

p1-max-dialgrp-sessions |p1-proposal name_str |p1-sec-level |p2-proposal name_str |p2-sec-level |policy-checking |respond-bad-spi |responder-set-commit |soft-lifetime-buffer}

set

Phase 1 Proposal

set ike p1-proposal name_str[ dsa-sig | rsa-sig | preshare ]

[ group1 | group2 | group5 ]{ esp

{ 3des | des | aes128 | aes192 | aes256{ md5 | sha-1

[days number |hours number |minutes number |seconds number]

}}

}

Page 245: netscreen_CLI

“config” through “interface”

229

|

NetScreen CLI Reference Guide

Phase 2 Proposal

set ike p2-proposal name_str[ group1 | group2 | group5 | no-pfs ]

{esp [ 3des | des | aes128 | aes196 | aes256 | null ] ah}

[ md5 | null | sha-1[days number |hours number |minutes number |seconds number ]]

[ kbyte number ]]

}

Gateway Tunnel

set ike gateway name_str{address { ip_addr | hostname[.dom_name ] [ id ] }dialup { usr_str | grp_name } |dynamic

{string |asn1-dn { [ container string ] [ wildcard string ] |fqdn string |ip-addr string |u-fqdn string} |

}[ aggressive | main ] [ local-id id_str ]

[ outgoing-interface interface

Page 246: netscreen_CLI

“config” through “interface”

230

_str ]

tandard } |

ame_str4 ]

NetScreen CLI Reference Guide

[ outgoing-zone zone ]]

[ preshare key_str | seed-preshare key{sec-level { basic | compatible | sproposal name_str1

[ name_str2 ] [ name_str3 ] [ n}

IKE Heartbeat

set ike gateway name_str heartbeat{hello number |threshold number |reconnect number}

Certificates

set ike gateway name_str cert{my-cert id_num |peer-ca [ id_num | all ] |peer-cert-type { pkcs7 | x509-sig }}

NAT-Traversal

set ike gateway name_str nat-traversal[udp-checksum |keepalive-frequency number]

Page 247: netscreen_CLI

“config” through “interface”

231

rd name_str |

p name_str ] |

er } |

NetScreen CLI Reference Guide

XAuth

set ike gateway name_str xauth[ client { any | chap | securid } username name_str passwoserver name_str

[ chap ] [ query-config ] [ user name_str | user-groubypass-auth]

Other IKE Command Switches

set ike{accept-all-proposal |id-mode { ip | subnet } |initial-contact

[all-peers |single-gateway name_str] |

initiator-set-commit |member-sa-hold-time number |p1-max-dialgrp-sessions { count number | percentage numbpolicy-checking |respond-bad-spi spi_num |responder-set-commit |single-ike-tunnel name_str |soft-lifetime-buffer number}

Page 248: netscreen_CLI

“config” through “interface”

232

NetScreen CLI Reference Guide

unset

unset ike{accept-all-proposal |gateway name_str

[heartbeat { hello | reconnect | threshold } |my-cert |nat-traversal [ udp-checksum ] |peer-ca |peer-cert-type |xauth] |

heartbeat { hello | reconnect | threshold } |initial-contact |initiator-set-commit |member-hold-sa |p1-max-dialgrp-sessions |p1-proposal name_str |p2-proposal name_str |policy-checking |respond-bad-spi |responder-set-commit |single-ike-tunnel name_str}

Page 249: netscreen_CLI

“config” through “interface”

233

f a remote IKE gateway named l as compatible1:

wq sec-level compatible

y default, the device accepts only This command is primarily useful

s, or as a hostname, or a in name). Use this option to set up t the NetScreen device cannot d.

-3des-md5, pre-g2-des-sha, and

NetScreen CLI Reference Guide

Keywords and Variables

accept-all-proposal

get ike accept-all-proposalset ike accept-all-proposalunset ike accept-all-proposal

address

set ike gateway address { ip_addr | name_str } { ... }

Example: The following command specifies www.netscreen.com as the address ons1, define the preshared key as 7a850wq, and specify the Phase 1 security leve

set ike gateway ns1 address www.netscreen.com preshare 7a850

accept-all-proposal Directs the NetScreen device to accept all incoming proposals. Bthose proposals matching predefined or user-defined proposals.when troubleshooting AutoKey IKE tunnels.

address Defines the remote IKE gateway address either as an IP addresfully-qualified domain name (FQDN, which is a hostname + domaa site-to-site VPN. Note: If you specify a hostname or FQDN tharesolve to an IP address, the IKE gateway is classified as disable

1. The compatible security level for Phase 1 negotiations includes the following four proposals: pre-g2-3des-sha, pre-g2pre-g2-des-md5.

Page 250: netscreen_CLI

“config” through “interface”

234

ig

sive mode only when you need to peer unit has a dynamically

xchange method because it .

icate types.

recipient.

e local NetScreen device has

ority).

of certificate (PKCS7 or X509).

e inserts them in any certificate ertificates, these values help the

NetScreen CLI Reference Guide

aggressive | main

set ike gateway name_str { ... } aggressive [ ... ]set ike gateway name_str { ... } main [ ... ]

ca-and-type

get ike ca-and-type

cert

get ike certset ike gateway name_str cert my-cert id_numset ike gateway name_str cert peer-ca [ id_num | all ]set ike gateway name_str cert peer-cert-type { pkcs7 | 509-s

aggressive | main Defines the mode used for Phase 1 negotiations. Use Aggresinitiate an IKE key exchange without ID protection, as when aassigned IP address. Main mode is the recommended key-econceals the identities of the parties during the key exchange

ca-and-type Displays the supported certificate authorities (CAs) and certif

cert Uses a digital certificate to authenticate the VPN initiator and

gateway name_str cert Specifies which certificates to use.

• my-cert name_str Specifies a particular certificate when thmultiple loaded certificates.

• peer-ca name_str Specifies a preferred CA (certificate auth

• peer-cert-type { pkcs7 | x509 } Specifies a preferred type

If you set the peer-ca and peer-cert-type values, the devicrequest it sends to the peer. If the peer has multiple local cpeer select a certificate.

Page 251: netscreen_CLI

“config” through “interface”

235

]

eer-cert-type settings to check

peer-ca CA. However, if the peer device searches local memory for the device accepts the peer certificate issued by a different CA.

ookies.

se this option to set up a dialup specify dialup group attributes,

NetScreen CLI Reference Guide

conn-entry

get ike conn-entry

cookies

get ike cookies

dialup

set ike gateway name_str dialup { usr_str | grp_name } [ ...

Note: The NetScreen device does not use the peer-ca or pcertificates received from the peer.

If possible, the peer should send a certificate issued by thesends a certificate issued by a different CA, the NetScreen the certificate of the issuing CA; if the search is successful,certificate. If the search is unsuccessful, the device uses a

conn-entry Displays the Connection Entry Table.

cookies Displays the cookie table, and the total number of dead and active c

dialup Identifies an IKE dialup user (usr_str) or dialup group (grp_name). UVPN. To specify a user’s attributes, use the set user command. (Touse the set user-group command.)

Page 252: netscreen_CLI

“config” through “interface”

236

ress. Use this option to set up a

The container switch treats string

@acme.com).

.s before the NetScreen device

n device considers the connection way.

NetScreen CLI Reference Guide

dynamicset ike gateway name_str dynamic { ... } [ ... ]

gatewayget ike gatewayset ike gateway name_str { ... } [ ... ]unset ike gateway { ... }

heartbeatget ike heartbeatset ike gateway name_str heartbeat { ... }unset ike gateway heartbeat { ... }

dynamic Specifies the identifier for the remote gateway with a dynamic IP addVPN with a gateway that has an unspecified IP address.

• string A string you can use as a peer ID.

• asn1-dn [ container ] [ wildcard ] string The ASN1 domain name. as a container. The wildcard switch treats string as a wild card.

• fqdn The fully-qualified domain name (such as www.acme.com).

• ip_addr string The IP address of the remote gateway interface.

• u-fqdn string The user fully-qualified domain name (such as admin

gateway Configures or displays settings for a remote tunnel gateway.

heartbeat Specifies the IKE heartbeat protocol parameters.• hello number Sets the IKE heartbeat protocol interval (in seconds)• reconnect number Sets the quiet interval (in seconds) that elapse

reconnects a failed tunnel.• threshold number Sets the number of retries before the NetScree

lost and removes all Phase 1 and Phase 2 keys related to this gate

Page 253: netscreen_CLI

“config” through “interface”

237

r ]

P) address or a gateway (subnet). se the subnet switch, the device

tunnel between a NetScreen tch.)

n IKE peer.

As, then send an initial contact

ce to delete all SAs associated tion.

an initial contact notification to all

e commit bit in the ISAKMP does not use the new IPSec SA

NetScreen CLI Reference Guide

id-modeget ike id-modeset ike id-mode ipset ike id-mode subnet

initial-contactget ike initial-contactset ike initial-contact [ all-peers | single-gateway name_stunset ike initial-contact

initiator-set-commit

get ike initiator-set-commitset ike initiator-set-commitunset ike initiator-set-commit

id-mode Defines the IKE ID mode in the Phase 2 exchange as either a host (IIf you use the ip switch, the device sends no Phase 2 ID. If you choosends proxy Phase 2 IDs. (Use the ip switch when setting up a VPNdevice and a CheckPoint 4.0 device. Otherwise, use the subnet swi

initial-contact Determines how the NetScreen device performs initial contact with a

• Specifying all-peers instructs the NetScreen device to delete all Snotification to each IKE peer.

• Specifying single-gateway name_str instructs the NetScreen deviwith the specified IKE gateway, then send an initial contact notifica

If you specify none of the above options, the NetScreen device sendspeers during the first IKE single-user session after a system reset.

initiator-set-commit When the NetScreen device performs as an IKE initiator, sets thheader. The party who sends the last message in the exchange until it receives confirmation from the other party.

Page 254: netscreen_CLI

“config” through “interface”

238

. }

umber

e sends this ID to the remote

he distinguished name in the local ckets):

u may need to specify which

allocated for a dialup user.

mission of encrypted traffic feature encapsulates ESP g ESP packet headers in transit,

tion (used for UDP packet

ich the NetScreen device sends

NetScreen CLI Reference Guide

local-idset ike gateway name_str { ... } local-id id_str [ ... ] { ..

member-sa-hold-timeget ike member-sa-hold-timeset ike member-sa-hold-time numberunset ike member-hold-sa

nat-traversal

set ike gateway name_str nat-traversal udp-checksumset ike gateway name_str nat-traversal keepalive-frequency nunset ike gateway name_str nat-traversal [ ... ]

local-id Defines the IKE NetScreen identity of the local device. The devicgateway during IKE negotiation.To instruct the NetScreen device to derive the IKE identity from tcertificate, specify the following for local-id (including square bra[DinstinguishedName]If there is more than one certificate on your NetScreen device, yocertificate to use (for more information, see “cert” on page 234).

member-sa-hold-time The length of time (in minutes) the device keeps an unused SA

nat-traversal Enables or disables IPsec NAT Traversal, a feature that allows transthrough a NetScreen device configured for NAT. The NAT Traversalpackets into UDP packets. This prevents the NAT device from alterinthus preventing authentication failure on the peer NetScreen device.• udp-checksum enables the NAT-Traversal UDP checksum opera

authentication).• keepalive-frequency specifies the frequency (in seconds) with wh

NAT-traversal keepalive messages.

Page 255: netscreen_CLI

“config” through “interface”

239

mktg:

e [ ... ]

r an IKE gateway named on the word “scramble”, and gotiations.)

ethernet3 preshare

IKE traffic for this gateway.

lup groups.

NetScreen CLI Reference Guide

Examples: The following command enables NAT traversal for a gateway named

set ike gateway mktg nat-traversal

The following command sets the Keepalive setting to 25 seconds:

set ike gateway mktg nat-traversal keepalive-frequency 25

outgoing-interface

set ike gateway name_str { ... } outgoing-interface interfac

Example: The following command specifies ethernet3 as the outgoing interface foParis_Gateway at IP address 2.2.2.2. (Authentication uses a preshared key basedthe Phase 1 proposals are those for the “compatible” security level for Phase 1 ne

set ike gateway Paris_Gateway ip 2.2.2.2 outgoing-interface scramble sec-level compatible

p1-max-dialgrp-sessions

get ike p1-max-dialgrp-sessionsset ike p1-max-dialgrp-sessions count numberset ike p1-max-dialgrp-sessions percentage numberunset ike p1-max-dialgrp-sessions

outgoing-interface Defines the interface through which the NetScreen device sends

p1-max-dialgrp-sessions Displays the allowed concurrent Phase 1 negotiations for dia

Page 256: netscreen_CLI

“config” through “interface”

240

ating and exchanging session

the source of IKE messages. nd decryption that both

d dsa-sig refer to two kinds of the certificate holder. (The default

chnique that allows two parties to nternet. Group2 is the default

ides encryption and

gorithm.

in ESP protocol. The default

ttempt to renegotiate a Phase 1 ds. The default lifetime is 28800

NetScreen CLI Reference Guide

p1-proposal

get ike p1-proposal name_strset ike p1-proposal name_str [ ... ] { ... }unset ike p1-proposal name_str

p1-proposal Names the IKE Phase 1 proposal, which contains parameters for crekeys and establishing Phase 1 security associations.

• dsa-sig | rsa-sig | preshare Specifies the method to authenticate preshare refers to a preshared key, which is a key for encryption aparticipants have before beginning tunnel negotiations. rsa-sig andigital signatures, which are certificates that confirm the identity of method is preshare.)

• group1 | group2 | group5 Identifies the Diffie-Hellman group, a tenegotiate encryption keys over an insecure medium; such as, the Igroup.

• esp Specifies Encapsulating Security Payload protocol, which provauthentication.

• des | 3des | aes128 | aes192 | aes256 Specifies the encryption al

• md5 | sha-1 Specifies the authentication (hashing) algorithm usedalgorithm is SHA-1, the stronger of the two algorithms.

• The following parameters define the elapsed time between each asecurity association. The minimum allowable lifetime is 180 seconseconds.

- days number

- hours number

- minutes number

- seconds number

Page 257: netscreen_CLI

“config” through “interface”

241

gorithms

3

of security level.

of security level.

for creating and exchanging a

vice generates the encryption key. w encryption key independently

E generates the Phase 2 key from he Diffie-Hellman groups, IKE efault is Group 2.

NetScreen CLI Reference Guide

Example: The following command defines a Phase 1 proposal named sf1.

• Preshared key and a group 1 Diffie-Hellman exchange

• Encapsulating Security Payload (ESP) protocol using the 3DES and MD5 al

• Lifetime of 3 minutes

set ike p1-proposal sf1 preshare group1 esp 3des md5 minutes

p1-sec-level

get ike p1-sec-level

p2-sec-level

get ike p2-sec-level

p2-proposal

get ike p2-proposal name_strset ike p2-proposal name_str [ ... ] { ... }set ike p2-proposal name_str

p1-sec-level Displays the predefined IKE Phase 1 proposals in descending order

p2-sec-level Displays the predefined IKE Phase 2 proposals in descending order

p2-proposal Names the IKE Phase 2 proposal. This proposal defines parameterssession key to establish a security association (SA).

• group1 | group2 | group5 | no-pfs Defines how the NetScreen dePerfect Forward Secrecy (PFS) is a method for generating each nefrom the previous key. Selecting no-pfs turns this feature off, so IKthe key generated in the Phase 1 exchange. If you specify one of tautomatically uses PFS when generating the encryption key. The d

Page 258: netscreen_CLI

“config” through “interface”

242

nutes 15

sulating Security Payload (ESP) ecifies the encryption algorithm

es authentication only.

used in ESP or AH protocol. The lt for FIPS mode. The null switch

ttempt to renegotiate a security efault lifetime is 28800 seconds.

ytes before NetScreen finity).

NetScreen CLI Reference Guide

Example: The following command specifies Phase 2 proposal g2-esp-3des-null.

• Group 2 Diffie-Hellman exchange

• ESP using 3DES without authentication

• Lifetime of 15 minutes

set ike p2-proposal g2-esp-3des-null group2 esp 3des null mi

• ah | esp In a Phase 2 proposal, identifies the IPSec protocol.

- esp [ des | 3des | aes128 | aes192 | aes256 ] Specifies Encapprotocol, which provides both encryption and authentication. Spused in ESP protocol. (The default protocol is des.)

- ah Specifies Authentication Header (AH) protocol, which provid

• md5 | null | sha-1 Specifies the authentication (hashing) algorithmdefault algorithm is MD5 for non-FIPS mode, and SHA is the defauspecifies no authentication.

• The following parameters define the elapsed time between each aassociation. The minimum allowable lifetime is 180 seconds. The d

- days number

- hours number

- minutes number

- seconds number

• kbytes number Indicates the maximum allowable data flow in kilobrenegotiates another security association. The default value is 0 (in

Page 259: netscreen_CLI

“config” through “interface”

243

nel” on page 251.

ing a connection. Use policy tunnels. Otherwise, the IKE is configured between two peers.

e 1 negotiation. In this mode, both ecryption key.

(If you use an RSA- or

NetScreen CLI Reference Guide

policy-checking

get ike policy-checkingset ike policy-checkingunset ike policy-checking

preshare

set ike p1-proposal name_str preshare [ ... ]

set ike gateway name_str { ... } [ ... ] preshare key_str

Example: For an example of this option, see “Setting Up a Policy-Based VPN Tun

policy-checking Checks to see if the policies of the two peers match before establishchecking when configuration on the peer gateways support multiple session fails. You can disable policy checking when only one policy

preshare Directs the device to use preshared kay authentication for IKE Phaspeer devices use a shared password to generate a encryption and d

preshare Specifies the Preshared key (key_str) used in the Phase 1 proposal.DSA-signature in the Phase 1 proposal, do not use this option).

Page 260: netscreen_CLI

“config” through “interface”

244

the user to a dialup user group. E ID values to establish secure

e.com.

r with IP address 1.1.110.200.

ciated with a Group IKE ID user. alue (specified in the command can use it to set up a

e the set ike gateway name_str

roup IKE ID user. To create such E ID user must be associated with

NetScreen CLI Reference Guide

preshare-gen

exec ike preshare-gen name_str usr_str

Example: The following commands create a single group IKE ID user and assign Then they create VPNs and policies that allow dialup users with matching partial IKcommunication through the NetScreen device.

• The name of the group IKE ID user is User1, with partial IKE identity of acm

• The number of dialup users that can share this user’s IKE identity is 10.

• The dialup user group is Office_1.

• The seed value for creating the preshared key is jk930k.

• The Phase 1 IKE gateway defined for the server side is Corp_GW.

• The Phase 2 VPN defined for the server side is Corp_VPN.

• The Phase 1 IKE gateway defined for the client side is Office_GW.

• The Phase 2 VPN defined for the client side is Office_VPN.

• The individual user’s full IKE identity is [email protected].

• The trusted server that dialup users access from the outside is a Web serve

preshare-gen Generates an individual preshared key for a remote dialup user assoThe NetScreen device generates each preshared key from a seed vset ike gateway). After the device generates the preshared key, youconfiguration for the remote user. (Remove any spaces.)

• name_str is the IKE gateway name. To create such a gateway, uscommand.

• usr_str is the full IKE ID of an individual user, which belongs to a Ga user, use the set user name_str ike-id command. The Group IKa dialup user group to support a group of users.

Page 261: netscreen_CLI

“config” through “interface”

245

hare jk930k

-md5

Corp_VPN

l-id [email protected] pre-g2-3des-md53des-md5

Office_VPN

nel” on page 251.

c57d3d30d7bf9b93baa2adcc6.

four Phase 1 proposals.

NetScreen CLI Reference Guide

set user User1 ike-id u-fqdn acme.com share-limit 10set user-group Office_1 user User1set ike gateway Corp_GW dialup Office_1 aggressive seed-pres

proposal pre-g2-3des-md5set vpn Corp_VPN gateway Corp_GW tunnel proposal g2-esp-3desset address trust http_server 1.1.110.200 255.255.255.255set policy incoming “dial-up vpn” http_server any tunnel vpn

To generate the preshared key for [email protected]:

exec ike preshare-gen Corp_GW [email protected]

On the client side:

set ike gateway Office_GW address 10.1.10.10 aggressive locapreshare c5d7f7c1806567bc57d3d30d7bf9b93baa2adcc6 propos

set vpn Office_VPN gateway Office_GW tunnel proposal g2-esp-set address untrust http_server 1.1.110.200set policy outgoing “inside any” http_server any tunnel vpn

proposal

set ike gateway name_str { ... } [ ... ] proposal name_str1 [ name_str2 ] [ name_str3 ] [ name_str4 ]

Example: For an example of this option, see “Setting Up a Policy-Based VPN Tun

Note: For this example, assume that this command generates c5d7f7c1806567b

proposal Specifies the name (name_str) of a proposal. You can specify up to

Page 262: netscreen_CLI

“config” through “interface”

246

patible:

. The specified number

KMP header when the device acts in the exchange does not use the r.

basic proposal provides he most widely-used settings. The n.

NetScreen CLI Reference Guide

respond-bad-spi

get ike respond-bad-spiset ike respond-bad-spi [ number ]unset ike respond-bad-spi

responder-set-commit

get ike responder-set-commitset ike responder-set-commitunset ike responder-set-commit

sec-level

set ike gateway name_str { ... } [ ... ] sec-level { ... }

Example: The following command specifies the pre-defined security proposal com

set vpn Corp_VPN gateway Corp_GW sec-level compatible

respond-bad-spi Responds to packets with bad security parameter index (SPI) valuesvalue is the number of times to respond to bad SPIs per gateway.

responder-set-commit Directs the NetScreen device to set the commit bit in the ISAas an IKE responder. The peer that sends the last message new IPSec SA until it receives information from the other pee

sec-level Specifies which pre-defined security proposal to use for IKE. Thebasic-level security settings. The compatible proposal provides tstandard proposal provides settings recommended by NetScree

Page 263: netscreen_CLI

“config” through “interface”

247

tr

p users in a user group:

o the Untrust zone

0k

ser2

hare jk930k

tunnel vpn Corp_VPN

y configurations. Such a ach with an individual preshared use the seed to generate the

NetScreen CLI Reference Guide

seed-preshare

set ike gateway name_str { ... } [ ... ] seed-preshare key_s

Example: The following commands configure IKE authentication for multiple dialu

• Interface ethernet1 bound to the Trust zone and interface ethernet3 bound t

• Dialup user named User2, placed in a user group named office_2

• Gateway configuration for office_2, with a preshared key seed value of jk93

• Security policy for all dialup users with the partial IKE identity specified for U

set interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24set address trust web1 10.1.1.5/32set user User2 ike-id u-fqdn netscreen.com share-limit 10set user-group office_2 user User2set ike gateway Corp_GW dialup office_2 aggressive seed-pres

sec-level compatibleset vpn Corp_VPN gateway Corp_GW sec-level compatibleset policy top from untrust to trust “Dial-Up VPN” web1 httpsave

seed-preshare Specifies a seed value (key_str) for a user group with Preshared Keconfiguration performs IKE authentication for multiple dialup users, ekey, without having a separate configuration for each user. Instead, preshared key with the exec ike preshare-gen command.

Page 264: netscreen_CLI

“config” through “interface”

248

er gateway gw1:

te peer gateway.

y lifetime expires. When this

ation.

only XAuth mode-config, which er settings.The XAuth client is not

NetScreen CLI Reference Guide

single-ike-tunnel

set ike single-ike-tunnel name_strunset ike single-ike-tunnel name_str

Example: The following command specifies a Phase 2 SA for all policies to the pe

set ike single-ike-tunnel gw1

soft-lifetime-buffer

get ike soft-lifetime-bufferset ike soft-lifetime-buffer number

xauth

set ike gateway name_str xauthunset ike gateway xauth

xauth bypass-auth

set ike gateway name_str xauth bypass-auth

single-ike-tunnel Specifies a single Phase 2 SA for all policies to a particular remo

soft-lifetime-buffer Sets a time interval (in seconds) before the current IPSec SA keinterval is reached, the device initiates the rekeying operation.

xauth Enables XAuth authentication for the specified IKE gateway configur

bypass-auth Instructs the NetScreen device, acting as an XAuth server, to performassigns the XAuth client with an IP address, and DNS and WINS servrequired to authenticate him or herself.

Page 265: netscreen_CLI

“config” through “interface”

249

} username name_str

d pubs123

ery-config ] [ user

cify the following authentication

ation Protocol (CHAP) only.

ly.

er.

er.

Auth authentication.

tion Protocol (CHAP).

from the server.

NetScreen CLI Reference Guide

xauth client

set ike gateway name_str xauth client { any | chap | securidpassword string

Example: The following example configures an XAuth client.

• Gateway kg1

• Any authentication type allowed

• Username kgreen and password pubs123

set ike gateway kg1 xauth client any username kgreen passwor

xauth server

set ike gateway name_str xauth server name_strset ike gateway name_str xauth server name_str [ chap ] [ qu

name_str | user-group name_str ]unset ike gateway xauth

client Specifies that the NetScreen device is an XAuth client. You can spetypes:

• any Instructs the device to allow any authentication type.

• chap Instructs the device to allow Challenge Handshake Authentic

• securid Instructs the device to allow authentication via SecurID on

username Specifies the username for the XAuth client to use on the XAuth serv

password Specifies the password for the XAuth client to use on the XAuth serv

server Specifies the object name of the external server that performs the X

• chap Instructs the device to use Challenge Handshake Authentica

• query-config Instructs the device to query the client configuration

Page 266: netscreen_CLI

“config” through “interface”

250

security association are 28,800

he data traffic is between two

posal.

r.

in a XAuth user group.

NetScreen CLI Reference Guide

Defaults

Main mode is the default method for Phase 1 negotiations.

The default time intervals before the NetScreen mechanism renegotiates another seconds in a Phase 1 proposal, and 3600 seconds in a Phase 2 proposal.

The default ID mode is subnet. (Changing the ID mode to IP is only necessary if tsecurity gateways, one of which is a CheckPoint 4.0 device.)

The default soft-lifetime-buffer size is 10 seconds.

By default, the single-ike-tunnel flag is not set.

By default, the commit bit is not set when initiating or responding to a Phase 2 pro

• user name_str Enables XAuth authentication for an individual use

• user-group name_str Enables XAuth authentication for the users

Page 267: netscreen_CLI

“config” through “interface”

251

requires up to seven steps. To steps below.

el:

lt proposals, you do not need to

ace ethernet3 preshare

host210.2.2.5/32

teway.2.2

tScreen-B

ntrust Zone

NetScreen CLI Reference Guide

Setting Up a Policy-Based VPN Tunnel

Creating a policy-based VPN tunnel for a remote gateway with a static IP addressset up NetScreen-A at one end of a VPN tunnel for bidirectional traffic, follow the

1. Bind interfaces to zones and assign them IP addresses:

set interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

2. Set the addresses for the end entities beyond the two ends of the VPN tunn

set address trust host1 10.1.1.5/32set address untrust host2 10.2.2.5/32

3. Define the IKE Phase 1 proposal and Phase 2 proposal. If you use the defaudefine Phase 1 and Phase 2 proposals.

4. Define the remote gateway:

set ike gateway gw1 address 2.2.2.2 main outgoing-interfnetscreen proposal pre-g2-3des-sha

5. Define the VPN tunnel as AutoKey IKE:

set vpn vpn1 gateway gw1 proposal g2-esp-des-md5

host110.1.1.5/32

ethernet110.1.1.1/24

ethernet31.1.1.1/24

Remote Ga“gw1”, 2.2

vpn1NetScreen-A Ne

UTrust Zone

Page 268: netscreen_CLI

“config” through “interface”

252

ng domain):

gateway 1.1.1.250

vpn vpn1vpn vpn1

tes up to seven steps.

ss through the tunnel. (See the

Note: If you use the default

ng domain).

VPN tunnel you configured in

NetScreen CLI Reference Guide

6. Set a default route (both the Trust and Untrust zones are in the trust-vr routi

set vrouter trust-vr route 0.0.0.0/0 interface ethernet3

7. Set outbound and inbound policies:

set policy from trust to untrust host1 host2 any tunnel set policy from untrust to trust host2 host1 any tunnel

The procedure for setting up a VPN tunnel for a dialup user with IKE also constitu

1. Bind interfaces to zones and assign them IP addresses.

2. Define the protected address that you want the dialup user to be able to acceset address command.)

3. Define the user as an IKE user. (See the set user command.)

4. Define the IKE Phase 1 proposal, Phase 2 proposal, and remote gateway. (proposals, you do not need to define a Phase 1 or Phase 2 proposal.)

5. Define the VPN tunnel as AutoKey IKE. (See the set vpn command.)

6. Set a default route (both the Trust and Untrust zones are in the trust-vr routi

7. Define an incoming policy, with Dial-Up VPN as the source address and thestep 5.

Page 269: netscreen_CLI

“config” through “interface”

253

ike-cookie NetScreen device.

0.1.10.10:

s (ip_addr).

NetScreen CLI Reference Guide

Description: Use the ike-cookie command to remove IKE-related cookies from the

Syntax

clear

clear [ cluster ] ike-cookie { all | ip_addr }

Keywords and Variables

Variable Parameter

clear cluster ike-cookie ip_addrclear ike-cookie ip_addr

Example: The following command removes all cookies based on the IP address 1

clear ike-cookie 10.1.10.10

all

clear cluster ike-cookie allclear ike-cookie all

ip_addr Directs the NetScreen device to remove cookies based on a IP addres

all Directs the NetScreen device to remove all cookies.

Page 270: netscreen_CLI

“config” through “interface”

254

NetScreen CLI Reference Guide

cluster

clear cluster ike-cookie allclear cluster ike-cookie ip_addr

cluster Propagates the clear operation to all other devices in a NSRP cluster.

Page 271: netscreen_CLI

“config” through “interface”

255

interface a NetScreen device.

work (VPN), High Availability on a NetScreen device, see

NetScreen CLI Reference Guide

Description: Use the interface commands to define or display interface settings for

Interfaces are physical or logical connections that handle network, virtual private net(HA), and administrative traffic. For a description of the interfaces you can configure“Interface Names” on page A-I.

Syntax

get

get interface interface[dhcp

{client |relay |server

{ip { allocate | idle } |option}

} |dip |mip |protocol

{ospf |rip [ neighbor ip_addr ] |igmp

[config |group [ ip_addr [ source ] ] [ all ] ] |

Page 272: netscreen_CLI

“config” through “interface”

256

ssl | telnet | web } |

NetScreen CLI Reference Guide

source |statistic [ all ] |]

pim [ statistics ] }screen |secondary [ ip_addr ] |track-ip [ ip ]]

set (Layer-3 Interfaces)

set interface interface{bandwidth number |dip

{interface-ip incoming |id_num

{ip_addr1 [ ip_addr2 ] |shift-from ip_addr3 [ to ip_addr4 [ ip_addr5 ] ]}

[ fix-port | incoming ] |[ ext ip ip_addr/mask ] dip id_num

{ip_addr1 |shift-from ip_addr2 to ip_addr3} [ ip_addr4 ] [ fix-port | incoming ] |

gateway ip_addr [ no-default-route ] |group |ip { ip_addr/mask | manageable } |manage

{ ident-reset | nsmgmt| mtrace | ping | snmp | ssh | manage-ip ip_addr |

Page 273: netscreen_CLI

“config” through “interface”

257

_str ] |

] |

elnet | web } |

NetScreen CLI Reference Guide

mip ip_addr host ip_addr [ netmask mask ] [ vrouter namemtu number |nat |phy

{auto |full { 10mb | 100mb } |half { 10mb | 100mb } |holddown number |link-down} |

route |route-deny |tag id_num zone zone |vip ip_addr [ + ] port_num [ name_str ip_addr [ manual ]webauth [ ssl-only ] |webauth-ip ip_addr |zone zone}

set (Layer-2 Interfaces)

set interface interface{manage { ident-reset | nsmgmt ping | nmp | ssh | ssl | tphy

{auto |full { 10mb | 100mb } |half { 10mb | 100mb } |holddown number |link-down} |

webauth}

Page 274: netscreen_CLI

“config” through “interface”

258

pn } |

ing string } | | pop3 | smtp

NetScreen CLI Reference Guide

set (Sub-Interfaces)

set interface interface.id_num{encap pppoe |tag number zone zone}

set (DHCP Relay/Server)

set interface interface dhcp{relay { server-name { name_str | ip_addr } | service | vserver

{enable | auto | disable |ip ip_addr { mac mac_addr | to ip_addr } |option

{custom id_num { integer number | ip ip_addr | strdns1 | dns2 | dns3 | gateway | news | nis1 | nis2

{ ip_addr } |domainname name_str |lease number |netmask mask |nistag name_str |wins1 ip_addr |wins2 ip_addr |} |

service}

}

Page 275: netscreen_CLI

“config” through “interface”

259

NetScreen CLI Reference Guide

set (DHCP Client)

set interface interface dhcp client{enable |settings

{autoconfig |lease number |server ip_addr |update-dhcpserver |vendor id_str}

}

set (High Availability)

set interface { ha | ha1 | ha2 }{bandwidth number |phy

{auto |full { 10mb | 100mb } |half { 10mb | 100mb } |

Page 276: netscreen_CLI

“config” through “interface”

260

NetScreen CLI Reference Guide

holddown number |link-down} |

}

set (IP Tracking)

set interface interface track-ip[dynamic |ip ip_addr

[interval number |threshold number |weight number] |

threshold number]

set (Loopback Interface)

set interface interface loopback-group interface

set (BGP)

set interface interface protocol bgp

set (OSPF)

set interface interface protocol ospf{area { ip_addr | number } |authentication

{active-md5-key-id id_num |

Page 277: netscreen_CLI

“config” through “interface”

261

NetScreen CLI Reference Guide

md5 key_str [ key-id id_num ] |password pswd_str} |

cost number |dead-interval number |enable |hello-interval number |ignore-mtu |link-type { p2mp | p2p } |neighbor-list number |passive |priority number |reduce-flooding |retransmit-interval number |transit-delay number}

set (RIP)

set interface interface protocol rip[authentication

{active-md5-key-id id_num |md5 key_str [ key-id id_num ] |password pswd_str} |

enable |metric number |neighbor { ip_addr } |passive-mode |receive-version { v1 | v1v2 | v2 } |route-map name_str |

Page 278: netscreen_CLI

“config” through “interface”

262

|

NetScreen CLI Reference Guide

send-version { v1 | v1v2 | v2 } |split-horizon [ poison-reverse ]summary-enable]

set (IGMP Host)

set interface interface protocol igmp hostset interface interface protocol igmp

{enable |host |join-group ip_addr |no-check-router-alert |no-check-subnet |router |static-group ip_addr}

set (IGMP Router)

set interface interface protocol igmp routerset interface interface protocol igmp

{accept { hosts id_num | groups id_num | routers id_num }enable |join-group ip_addr |last-member-query-interval number |leave-interval number |no-check-router-alert |no-check-subnet |proxy [ always ] |query-interval number |

Page 279: netscreen_CLI

“config” through “interface”

263

NetScreen CLI Reference Guide

query-max-response-time number |static-group ip_addr |version { 1 | 2 }}

set (PIM)

set interface interface protocol pim[boot-strap-border |dr-priority number |enable |hello-interval number |join-prune-interval number |neighbor-policy number]

set (Tunnel)

set interface tunnel.number{dip id_num

{ip_addr1

[ ip_addr2 ] [ fix-port ] |shift-from ip_addr3} |

[ ext ip ip_addr/mask ] dip id_num{ip_addr1 [ ip_addr2 ] [ fix-port ] |shift-from ip_addr3} |

Page 280: netscreen_CLI

“config” through “interface”

264

NetScreen CLI Reference Guide

ip { ip_addr/mask | unnumbered interface interface } |2

loopback-group |manage-ip ip_addr |mip ip_addr host ip_addr

[ netmask mask [ vrouter name_str ] ] |mtrace |mtu number |nhtb ip_addr vpn tunn_str |protocol

{ bgp | ospf [ demand-circuit ] | rip [ demand-circuit ] |igmp | pim } |

proxy dns |route-deny |tunnel

{encap gre [ key ] |keep-alive [ interval number | threshold number ] |local-if interface dst-ip ip_addr} |

zone name_str }

2. Use the IP option only after adding the tunnel to a specific zone.

Page 281: netscreen_CLI

“config” through “interface”

265

| pop3 | smtp |

NetScreen CLI Reference Guide

unset (vlan1 interface)

unset interface interface{broadcast [ arp [ trace-route ] ] |bypass-non-ip | | bypass-non-ip-all |bypass-others-ipsec}

unset (DHCP Relay/Server)

unset interface interface dhcp{relay { server-name { name_str | ip_addr } |server

{ip { ip_addr | all } |option

{dns1 | dns2 | dns3 | gateway | news | nis1 | nis2domainname |lease |netmask |nistag |wins1 |wins2}

service}

}

Page 282: netscreen_CLI

“config” through “interface”

266

ssl | telnet | web } |

NetScreen CLI Reference Guide

unset (DHCP Client)

unset interface interface dhcp client{enable |settings

{autoconfig |lease |server |update-dhcpserver |vendor}

}

unset

unset interface interface{bandwidth |[ ext ip ip_addr mask ] dip number |group |ip [ ip_addr ] |loopback-group interface |manage

{ ident-reset | nsmgmt | mtrace | ping | snmp | ssh |manage-ip |mip ip_addr1 host ip_addr2 [ netmask mask ] |mtrace |mtu |mtu |nhtb ip_addr |phy

{auto |

Page 283: netscreen_CLI

“config” through “interface”

267

num ] } |

num ] } |

NetScreen CLI Reference Guide

full { 10mb | 100mb } |half { 10mb | 100mb } |holddown |link-down}

protocol ospf{area |authentication { active-md5-key-id | md5 [ key-id id_cost |dead-interval |demand-circuit |enable |hello-interval |ignore-mtu |link-type [ p2mp | p2p ] |neighbor-list |passive |priority |reduce-flooding |retransmit-interval |transit-delay} |

protocol rip{authentication { active-md5-key-id | md5 [ key-id id_demand-circuit |enable |metric |neighbor |passive-mode |receive-version |route-map |send-version |split-horizon [ poison-reverse ] |

Page 284: netscreen_CLI

“config” through “interface”

268

pn }

NetScreen CLI Reference Guide

summary-enable} |

route-deny |track-ip

[dynamic | ip ip_addr [ interval | threshold | weight ] |threshold]

vlan trunk |webauth |webauth-ip |zone}

unset (DHCP)

unset interface interface dhcp{relay { server-name { name_str | ip_addr } | service | vserver

{ip ip_addroption

{dns1 | dns2 | dns3 |domainname |gateway }lease |news |netmask |nis1 | nis2nistag |pop3 |smtp |

Page 285: netscreen_CLI

“config” through “interface”

269

eer (1.1.1.25) for the ethernet4

nd for interface ethernet4:

, see “Interface Names” on page

ffic traversing the specified

NetScreen CLI Reference Guide

wins1 |wins2}

service}

}

Keywords and Variables

Variable Parameter

get interface interface [ ... ]set interface interface { ... } [ ... ]

Example: The following command specifies the IP address of a remote gateway pinterface:

set interface ethernet4 gateway 1.1.1.25

bandwidth

set interface interface bandwidth numberunset interface interface bandwidth

Example: The following command specifies bandwidth of 10,000 kilobits per seco

set interface ethernet4 bandwidth 10000

interface The name of the interface. For more information on interface namesA-I.

bandwidth The guaranteed maximum bandwidth in kilobits per second for all trainterface.

Page 286: netscreen_CLI

“config” through “interface”

270

e ] }

ress Resolution Protocol (ARP)

s reachability of other devices

an unknown host out to all might attempt to copy frames out g network bandwidth.

ddress Resolution Protocol (ARP) ss, the device loads its ARP table this entry to reach the destination s saving bandwidth. Generating

ast MAC destination address to P is a special case for non-IP

rops all the non-IP packet with

NetScreen CLI Reference Guide

broadcast

set interface interface broadcast { flood | arp [ trace-routunset interface interface broadcast [ arp [ trace-route ] ]

Example: The following command instructs the NetScreen device to generate an Addbroadcast:

set interface vlan1 broadcast arp

bypass-non-ip

set interface interface bypass-non-ipunset interface interface bypass-non-ip

broadcast (vlan1 interface only.) Controls how the NetScreen device determinewhile the device is in transparent (L2) mode.

• flood Instructs the NetScreen device to flood frames received frominterfaces that are in transparent mode. In the process, the deviceof ports that cannot access the destination address, thus consumin

• arp [ trace-route ] Instructs the NetScreen device to generate an Abroadcast. If the broadcast finds the unknown destination IP addrewith the appropriate MAC address and interface. The device uses device directly, and only sends frames through the correct port, thuthe initial ARP can cause delay, but only for the first frame.

bypass-non-ip (vlan1 interface only.) Allows non-IP traffic (such as IPX) with a unicpass through a NetScreen device running in Transparent mode. (ARtraffic. It is always passed, even if when this feature is disabled.)Executing the unset interface interface bypass-non-ip command dunicast MAC destination address.but non-ip with multicast mac address will still pass through.

Page 287: netscreen_CLI

“config” through “interface”

271

non-IP traffic to pass through a al case for non-IP traffic. It is

s all non-IP packets, regardless of

NetScreen device in tunnel gateway but

NetScreen CLI Reference Guide

bypass-non-ip-allset interface interface bypass-non-ip-allunset interface interface bypass-non-ip-all

bypass-others-ipsec

set interface interface bypass-others-ipsecunset interface interface bypass-others-ipsec

dhcp clientset interface interface dhcp client

{enable |settings

{autoconfig |lease number |server ip_addr |update-dhcpserver | vendor id_str } }

bypass-non-ip-all (vlan1 interface only.) Allows non-broadcast, non-multicast, andNetScreen device running in Transparent mode. (ARP is a specialways passed, even if when this feature is disabled.)Executing the unset interface interface bypass-non-ip-all dropthe MAC destination address.

bypass-others-ipsec (vlan1 interface only.) Openly passes all IPSec traffic through a Transparent mode. The NetScreen device does not act as a VPNpasses the IPSec packets onward to other gateways.

Page 288: netscreen_CLI

“config” through “interface”

272

omatic DHCP configuration

P client module on the Untrust

r-up.

client module on the specified the Trust zone. Note: On devices fault interface is the first interface

NetScreen CLI Reference Guide

Examples: The following command configures interface ethernet3 to perform autafter device power-up:

set interface ethernet3 dhcp client settings autoconfig

The following command enables (the forwarding of TCP/IP settings from the DHCinterface to the DHCP server module on the Trust zone interface):

set interface untrust dhcp client settings update-dhcpserver

dhcp client Configures an interface for DHCP client services.

• enable Enables DHCP client services for the interface.

• settings Configures DHCP parameters for the interface.

- autoconfig Enables automatic configuration after device powe

- lease number Sets the default lease time (in minutes).

- server ip_addr Specifies the IP address of the DHCP server.

- update-dhcpserver Forwards TCP/IP settings from the DHCPinterface to the DHCP server module on the default interface inthat can have multiple interfaces bound to the Trust zone, the debound to that zone and assigned an IP address.

- vendor id_str Specifies the DHCP vendor by ID.

Page 289: netscreen_CLI

“config” through “interface”

273

| ip_addr } | service

server at IP address 1.1.1.10:

can serve as a DHCP relay agent.

HCP server from which the that it relays to hosts on the LAN.

ent through the interface.

nel. You must first set up a VPN er.

CP server already running on the en device is disabled. If there is no Screen device is enabled. This is

NetScreen CLI Reference Guide

dhcp relay

get interface interface dhcp relayset interface interface dhcp relay

{ server-name name_str | service | vpn }unset interface interface dhcp relay { server-name { name_str

| vpn }

The relay does not coexist with the DHCP server (OK with the client).

Example: The following configures interface ethernet4 to use an external DHCP

set interface ethernet4 dhcp relay server-name 1.1.1.10

dhcp server

set interface interface dhcp server { ... }unset interface interface dhcp server { ... }

dhcp relay Configures the NetScreen interface such that the NetScreen device

• server-name name_str Defines the domain name of the external DNetScreen device receives the IP addresses and TCP/IP settings

• service Enables the NetScreen device to act as a DHCP server ag

• vpn Allows the DHCP communications to pass through a VPN tuntunnel between the NetScreen device and the external DHCP serv

dhcp server Makes the NetScreen interface work as a DHCP server.

• auto Instructs the NetScreen device to check to see if there is a DHnetwork. If there is such a server, the DHCP server on the NetScreDHCP server running on the network, the DHCP server on the Netthe default mode.

• disable Causes the DHCP server to always be off.

Page 290: netscreen_CLI

“config” through “interface”

274

r on the NetScreen device always

c IP address that is assigned to a HCP server is filling client

the host that is identified by the fied IP address.

en the DHCP server is filling client IP address must be in the same

e settings.

s where the predefined server stom DHCP server options. For nsmission of extra configuration

ver options. In such cases, you

resses of the primary, secondary,

sed by the clients. The IP address teway.

used for receiving and storing

mary and secondary NetInfo® thin a LAN.

l version 3 (POP3) mail server.

Protocol (SMTP) mail server.

NetScreen CLI Reference Guide

• enable Causes the DHCP server to always be on. The DHCP servestarts when the device is powered on.

• ip ip_addr { mac mac_addr | to ip_addr } Specifies either a specifihost or the lower end of a range of IP addresses to use when the Drequests.

- mac This option allows you to statically assign an IP address tospecified MAC address. The host is always assigned the speci

- to Defines the upper end of a range of IP addresses to use whrequests. The IP pool can support up to 255 IP addresses. Thesubnet as the interface IP or the DHCP gateway.

• option Specifies the DHCP server options for which you can defin

- custom id_num Creates a user-defined value for configurationoptions (listed below) do not suffice, and you need to define cuexample, certain VoIP (Voice-over IP) configurations require trainformation, which is not currently supported by predefined sermust define suitable custom options.

- string string Specifies a character string.

- ip ip_addr Specifies an IP address.

- integer number Specifies an integer value.

- dns1 ip_addr | dns2 ip_addr | dns3 ip_addr Defines the IP addand tertiary Domain Name Service (DNS) servers.

- gateway ip_addr Defines the IP address of the gateway to be umust be in the same subnet as the interface IP or the DHCP ga

- news ip_addr Specifies the IP address of a news server to be postings for news groups.

- nis1 ip_addr | nis2 ip_addr Defines the IP addresses of the priservers, which provide the distribution of administrative data wi

- pop3 ip_addr Specifies the IP address of a Post Office Protoco

- smtp ip_addr Defines the IP address of a Simple Mail Transfer

Page 291: netscreen_CLI

“config” through “interface”

275

HCP server agent through the

x-port | incoming ]

f the network.

an IP address supplied by the

address must be in the same

tInfo database.

primary and secondary Windows

ent through the interface.

ddresses. The NetScreen device ddresses when the device applies ified interface. This is useful when utable addresses for outgoing :

range. (A DIP pool can consist of ss ip_addr2 represents the end of

NetScreen CLI Reference Guide

The server does not coexist with the DHCP relay (OK with the client).

Example: The following command configures the NetScreen device to act as a Dinterface ethernet4:

set interface ethernet4 dhcp server service

dip

set interface interface dip id_num ip_addr1 [ ip_addr2 ] [ fiset interface interface dip id_num shift-from ip_addr3unset interface interface dip id_num

- domainname name_str Defines the registered domain name o

- lease number Defines the length of time, in minutes, for which DHCP server is leased. For an unlimited lease, enter 0.

- netmask ip_addr Defines the netmask of the gateway. The IP subnet as the interface IP or the DHCP gateway.

- nistag string Defines the identifying tag used by the Apple® Ne

- wins1 ip_addr | wins2 ip_addr Specifies the IP address of the Internet Naming Service (WINS) servers.

• service Enables the NetScreen device to act as a DHCP server ag

dip Sets a Dynamic IP (DIP) pool. Each DIP pool consists of a range of acan use the pool to dynamically or deterministicaly allocate source asource address translation (NAT-src) to packets traversing the specyou need to translate non-routable local IP source addresses into ropacket. The keywords and variables for the dip option are as follows

• id_num Identifies the DIP pool.

• The first IP address ip_addr1 represents the start of the IP addressa single IP address, or a range of addresses.) The second IP addrethe IP address range.

Page 292: netscreen_CLI

“config” through “interface”

276

communicate over a public e routable source addresses to

l source IP address to a translated r3. Such a mapping ensures that

ress from within that range to the

stination addresses. The name of terface) for an interface DIP. The such address entries as , SIP, or VoIP (Voice-over IP), to

face IP address range for

NetScreen CLI Reference Guide

Example1: The following commands allow local hosts in a non-routable subnet toWAN infrastructure. The NetScreen device uses a DIP pool to dynamically allocatpackets sent from the local hosts to remote hosts.

• Local unroutable subnet 10.1.23.1/24

• Remote unroutable subnet 10.100.2.75/24

• DIP ID number 10, with address range from 2.1.10.2 through 2.1.10.36

unset interface ethernet2 ipunset interface ethernet2 zoneunset interface ethernet3 ipunset interface ethernet3 zone

set interface ethernet2 zone trustset interface ethernet2 ip 10.1.23.1/24

• shift-from ip_addr3 Defines a one-to-one mapping from an originasource IP address for a range of IP addresses starting from ip_addthe NetScreen device always translates a particular source IP addsame translated address within a DIP pool.

• incoming Creates a DIP address pool for dynamically allocating dethe DIP pool can be DIP(id_num) for a user-defined DIP, or DIP(inDIP address pool resides in the Global security zone. You can usedestination addresses in policies, together with the services H.323support incoming calls.

Be sure to exclude the following IP addresses from a DIP pool:

• The WebUI management IP address

• The interface and gateway IP addresses

• Any Virtual IP (VIP) and Mapped IP (MIP) addresses

interface-ip incoming Designates addresses derived from the interdynamically allocating destination addresses to incoming packets.

Page 293: netscreen_CLI

“config” through “interface”

277

tp nat dip 10 permit

.1.1.12 through 1.1.1.150 ation addresses (or as outgoing

for source addresses.

for destination addresses.

permit

ce is untagged. An untagged rface. Instead, it binds the g multiple sub-interfaces, a single

igure each instance to go to a such as ISPs to manage the

NetScreen CLI Reference Guide

set interface ethernet3 zone untrustset interface ethernet3 ip 2.1.10.1/24set interface ethernet3 dip 10 2.1.10.2 2.1.10.36

set address trust Local_Hosts 10.1.23.1/24set address untrust Remote_Hosts 10.100.2.75/24set policy from trust to untrust Local_Hosts Remote_Hosts ht

Example2: The following commands use DIP in an H.323 VoIP configuration.

• Creates a pool of DIP addresses (identified by ID 5) containing addresses 1inclusive. The device can use addresses in this DIP pool as incoming destinsource addresses).

• Creates a policy that allows outgoing H.323 requests, using DIP addresses

• Creates a policy that allows incoming H.323 requests, using DIP addresses

set interface ethernet7 ip 1.1.1.1/24set interface ethernet7 dip 5 1.1.1.12 1.1.1.150 incoming

set policy from trust to untrust any any h.323 nat src dip 5set policy from untrust to trust any dip(5) h.323 permit

encap

set interface interface.id_num encap pppoe

encap Specifies the type of encapsulation to perform, when the sub-interfainterface does not use a VLAN tag to identify a VLAN for an sub-intesub-interface to a particular defined PPPoE instance. Thus, by hostinphysical interface can host multiple PPPoE instances. You can confspecified AC (Access Concentrator), thus allowing separate entities PPPoE sessions.

Page 294: netscreen_CLI

“config” through “interface”

278

}

10) for interface ethernet3 (IP

110

eer (1.1.10.10) for the

the interface’s subnet. For tended DIP could be 2.2.3.1/24.

er. Does not apply the Port

ce forwards packets that are interface. The no-default-route

NetScreen CLI Reference Guide

ext ip

set interface interface ext ip ip_addr/mask dip number { ...unset interface interface ext ip ip_addr/mask dip number

Example: The following command creates an address (1.1.100.110) in a DIP (ID address 10.1.10.10):

set interface ethernet3 ext ip 10.1.10.10/24 dip 10 1.1.100.

gateway

set interface interface gateway ip_addr [ no-default-route ]unset interface interface gateway

Example: The following command specifies the IP address of a remote gateway pethernet4 interface:

set interface ethernet4 gateway 1.1.10.10

ext ip The ext ip ip_addr option configures a DIP in a different subnet fromexample, an interface could have IP address 1.2.10.1/24, and the ex

• dip id_num Sets a Dynamic IP (DIP) pool. See “dip” on page 275.

• fix-port Keeps the original source port number in the packet headAddress Translation (PAT).

gateway The IP address for the default gateway to which the NetScreen devidestined for networks beyond the immediate subnet of the specifiedswitch specifies that there is no default route for this gateway.

Page 295: netscreen_CLI

“config” through “interface”

279

o the Trust zone, and assign it

loopback group for loopback.1, use the assigned MIP.

.255.0

e or subinterface. The secondary

support policy-based NAT, and if to a tunnel zone.bered. It does not have an IP

(interface2). The other interface is

signated loopback interface Mapped IP) and DIP (Dynamic IP)

NetScreen CLI Reference Guide

ip

set interface interface ip ip_addr/mask [ secondary ]set interface interface ip unnumbered interface interface2unset interface interface ip ip_addr

Example: The following commands create logical interface ethernet3/1.2, bind it tIP address 10.1.40.3/24:

set interface ethernet3/1.2 zone trustset interface ethernet3/1.2 ip 10.1.40.3/24

loopback-group

set interface interface1 loopback-group loopback.nunset interface interface1 loopback-group loopback.n

Example: The following commands add interfaces ethernet1 and ethernet2 to theand then assign a MIP to loopback.1. This allows both ethernet1 and ethernet2 to

set interface ethernet1 loopback-group loopback.1set interface ethernet2 loopback-group loopback.1set int loopback.1 mip 1.1.1.1 host 10.1.1.8 netmask 255.255

ip The IP address ip_addr and netmask mask for the specified interfacswitch specifies that the IP address is a secondary address.Use the unnumbered option if the tunnel interface does not need to your configuration does not require the tunnel interface to be bound The unnumbered option specifies that the tunnel interface is unnumaddress, but intstead borrows the IP address from another interface bound to the same security zone.

loopback-group Adds a specified interface (interface1) to the loopback group for a de(loopback.n). All members in the loopback group can share the MIP (definitions assigned to the loopback interface itself.

Page 296: netscreen_CLI

“config” through “interface”

280

| web }

t | web }

ethernet3:

the interface.

nouncement, in response to an

on the interface. NSM is an n devices from remote hosts. For

e. (Mtrace traces a route to the

face.

.

ce.

.

NetScreen CLI Reference Guide

manage

set interface interface manage{ ident-reset | nsmgmt | ping | snmp | ssh | ssl | telnet

unset interface interface manage{ ident-reset | nsmgmt | ping | snmp | ssh | ssl | telne

Example: The following command enables management of SSH through interface

set interface ethernet3 manage ssh

manage Enables or disables monitoring and management capability through

• ident-reset Directs the NetScreen device to send a TCP Reset anIDENT request, to port 113.

• nsmgmt Enables or disables NSM (NetScreen-Security Manager)enterprise-level management application that configures NetScreemore information, see “nsmgmt” on page 353.

• mtrace Enables (or disables) mtrace manageability on the interfacsource device using a multicast address.)

• ping Enables (or disables) pinging through the interface.

• snmp Enables (or disables) SNMP management through the inter

• ssh Enables (or disables) SSH management through the interface

• ssl Enables (or disables) SSL management through the interface.

• telnet Enables (or disables) telnet management through the interfa

• web Enables (or disables) web management through the interface

Page 297: netscreen_CLI

“config” through “interface”

281

hen set the Manage IP address

vrouter ] [ netmask

External applications such as etScreen device. (This address

device directs traffic sent to the IP for an interface in any zone . The Global zone address book he interfaces belong.

olicies between any two zones, zone to any other zone.

IPv4 addressing. The netmask one IP address range to another. s, and any Virtual IP addresses in

host device.

NetScreen CLI Reference Guide

manage-ip

set interface interface manage-ip ip_addrunset interface interface manage-ip

Example: The following commands bind interface ethernet4/1 to the Trust zone, tto 10.1.10.10:

set interface ethernet4/1 zone trustset interface ethernet4/1 manage-ip 10.1.10.10

mip

set interface interface mip ip_addr1 host ip_addr2 [ vroutermask ]

unset interface interface mip ip_addr1 [ netmask mask ]

manage-ip Defines the Manage IP address for the specified physical interface. Telnet or WebUI can use this address to configure and monitor the Nmust be in the same subnet as the interface IP address.)

mip Defines a Mapped IP (MIP) address for the NetScreen interface. TheMIP (ip_addr1) to the host with the IP address ip_addr2. Setting a Mgenerates a book entry for the MIP in the Global zone address bookkeeps all the MIPs of all interfaces, regardless of the zone to which t

You can use these MIP addresses as the destination addresses in pand as the source addresses when defining a policy from the Global

• host ip_addr2 Specifies the IP address of a host device that uses value specifies either a single one-to-one mapping or a mapping of(Note: Be careful to exclude the interface and gateway IP addressethe subnet from the MIP address range.)

• vrouter vrouter Identifies the virtual router containing a route to the

• netmask Specifies the range of host IP addresses.

Page 298: netscreen_CLI

“config” through “interface”

282

TP services from a local HTTP directly translates all outgoing

uter trust-vr

nat permit

.

NetScreen CLI Reference Guide

Example: The following commands use a MIP to allow remote hosts to request HTserver, located in a non-routable subnet, over a public WAN infrastructure. The MIPsource IP addresses into public addresses.

1. Set up ethernet interfaces.

unset interface ethernet2 ipunset interface ethernet2 zoneunset interface ethernet3 ipunset interface ethernet3 zone

set interface ethernet2 zone trustset interface ethernet2 ip 10.100.2.1/24set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.12.1/24

2. Create a MIP definition for the interface bound to the Untrust zone.

set interface ethernet3 mip 2.2.22.5 host 10.100.2.5 vro

3. Create a policy definition that invokes the MIP.

set policy from untrust to trust any mip(2.2.22.5) http save

mtrace

set interface interface mtraceunset interface interface mtrace

mtrace Allows you to do packet tracing from a multicast receiver to a source

Page 299: netscreen_CLI

“config” through “interface”

283

TU is the largest physical packet Screen device must fragment any U size is 1500 octets. Enter a

outbound traffic from the trusted , in which the interfaces have

and manually maps the specified addr) in the NHTB (next-hop ute table that uses that tunnel

NetScreen CLI Reference Guide

mtu

set interface interface mtu numberunset interface interface mtu

nat

set interface interface nat

nhtb

set interface interface.number nhtb ip_addr vpn tunn_strunset interface interface.number nhtb ip_addr

mtu Sets the Maximum Transmission Unit (MTU) for the interface. The Msize (in octets), that the device can transmit on the interface. The Netmessages larger than the MTU before sending them. The default MTvalue between 800 and 1500.

nat Directs the device to perform Network Address Translation (NAT) onLAN. This option is only available when the device is in Route Modeassigned IP addresses.

nhtb Binds the specified VPN tunnel (vpn tunn_str) to the tunnel interfaceVPN tunnel to the IP address of a remote peer’s tunnel interface ( ip_tunnel binding) table. After that, you can enter a static route in the rointerface IP address as the gateway.

Page 300: netscreen_CLI

“config” through “interface”

284

pn1 to 10.2.3.1, which is the IP .2.2.0/24, which is the address using the remote peer’s tunnel

teway 10.2.3.1

r { ... } }

at full or half duplex (as required

either 100Mbps or 10Mbps.

y either 100Mbps or 10Mbps.

nts of 100 milliseconds.

gigabit interface to manual he same negotiation mode, or the

NetScreen CLI Reference Guide

Example: With the following commands you first bind vpn1 to tunnel.1 and map vaddress of the remote peer’s tunnel interface. Then you define a static route to 10of the remote peer’s internal LAN, through tunnel.1 in the trust-vr routing domain, interface IP address (10.2.3.1) as the next-hop gateway:

set interface tunnel.1 nhtb 10.2.3.1 vpn vpn1set vrouter trust-vr route 10.2.2.0/24 interface tunnel.1 ga

phy

set interface interface phy { ... }unset interface interface phy { ... }

protocol

set interface interface protocol igmp hostset interface interface protocol igmp routerset interface interface protocol igmp { host { ... } | route

set interface interface protocol ospfset interface interface protocol ospf { ... }set interface interface protocol pim

phy Defines the physical connection mode on the specified interface.

• auto The NetScreen unit automatically decides whether to operateby the network device connected to NetScreen unit).

• full Forces the NetScreen device to operate at full duplex. Specify

• half Forces the NetScreen device to operate at half duplex. Specif

• holddown number Sets the holddown time for the link, in increme

• link-down Forces the physical link down.

• manual Specifies manual mode for a gigabit interface. Setting thedisables auto negotiation. Note: You must configure both sides in tlink does not initiate.

Page 301: netscreen_CLI

“config” through “interface”

285

} Specifies the authentication

If you specify password

ersion 5 (MD5) authentication must also specify a 16-byte key an specify more than one MD5 re are multiple MD5 keys t the key identifier of the key to be

ircuit feature (RFC 2091) on the

e. The default metric is 1.

interface. This can be used when

NetScreen CLI Reference Guide

set interface interface protocol pimset interface interface protocol ripset interface interface protocol rip { ... }unset interface interface protocol bgpunset interface interface protocol bgp { ... }unset interface interface protocol ospfunset interface interface protocol ospf { ... }unset interface interface protocol ripunset interface interface protocol rip { ... }unset interface interface protocol igmpunset interface interface protocol igmp { ... }unset interface interface protocol pimunset interface interface protocol pim { ... }

protocol rip Sets, unsets, or displays the current RIP settings for the interface.

• authentication { password pswd_str | md5 key_str key-id id_nummethod used to verify RIP neighbors.

- password specifies a clear-text password used for verification.authentication, you must also specify an 8-byte password.

- md5 directs the Netscreen device to use the Message Digest valgorithm for verification. If you specify MD5 authentication, youand, optionally, a key identifier (the default identifier is 0). You ckey with different key identifier numbers (between 0-255). If theconfigured, you can use the active-md5-key-id option to selecused for authentication.

• demand-circuit (For tunnel interfaces only) Enables the demand cspecified interface.

• enable Enables RIP on the specified interface.

• metric number Configures the RIP metric for the specified interfac

• neighbor ip_addr Configures a static RIP neighbor on the specifiedconfiguring point-to-multipoint RIP interfaces.

Page 302: netscreen_CLI

“config” through “interface”

286

nsmit RIP packets.

for updates that the specified red for the virtual router.

oming routes (routes learned by

updates that the specified d for the virtual router.

terface. If split-horizon is ck to the same neighbor. This

ons. If split-horizon is disabled, RIP database. By default,

outes learned from a neighbor as infinity (16). This causes the al routing loop faster than with routes learned from a neighbor

sent on the specified interface.

interface.

PF area. OSPF areas divide the is technique reduces the amount e other routers.

_str } Specifies the authentication fault is 0), and password. You can rs (between 0-255). If there are option to select the key identifier

NetScreen CLI Reference Guide

• passive-mode Specifies that the interface is to receive but not tra

• receive-version v1 | v1v2 | v2 Specifies the RIP protocol version interface receives. The default version is the version that is configu

• route-map name_str Specifies the route-map on which to filter incRIP) or outgoing routes (routes advertised by RIP).

- in Specifies the route map is to be used for incoming routes.

- out Specifies the route map is to be used for outgoing routes.

• send-version v1 | v1v2 | v2 Specifies the RIP protocol version forinterface sends. The default version is the version that is configure

• split-horizon Enables the split-horizon function on the specified inenabled, RIP does not advertise routes learned from a neighbor baavoids the routing-loop problem that occurs in some routing situatiRIP advertises routes learned from a neighbor as they exist in the split-horizon is enabled.

When you enable the poison-reverse switch, RIP still advertises rback to the same neighbor, but defines the metric for those routesneighbor to immediately remove the route, thus breaking a potentisplit-horizon alone. When you disable this switch, RIP advertisesback to the same neighbor with the correct metric.

• summary-enable Enables route summarization in routing updatesYou configure RIP summary routes at the virtual router level.

protocol ospf Sets, unsets or displays the current routing protocol settings for the

• area { ip_addr | number } Assigns the interface to the specified OSinternetwork into smaller, more manageable constituent pieces. Thof information that each router must store and maintain about all th

• authentication { md5 key_str [ key-id id_num ] | password pswdmethod, including MD5 key string, the key identifier number (the despecify more than one MD5 key with different key identifier numbemultiple MD5 keys configured, you can use the active-md5-key-idof the key to be used for authentication.

Page 303: netscreen_CLI

“config” through “interface”

287

the interface. The lower the value

the NetScreen device waits, after neighbor as offline.

ircuit feature (RFC 1793) on the

sion or receipt of OSPF packets

t elapse between instances of the sence of the interface.

on unit (MTU) values between the negotiations are ignored. This lower than the MTU on the remote

t interfaces is treated as an r broadcast networks, the Hello er for the network.

point-to-multipoint link.

which the local virtual router e in the virtual router to which the

into the OSPF domain as an t transmit or receive OSPF

erface.

ed on the specified interface. ature.

NetScreen CLI Reference Guide

• cost number Specifies the desirability of the path associated with of this metric, the more desirable the interface path.

• dead-interval number Specifies the maximum amount of time thatit stops receiving packets from the neighbor, before classifying the

• demand-circuit (For tunnel interfaces only) Enables the demand cspecified interface.

• disable Disables OSPF on the interface, thus preventing transmisthrough the interface.

• hello-interval number Specifies the amount of time in seconds thainterface sending Hello packets to the network announcing the pre

• ignore-mtu Specifies that any mismatches in maximum transmissilocal and remote interfaces that are found during OSPF database option should only be used when the MTU on the local interface is interface.

• link-type Configures the interface link type. By default, an etherneinterface to a broadcast network with multiple attached routers. Foprotocol elects a Designated Router and Backup Designated Rout

- p2p Configures the interface as a point-to-point link.

- p2mp (For tunnel interfaces only) Configures the interface as a

• neighbor-list number Specifies the number of an access list from accepts valid neighbors to form adjacencies. The access list must binterface is bound.

• passive Specifies that the IP address of the interface is advertisedOSPF route and not as an external route, but the interface does nopackets. This option is useful when BGP is also enabled on the int

• priority number Specifies the router election priority.

• reduce-flooding Specifies that periodic LSA updates are not floodOther OSPF routers in the area must support the demand circuit fe

Page 304: netscreen_CLI

“config” through “interface”

288

nds) that elapses before the a previous transmission attempt

at elapses before the NetScreen

t groups the hosts on the specified ter mode.

osts the interface can receive join ce accepts join and leave nd only if the interface is in router

that are eligible for Querier ter this command only if the

is a non-Querier. Enter this enabled.

up. Enter this command only if the

erier waits for a response to a t particular group on the specified is in router mode and it is running

ific-queries (range 1 - 255

on. By default, an IGMP-enabled do not have this option. Enter this er-alert option.

NetScreen CLI Reference Guide

• retransmit-interval number Specifies the amount of time (in secointerface resends a packet to a neighbor that did not acknowledgefor the same packet.

• transit-delay number Specifies the amount of time (in seconds) thdevice advertises a packet received on the interface.

protocol igmp Sets, unsets or displays the current IGMP settings for the interface.

• accept groups Specifies the access list that identifies the multicasinterface can join. Enter this command only if the interface is in rou

• accept hosts Specifies the access list that identifies from which hand leave messages. After you have set this command, the interfamessages only from the hosts in the access list. Enter this commamode.

• accept routers Specifies the access list that identifies the routers selection. Only the routers in this list can be elected as Querier. Eninterface is in router mode.

• always Enables the interface to forward IGMP messages even if itcommand only if the interface is in router mode and IGMP proxy is

• enable Enables or disables the IGMP protocol on the interface.

• host Creates an IGMP host instance on the specified interface.

• join-group Enables the interface to join the specified multicast grointerface is in router mode.

• last-member-query-interval Sets the interval (in seconds) the Qugroup-specific query before it stops sending multicast traffic for thainterface (range 1-25 inclusive). Enter this command if the interfaceIGMP version 2.

• leave-interval Sets the interval (in seconds) between group specinclusive). Enter this command if the interface is in router mode.

• no-check-router-alert IGMP packets contain a router-alert IP optidevice checks IGMP packets for this option and drops packets thatcommand to accept all IGMP packets without checking for the rout

Page 305: netscreen_CLI

“config” through “interface”

289

ckets from its own subnet only. (queries, membership reports,

ode.

l Queries (range 1 to 255, and it is the Querier for a

that elapses between the time a range1 to 25, inclusive). Enter this

erface. Enter this command only if

ode, the device automatically IGMP version 2 by default. Enter

etScreen devices support IGMP

p (BSR) messages. The interface e messages to other interfaces between zones.

nated router election.

ch the interface sends hello

ich the interface sends join-prune

certain neighbor adjacencies.

NetScreen CLI Reference Guide

• no-check-subnet By default, an IGMP interface accepts IGMP paEnter this command to allow the interface to accept IGMP packetsand leave messages) from any subnet.

• proxy When the interface is in router mode, enables IGMP proxy m

• query-interval Specifies the interval (in seconds) between Generainclusive). Enter this command if the interface is set to router modemulticast group.

• query-max-response-time Sets the maximum number of secondsQuerier sends a General Query and the time a host responds to it (command if the interface is in router mode.

• router Sets the specified interface to router mode.

• static-group Manually adds the multicast group to the specified intthe interface is in router mode.

• version Specifies the IGMP version. When an interface is in host msets the IGMP version. When an interface is in router mode, it runsthis command to change the IGMP version of a router interface. Nversions 1, 2, and 3.

protocol pim Sets, unsets or displays the current PIM settings for the interface.

• boot-strap border Configures the interface as a border for bootstrareceives and processes BSR messages, but does not forward theseven if there is a multicast group policy that allows BSR messages

• dr-priority Configures the priority of the interface during the desig

• enable Enables or disables the PIM-SM protocol on the interface.

• hello-interval Specifies the interval (expressed in seconds) at whimessages to its neighbors.

• join-prune-interval Sets the interval (expressed in seconds) at whmessages.

• neighbor-policy Identifies the access list that allows or disallows

Page 306: netscreen_CLI

“config” through “interface”

290

s clients to make split DNS queries to specific DNS servers, PN tunnels or PPPoE virtual links me DNS queries to one network,

ries meant for the corporate exclusively, while all others go to r. In addition, this can prevent

tunnel interface, thus preventing For example, DNS queries bound se security features such as

e assigned IP addresses.

is includes traffic between the et to another secondary subnet.

NetScreen CLI Reference Guide

proxy dns

set interface interface proxy dns

route

set interface interface route

route-deny

set interface interface route-denyunset interface interface route-deny

proxy dns Directs the device to use proxy DNS feature.The proxy DNS feature provides a transparent mechanism that allowqueries. Using this technique, the proxy selectively redirects the DNSaccording to partial or complete domain names. This is useful when Vprovide multiple network connectivity, and it is necessary to direct soand other queries to another network.The most important advantages of a DNS proxy are as follows.

• Domain lookups are usually more efficient. For example, DNS quedomain (such as acme.com) could go to the corporate DNS serverthe ISP DNS server, thus reducing the load on the corporate servecorporate domain information from leaking into the internet.

• DNS proxy allows you to transmit selected DNS queries through amalicious users from learning about internal network configuration.for the corporate server can pass through a tunnel interface, and uauthentication, encryption, and anti-replay.

route Directs the device to run in Route Mode, in which the interfaces hav

route-deny Enabling this flag blocks all traffic in or out of the same interface. Thprimary subnet and any secondary subnet, and one secondary subn

Page 307: netscreen_CLI

“config” through “interface”

291

hernet3/1, assigns it VLAN tag

e interface name is interface.n, tion on interface names, see

NetScreen CLI Reference Guide

screen

get interface interface screen

secondary

set interface interface ip ip_addr/mask secondaryget interface interface secondary [ ip_addr ]

tag

set interface interface.n tag id_num zone zone

Example: The following command creates a subinterface for physical interface et300, and binds it to the Untrust zone:

set interface ethernet3/1.2 tag 300 zone untrust

track-ip

get interface interface track-ipset interface interface track-ip

[dynamic |threshold number |ip ip_addr

screen Displays the current firewall (screen) counters.

secondary Sets or displays the secondary address configured for the interface.

tag Specifies a VLAN tag (id_num) for a virtual (logical) subinterface. Thwhere n is an ID number that identifies the subinterface. For informa“Interface Names” on page A-I.

Page 308: netscreen_CLI

“config” through “interface”

292

d interface.

ay for the interface.

the interface. If the weighted sum the threshold, IP tracking on the e interface are deactivated on the

ckup interface occurs. Unsetting efault value of 1.

n specify the following options:

quests are sent to the tracked IP ess, the interval is changed to the

d IP address. If the number of r greater than the threshold, the threshold for the tracked IP (3).

of the tracked IP address. If a hted sum of all tracked IP failures

IP address, the weight is changed

NetScreen CLI Reference Guide

[interval number |threshold number |weight number]

]unset interface interface track-ip

[dynamic |ip ip_addr [ interval | threshold | weight ] |threshold ]

track-ip Sets, unsets, or displays the tracking of IP addresses for the specifie

• dynamic Configures tracking of the IP address of the default gatew

• threshold number Specifies the failure threshold for IP tracking onof all tracked IP failures on the interface is equal to or greater thaninterface is considered to be failed and the routes associated with thNetScreen device. On some NetScreen devices, failover to the bathe tracked IP threshold on the interface sets the threshold to the d

• ip ip_addr Configures tracking for the specified IP address. You ca

- interval number Specifies the interval, in seconds, that ping readdress. If you are unsetting the interval for the tracked IP addrdefault value of 1.

- threshold number Specifies the failure threshold for the trackeconsecutive ping failures to the tracked IP address is equal to otracked IP address is considered failed. If you are unsetting theaddress, the device changes the threshold to the default value

- weight number Specifies the weight associated with the failuretracked IP address fails, its weight is used to calculated the weigon the interface. If you are unsetting the weight for the tracked to the default value of 1.

Page 309: netscreen_CLI

“config” through “interface”

293

shold 5

:

f [ demand-circuit ] |

r

er

ip_addr

entifies the tunnel interface.

Generic Routing Encapsulation)

s of the connection. You can the number of times the local efore it terminates the connection.

tunnel.

NetScreen CLI Reference Guide

Examples: The following command defines IP tracking for an interface.

• IP address 1.1.1.1 on the ethernet3 interface

• Ping interval of 10 seconds

• Tracked IP address failure threshold of 5

set interface ethernet3 track-ip ip 1.1.1.1 interval 10 thre

The following command sets the tracking threshold for the ethernet3 interface to 3

set interface ethernet3 track-ip threshold 3

tunnel

set interface tunnel.n { zone name_str | protocol { bgp | osprip [ demand-circuit ] } { ... } }

set interface tunnel.number tunnel encap gre [ key ]

set interface tunnel.number tunnel keep-alive interval numbe

set interface tunnel.number tunnel keep-alive threshold numb

set interface tunnel.number tunnel local-if interface dst-ip

unset interface tunnel.number tunnelunset interface tunnel.number tunnel [ keep-alive ]unset interface tunnel.number

tunnel.n Specifies a tunnel interface. The n parameter is an ID number that id

tunnel Speicifes parameters for the tunnel interface.

encap gre Specifies that all traffic in the tunnel is encapsulated using the GRE (protocol.

keep-alive The tunnel interface sends keep-alive messages to monitor the statuspecify the interval (in seconds) between keep-alive messages, and tunnel interface sends keep-live messages without receiving a reply b

local-if Specifies the local interface and the destination IP address of a GRE

Page 310: netscreen_CLI

“config” through “interface”

294

IP address 172.10.10.5/24:

t ] |

circuit ] |

e for the tunnel.1 interface:

g the MAIL service (ID 25):

nel interface. NetScreen devices unset protocol parameters.

can map routable IP addresses to is the port number, which specifies cify the service name and the IP al switch turns off server auto

NetScreen CLI Reference Guide

Example: The following commands create a tunnel interface named tunnel.2 with

set interface tunnel.2 zone untrustset interface tunnel.2 ip 172.10.10.5/24

protocol

set interface tunnel.n protocol { bgp | ospf [ demand-circuirip [ demand-circuit ] } { ... } }

unset set interface tunnel.n protocol { bgp | ospf [ demand-rip [ demand-circuit ] } { ... } }

Example: The following command enables the RIP-specific route summary featur

set interface tunnel.1 protocol rip summary-enable

vip

set interface interface vip ip_addr[ + ] port_num [ name_str ip_addr [ manual ] ]

Example: The following command creates a VIP for interface ethernet3, specifyin

set interface ethernet3 vip 1.1.14.15 25 MAIL 10.1.10.10

protocol Specifies the routing protocol that the device uses on a specified tunsupport BGP, OSPF, RIP, IGMP, and PIM. These commands set or

vip Defines a Virtual IP (VIP) address (ip_addr) for the interface so you internal servers and access their services. The port_num parameter which service to access. The name_str and ip_addr parameters speaddress of the server providing the service, respectively. The manudetection. Using the + operator adds another service to the VIP.

Page 311: netscreen_CLI

“config” through “interface”

295

cepts or drops Layer-2 frames. pply:

es.

performs. For example, the evice to ignore the tags and ch “trunk port.”

allows only SSL-based (HTTPS)

fore sending service requests e WebAuth address with a web

or user name and password. After d service requests through the

NetScreen CLI Reference Guide

vlan trunk

set interface vlan1 vlan trunkunset interface vlan1 vlan trunk

webauth

set interface interface webauth [ ssl-only ]

webauth-ip

set interface interface webauth-ip ip_addr

vlan trunk (vlan1 interface only.) Determines whether the NetScreen device acThe device makes this decision only when the following conditions a

• The NetScreen device is in transparent mode.

• The device receives VLAN tagged frames on an interface.

The device then performs one of two actions.

• Drop the frames because they have tags.

• Ignore the tags and forward the frames according to MAC address

The vlan trunk interface switch determines which action the devicecommand set interface vlan1 vlan trunk instructs the NetScreen dforward the frames. This action closely follows that of a Layer-2 swit

webauth Enables WebAuth user authentication. Enabling the ssl-only switchuser authentication.

webauth-ip Specifies the WebAuth server IP address for user authentication. Be(such as MAIL) through the interface, the user must first browse to thbrowser. The NetScreen device presents a login screen, prompting fsuccessfully entering the user name and password, the user can seninterface.

Page 312: netscreen_CLI

“config” through “interface”

296

security policy with the set policy server, use the set webauth

NetScreen CLI Reference Guide

zone

set interface interface zone zoneunset interface interface zone

Example: To bind interface ethernet2/2 to the Trust zone:

set interface ethernet2/2 zone trust

To protect an interface with the WebAuth feature, you must create a command, specifying the webauth switch. To specify the WebAuth command.

zone Binds the interface to a security zone.

Page 313: netscreen_CLI

3

297

ce (CLI) commands ip through

you may find that certain ood example is the vsys XP device. Similarly, some the vpn command. This option

NetScreen CLI Reference Guide

3

“ip” through “port-mode”

This section lists and describes Juniper Networks NetScreen Command Line Interfaport-mode .

Note: As you execute CLI commands using the syntax descriptions in this section,commands and command features are unavailable on your NetScreen platform. A gcommand, which is available on a NetScreen-500 device, but not on a NetScreen-5command options are unavailable on certain platforms, as with the df-bit option of is available on a NetScreen-500, but not on a NetScreen-5XP.

Page 314: netscreen_CLI

“ip” through “port-mode”

298

ipon with a TFTP server.

es can contain configuration s.

creen device ends the attempt

NetScreen CLI Reference Guide

Description: Use the ip commands to set or display IP parameters for communicati

A NetScreen device can use TFTP servers to save or import external files. These filsettings, software versions, public keys, error messages, certificates, and other item

Syntax

get

get ip tftp

set

set ip tftp{retry number |timeout number}

Keywords and Variables

retry

set ip tftp retry number

Example: The following command sets the number of retries to 7:

set ip tftp retry 7

retry The number of times to retry a TFTP communication before the NetSand generates an error message.

Page 315: netscreen_CLI

“ip” through “port-mode”

299

fore terminating an inactive TFTP

NetScreen CLI Reference Guide

timeout

set ip tftp timeout number

Example: The following command sets the timeout period to 15 seconds:

set ip tftp timeout 15

timeout Determines how the long (in seconds) the NetScreen device waits beconnection.

Page 316: netscreen_CLI

“ip” through “port-mode”

300

ip-classificationffic classification.

d of VLAN tags, the NetScreen s with a particular system (root

ollowing:

created virtual system, you

ys name_str }ot | vsys name_str }

rticular address in a specific zone.

NetScreen CLI Reference Guide

Description: Use the ip-classification command to display the current IP-based tra

IP-based traffic classification allows you to use virtual systems without VLANs. Insteadevice uses IP addresses to sort traffic, associating a subnet or range of IP addresseor vsys).

Using IP-based traffic classification exclusively to sort traffic, all systems share the f

• The untrust-vr and a user-defined internal-vr

• The Untrust zone and a user-defined internal zone

• An Untrust zone interface and a user-defined internal zone interface

To designate a subnet or range of IP addresses to the root system or to a previouslymust issue one of the following CLI commands at the root level:

set zone zone ip-classification net ip_addr/mask { root | vsset zone zone ip-classification range ip_addr1-ip_addr2 { ro

For more information, see the zone command.

Syntax

get

get ip-classification [ zone zone ]

Keywords and Variables

zone

get ip-classification zone zone [ ip ip_addr ]

zone The name of the security zone. The ip ip_addr option specifies a pa

Page 317: netscreen_CLI

“ip” through “port-mode”

301

ippoolnge of IP addresses. The er 2 Tunneling Protocol (L2TP).

NetScreen CLI Reference Guide

Definition: Use the ippool commands to associate the name of an IP pool with a raNetScreen device uses IP pools when it assigns addresses to dialup users using Lay

Syntax

get

get ippool name_str

set

set ippool string ip_addr1 ip_addr2set ippool string ip_addr3 ip_addr4

unset

unset ippool string

Keywords and Variables

Variable Parameters

get ippool name_strset ippool string ip_addr1 ip_addr2set ippool string ip_addr3 ip_addr4unset ippool string

string Defines the name of the IP pool.

ip_addr1 ip_addr2

Starting and ending IP addresses in the IP pool.

Page 318: netscreen_CLI

“ip” through “port-mode”

302

0.100 through 172.16.10.200:

NetScreen CLI Reference Guide

Example: To configure the IP pool named “office” with the IP addresses 172.16.1

set ippool office 172.16.10.100 172.16.10.200

p_addr3 ip_addr4

A second set of starting and ending IP addresses in the same IP pool.

Page 319: netscreen_CLI

“ip” through “port-mode”

303

l2tping Protocol) tunnels and L2TP

Ns. L2TP allows dial-up users r (LNS). The NetScreen device

NetScreen CLI Reference Guide

Description: Use the l2tp commands to configure or remove L2TP (Layer 2 Tunnelsettings from the NetScreen device.

L2TP is an extension to PPP (Point-to-Point Protocol) that allows ISPs to operate VPto make virtual Point-to-Point Protocol (PPP) connections to an L2TP network servecan operate as such a server.

Syntax

clear

clear [ cluster ] l2tp { all | ip ip_addr }

get

get l2tp{all [ active ] | tunn_str [ active ] |default}

set (default)

set l2tp default{auth server name_str [ query-config ] |ippool string |dns1 ip_addr | dns2 ip_addr |wins1 ip_addr | wins2 ip_addr |ppp-auth { any | chap | pap } |}

Page 320: netscreen_CLI

“ip” through “port-mode”

304

_name ] |

ins2 } |

[ wins2 ] |

NetScreen CLI Reference Guide

set (tunn_str)

set l2tp tunn_str[auth server name_str

[ query-config ] [ user usr_name | user-group grp[ peer-ip ip_addr ]

[ host name_str ][ outgoing-interface interface ]

[ secret string ][ keepalive number ] |

remote-setting{ [ ippool string ]

[ dns1 ip_addr ][ dns2 ip_addr ]

[ wins1 ip_addr ][ wins2 ip_addr ]

}]

unset

unset l2tp{default { dns1 | dns2 | ippool | radius-port | wins1 | wtunn_str

{auth |host |keepalive |outgoing-interface interface { keepalive | secret } |peer-ip |remote-setting [ ippool ] [ dns1 ] [ dns2 ] [ wins1 ]secret}

Page 321: netscreen_CLI

“ip” through “port-mode”

305

ad_Serv) for an L2TP tunnel

e L2TP connection for a tunnel

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameter

get l2tp tunn_strget l2tp tunn_str [ ... ]set l2tp tunn_str [ ... ]

unset l2tp tunn_str { ... }

Example: The following command identifies the RADIUS authentication server (R(Mkt_Tun).

set l2tp Mkt_Tun auth server Rad_Serv

active

get l2tp all activeget l2tp tunn_str active

Example: The following command displays the current active/inactive status of th(home2work):

get l2tp home2work active

tunn_str The name or IP address of the L2TP tunnel.

active Displays the currently active L2TP connections for tunnels.

Page 322: netscreen_CLI

“ip” through “port-mode”

306

tication server (Rad_Serv) for

s, peer host name, L2TP tunnel pecified L2TP tunnel (string).

ntaining the authentication

tion server for IP, DNS, and WINS

name).

r group (grp_name).

r.

NetScreen CLI Reference Guide

all

clear cluster l2tp allclear l2tp allget l2tp all

auth server

set l2tp tunn_str auth server name_str [ ... ]set l2tp default auth server name_str [ ... ]unset l2tp tunn_str auth

Example: The following command directs the device to query the RADIUS authenIP, DNS, and WINS information:

set l2tp Mkt_Tun auth server Rad_Serv query-config

cluster

clear cluster l2tp { ... }

all Displays or clears the ID number, tunnel name, user, peer IP addresshared secret, and keepalive value for every L2TP tunnel (all) or a s

auth server Specifies the object name (name_str) of the authentication server codatabase.

• query-config Directs the NetScreen device to query the authenticainformation.

• user usr_name Restricts the L2TP tunnel to a specified user (usr_

• user-group grp_name Restricts the L2TP tunnel to a specified use

cluster Propagates the clear operation to all other devices in a NSRP cluste

Page 323: netscreen_CLI

“ip” through “port-mode”

307

r.

ses are drawn to be assigned to

response to a dialup user’s tch instructs the NetScreen device

CHAP), which does not transmit

oes not use encryption.

server. The number can be

NetScreen CLI Reference Guide

default

get l2tp defaultset l2tp default { ... }unset l2tp tunn_str [ ... ]unset l2tp default { ... }

default Defines or displays the default L2TP settings.

• auth server name_str The object name of the authentication serve

• dns1 ip_addr The IP address of the primary DNS server.

• dns2 ip_addr The IP address of the secondary DNS server.

• ippool string The name of the L2TP IP pool, from which IP addresL2TP users.

• ppp-auth { any [ chap | pap ] } Specifies the authentication type inrequest to make a Point-to-Point Protocol (PPP) link. (The any swito negotiate CHAP and then, if that attempt fails, PAP.)

- chap specifies Challenge Handshake Authentication Protocol (the password across the network.

- pap specifies Password Authentication Protocol (PAP), which d

• radius-port port_num Defines the port number of the default L2TPbetween 1024 and 65,535.

• wins1 ip_addr The IP address of the primary WINS server.

• wins2 ip_addr The IP address of the secondary WINS server.

Page 324: netscreen_CLI

“ip” through “port-mode”

308

ctively.

tively.

tunnel (west_coast):

st name (name_str) to establish

) waits before sending a hello

NetScreen CLI Reference Guide

Example: The following commands create a set of default L2TP settings.

• IP pool (chiba).

• Use of the local database.

• CHAP for PPP authentication.

• Primary and secondary DNS servers at 192.168.2.1 and 192.168.4.71 respe

• Primary and secondary WINS servers at 10.20.1.16 and 10.20.5.101 respec

set l2tp default ippool chibaset l2tp default auth localset l2tp default ppp-auth chapset l2tp default dns1 192.168.2.1set l2tp default dns2 192.168.4.71set l2tp default wins1 10.20.1.16set l2tp default wins2 10.20.5.101

host

set l2tp tunn_str [ ... ] host name_str [ ... ]unset l2tp tunn_str host

keepalive

set l2tp tunn_str [ ... ] keepalive number

Example: The following command specifies a keepalive value of 120 for an L2TP

set l2tp west_coast keepalive 120

host Adds a restriction that allows only a client with the specified client hothe L2TP tunnel.

keepalive Defines how many seconds of inactivity, the NetScreen device (LNSmessage to the dialup client (LAC).

Page 325: netscreen_CLI

“ip” through “port-mode”

309

nterface for L2TP tunnel

0.19):

setting may be mandatory on your

address (ip_addr) to establish the

een device (which acts as the AC).

NetScreen CLI Reference Guide

outgoing-interface

set l2tp tunn_str [ ... ] outgoing-interface interface

Example: The following command specifies interface ethernet4 as the outgoing i(east_coast):

set l2tp east_coast outgoing-interface ethernet4

peer-ip

set l2tp tunn_str [ ... ] peer-ip ip_addr [ ... ]

Example: The following command specifies the IP address of the LAC (172.16.10

set l2tp east_coast peer-ip 172.16.100.19

secret

set l2tp tunn_str [ ... ] secret string [ ... ]

Example: The following command specifies a shared secret (94j9387):

set l2tp east_coast secret 94j9387

outgoing-interface Specifies the outgoing interface for the L2TP tunnel. Note: This NetScreen device.

peer-ip Adds a restriction that allows only a client host with the specified IP L2TP tunnel.

secret Defines a shared secret used for authentication between the NetScrL2TP Network Server, or LNS) and the L2TP access concentrator (L

Page 326: netscreen_CLI

“ip” through “port-mode”

310

2TP user (jking) to establish a

AC-LNS pair. This is not a IPSec.

g name_str enables any L2TP

NetScreen CLI Reference Guide

user

set l2tp tunn_str auth server name_str [ ... ] user usr_name

Example: The following command adds a restriction that allows only a specified LL2TP tunnel (west_coast).

set l2tp west_coast auth server Our_Auth user jking

Defaults

The default L2TP UDP port number is 1701.

By default, the NetScreen device uses no L2TP tunnel secret to authenticate the Lproblem, because the device performs IKE authentication when it uses L2TP over

The default interval for sending a keepalive message is 60 seconds.

PPP-auth type is any.

user Restricts the L2TP tunnel to a L2TP user (usr_name). (Not specifyinuser.)

Page 327: netscreen_CLI

“ip” through “port-mode”

311

ledred to signal the attack. Use the attack occurs.

NetScreen CLI Reference Guide

Description: When either an event alarm or a firewall attack occurs, the LED glows clear led command to return an ALARM or FW (firewall) LED to green after such an

Syntax

clear

clear [ cluster ] led { alarm | firewall }

Keywords and Variables

alarm

clear [ cluster ] led alarm

cluster

clear cluster led alarmclear cluster led firewall

firewall

clear [ cluster ] led firewall

alarm Specifies the ALARM LED.

cluster Propagates the clear operation to all other devices in a NSRP cluster.

firewall Specifies the firewall (FW) LED.

Page 328: netscreen_CLI

“ip” through “port-mode”

312

lcdanel of a NetScreen device, or

NetScreen CLI Reference Guide

Description: Use the lcd commands to activate or inactivate the LCD on the front pto display the current lcd setting.

Syntax

get

get lcd

set

set lcd{display |key-in}

unset

unset lcd{display |key-in}

Page 329: netscreen_CLI

“ip” through “port-mode”

313

lay.

NetScreen CLI Reference Guide

Keywords and Variables

display

set lcd displayunset lcd display

key-in

set lcd key-inunset lcd key-in

display Turns the LCD off or on and locks the control keys.

key-in Locks and unlocks the control keys, but does not affect the LCD disp

Page 330: netscreen_CLI

“ip” through “port-mode”

314

license-keyare license.

ce without having to upgrade to eatures already loaded in the

NetScreen CLI Reference Guide

Description: Use the license-key command to upgrade or display the current softw

The license key feature allows you to expand the capabilities of your NetScreen devia different device or system image. You can purchase a key that unlocks specified fsoftware, such as the following:

• User capacity

• Virtual systems

• Virtual Private Networks

• Zones

• Virtual routers

• HA

Note: Not all keys are available for all products.

Syntax

exec

exec license-key key_str key_str { capacity key_str |ensure keister |update |virtualization key_str |vpn key_str |vrouter key_str |vsys key_str |zone key_str}

Page 331: netscreen_CLI

“ip” through “port-mode”

315

your given license-key (key_str).

y_str).

NetScreen CLI Reference Guide

get

get license-key

set

set license-key update-url url_str

unset

unset license-key update-url

Keywords

capacity

exec license-key capacity key_str

nsrp

exec license-key nsrp key_str

capacity Allows you to expand the user capacity of the NetScreen device with

nsrp Specifies a NetScreen Redundancy Protocol (NSRP) license key (ke

Page 332: netscreen_CLI

“ip” through “port-mode”

316

r Deep Inspection (DI) signatures, , and then retrieve the

vice by executing the command een Concepts and Examples

n device loads license key

y_str).

NetScreen CLI Reference Guide

update

exec license-key update

update-url

set license-key update-url url_str

virtualization

exec license-key virtualization key_str

vpn

exec license-key vpn key_str

update Before your NetScreen device can receive regular update service foyou must purchase a subscription to the service, register your devicesubscription. You retrieve the subscription and activate it on your deexec license-key update. For more information, refer to the NetScrReference Guide.

update-url Specifies the URL of the license key server from which the NetScreeupdates.

virtualization Specifies a virtualization license key (key_str).

vpn Specifies a NetScreen Virtual Private Network (VPN) license key (ke

Page 333: netscreen_CLI

“ip” through “port-mode”

317

NetScreen CLI Reference Guide

vrouter

exec license-key vrouter key_str

vsys

exec license-key vsys key_str

zone

exec license-key zone key_str

vrouter Specifies a virtual router license key (key_str).

vsys Specifies a virtual system (vsys) license key (key_str).

zone Specifies a security zone license key (key_str).

Page 334: netscreen_CLI

“ip” through “port-mode”

318

loge logging.

eenOS module, source,

] ]

] ]

]

NetScreen CLI Reference Guide

Description: Use the log commands to configure the NetScreen device for messag

The the log commands allow you to perform the following:

• Display the current log status according to severity level, policy, service, Scrdestination, or duration.

• Determine which log information to display or omit.

• Display asset recovery information.

• Configure logging to mitigate message loss due to memory limitations.

Syntax

clear

clear [ cluster ] log{self [ end-time string ] |system [ saved ] |traffic [ policy id_num [ -id_num ] ] [ end-time string }

get

get log{asset-recovery |audit-loss-mitigation |self | traffic [ policy pol_num [ -pol_num ] ]

[ start-date date [ time ] ] [ end-date date ] [ time[ start-time string ] [ end-time string ]

[ min-duration string ] [ max-duration string

Page 335: netscreen_CLI

“ip” through “port-mode”

319

rt_num [-port_num ] ] ]

dst-netmask mask ] ]num ] ] ]

te [ time ] ] ]]]

NetScreen CLI Reference Guide

[ service name_str ][ src-ip ip_addr [ -ip_addr ]

[ src-netmask mask ] [ src-port po]

[ dst-ip ip_addr [ -ip_addr ] [[ dst-port port_num [-port_

[ no-rule-displayed ] |sort-by

{date [ [ start-date date [ time ] ] [ end-date dadst-ip [ ip_addr [ -ip_addr | dst-netmask mask ] src-ip [ ip_addr [ -ip_addr | src-netmask mask ] time

[ start-time time ][ end-time time ]

}setting [ module { system | all } ]}

set

set log{audit-loss-mitigation |module name_str level string destination string}

unset

unset log{audit-loss-mitigation |module name_str level string destination string}

Page 336: netscreen_CLI

“ip” through “port-mode”

320

tem module messages at the

events exceeds the capacity of f event logs due to log overloads.ver to the management interface er is available if the audit trail fills

cluster.

ssible destinations are console, ia.

NetScreen CLI Reference Guide

Keywords and Variables

audit-loss-mitigation

get log audit-loss-mitigationset log audit-loss-mitigationunset log audit-loss-mitigation

cluster

clear cluster log { ... }

destination

set log module name_str level string destination stringunset log module name_str level string destination string

Example: The following command instructs the NetScreen device to direct all sysalert level (or higher) to the console port.

set log module system level alert destination console

audit-loss-mitigation Stops generation of auditable events when the number of suchthe NetScreen device. Enabling this feature reduces the loss oOn some NetScreen devices, you must connect the syslog seron the Management Module. This ensures that the syslog servup and network traffic stops.

cluster Propagates the clear operation to all other devices in a NSRP

destination Specifies the destination of the generated log messages. The permiinternal, email, snmp, syslog, webtrends, onesecure, and pcmc

Page 337: netscreen_CLI

“ip” through “port-mode”

321

ffic destined for port 80 (that is,

tem module messages at the

ort numbers or by a specific

. Starting with the most urgent, tion, information, and

s all security levels.

NetScreen CLI Reference Guide

dst-port

get log traffic dst-port number

Example: The following command filters the get traffic log output to display only traHTTP traffic):

get log traffic dst-port 80

level

set log module name_str level string destination stringunset log module name_str level string destination string

Example: The following command instructs the NetScreen device to direct all syscritical level (or higher) to the e-mail server:

set log module system level critical destination email

dst-port Filters the output of the get log command by a range of destination pdestination port number.

level Specifies the minimum urgency level of the generated log messagesthese levels are emergency, alert, critical, error, warning, notificadebugging. For the get log command, the all-levels option display

Page 338: netscreen_CLI

“ip” through “port-mode”

322

5 minutes to 1 hour:

tem module messages at the

licy information:

or equal to the minimum duration

an or equal to the maximum

g message.

NetScreen CLI Reference Guide

min-duration | max-duration

get log event { ... } [ ... ] min-duration string [ ... ]get log event { ... } [ ... ] max-duration string [ ... ]

Example: The following command displays traffic log entries for traffic that lasted

get log traffic min-duration 00:05:00 max-duration 01:00:00

module

get log event module { ... } [ ... ]set log module name_str { ... }unset log module name_str { ... }

Example: The following command instructs the NetScreen device to direct all syscritical level (or higher) to the webtrends server:

set log module system level critical destination webtrends

no-rule-displayed

get log { ... } [ ... ] no-rule-displayed

Example: The following command displays traffic log entries without displaying po

get log traffic no-rule-displayed

min-duration Displays traffic log entries for traffic whose duration was longer thanspecified.

max-duration Displays traffic log entries for traffic whose duration was shorter thduration specified.

module Specifies the name of the ScreenOS module that generates the lo

no-rule-displayed Displays traffic log entries, but does not display policy information.

Page 339: netscreen_CLI

“ip” through “port-mode”

323

ith ID 3 to 9 (inclusive):

ith a source IP address of

for several policies (specified by a nd the total number of established s using this syntax: pol_num

P, FTP, or Any. The name does ed as TCP. Although you cannot , HTTP, and TFTP, entering TP

NetScreen CLI Reference Guide

policy

clear [ cluster ] log traffic policy pol_num [ -pol_num ]

Example: The following command displays traffic log table entries for any policy w

get log traffic policy 3-9

self

clear [ cluster ] log self [ ... ]get log self [ ... ]

Example: The following command displays traffic log table entries for any policy w172.16.10.1 and a destination address of 172.16.10.100:

get log self src-ip 172.16.10.1 dst-ip 172.16.10.100

service

get log { ... } [ ... ] service name_str [ ... ]

Example: The following command displays traffic log table entries for TCP:

get log self service tcp

policy Displays traffic log entries for a policy (specified by its ID number) or range of ID numbers). The ID number can be any value between 0 apolicies. To define a range, enter the starting and ending ID number[- pol_num ]

self Clears or displays self-log entries from the log.

service Displays traffic log entries for a specified Service, such as TCP, ICMnot have to be complete; for example, both TC and CP are recognizspecify a Service group, note that because TP is recognized as FTPdisplays log entries for all three Services.

Page 340: netscreen_CLI

“ip” through “port-mode”

324

ule:

e date ] ] [ time ]tmask mask ] ]tmask mask ] ]time ]

he name of the module for which

e specified. The end-date option t for start-date and end-date date s hh:mm:ss.

he year using the last two digits or iter between the date and the

NetScreen CLI Reference Guide

setting

get log setting [ ... ]

Example: The following command displays traffic log settings for the system mod

get log setting module system

sort-by

get log { ... } sort-by date [ [ start-date date ] [ end-datget log { ... } sort-by dst-ip [ ip_addr [ -ip_addr | dst-neget log { ... } sort-by src-ip [ ip_addr [ -ip_addr | src-neget log { ... } sort-by time [ start-time time ] [ end-time

setting Displays log setting information. The module string value specifies tthe log settings apply.

sort-by Sorts the log information by any of the following criterion.

• date | time Sorts the logs by date, time, or both.

The start-date option displays logs that occurred at or before the timdisplays logs that occurred at or after the time specified. The formais mm/dd[/yy-hh:mm:ss]. The format for start-time and end-time i

You can omit the year (the current year is the default), or express tall four digits. The hour, minute, and second are optional. The delimtime can be a dash or an underscore:

12/31/2002-23:59:00

12/31/2002_23:59:00

• dst-ip Sorts the traffic logs by destination IP address.

• src-ip Sorts the traffic logs by source IP address.

Page 341: netscreen_CLI

“ip” through “port-mode”

325

time:

[ ... ]

[ ... ]

ination IP addresses

8081:

of source IP addresses. Include all IP addresses in the same rce IP range and a source subnet gs by source IP address.

nge of destination IP addresses. u cannot specify a destination IP ct the device to sort event logs by

urce port numbers.

NetScreen CLI Reference Guide

Example: The following command displays traffic log settings sorted by date and

get log traffic sort-by date start-date 11/21/2003-22:24:00

src-ip | dst-ip

get log { ... } [ ... ] src-ip ip_addr [ -ip_addr ] [ ... ]get log { ... } [ ... ] sort-by src-ip ip_addr [ -ip_addr ] get log { ... } [ ... ] dst-ip ip_addr [ -ip_addr ] [ ... ]get log { ... } [ ... ] sort-by dst-ip ip_addr [ -ip_addr ]

Example: The following command displays traffic log entries for the range of dest172.16.20.5–172.16.20.200:

get log traffic dst-ip 172.16.20.5-172.16.20.200

src-port

get log { ... } [ ... ] src-port port_num [ ... ]

Example: The following command displays traffic log entries from the source port

get log traffic src-port 8081

src-ip Displays traffic log entries for a specified source IP address or rangethe subnet mask for a source IP address to display traffic entries forsubnet as the specified source IP address. You cannot specify a soumask simultaneously. You can also direct the device to sort event lo

dst-ip Displays traffic log entries for a specified destination IP address or raYou can specify the subnet mask for a destination IP address, but yorange and destination subnet mask simultaneously. You can also diredestination IP address.

src-port Displays traffic log entries for a specified port number or range of so

Page 342: netscreen_CLI

“ip” through “port-mode”

326

[ time ] ] -date date [ time ] ]

]

arch 4, 2001 to 2:59:59 P.M. on

:59

or traffic or self logs. You can omit year using the last two digits or all he delimiter between the date and

ic or self logs. When you specify a ased on the specified times, hh:mm:ss.

NetScreen CLI Reference Guide

start-date | end-date

get log { ... } [ start-date date [ time ] ] [ end-date date get log { ... } sort-by date [start-date date [ time ] ] [end

start-time | end-time

get log { ... } [ start-time time ] [ end-time time ]get log { ... } sort-by [ start-time time ] [ end-time time

Example: The following command displays event log entries from 3:00 P.M. on MMarch 6:

get log event start-time 03/04/01_15:00 end-time 03/06_14:59

start-date date [ time ]end-date date [ time ]

Specifies the lower and upper ends of a range of dates fthe year (the current year is the default), or express the four digits. The hour, minute, and second are optional. Tthe time can be a dash or an underscore:12/31/2001-23:59:0012/31/2001_23:59:00

start-time timeend-time time

Specifies the lower and upper ends of a range of times for traffstart-time and/or end-time, the device sorts or filters the logs bregardless of the date. Specify the time in the following format:

Page 343: netscreen_CLI

“ip” through “port-mode”

327

le system, and to generate

8081:

aved system log information. The

NetScreen CLI Reference Guide

system

clear [ cluster ] log system [ ... ]get log system [ reversely | saved ]

Example: The following command generates log messages generated from moduonly messages that are critical or greater:

set log module system level critical destination console

traffic

clear [ cluster ] log traffic [ ... ]get log traffic [ ... ]

Example: The following command displays traffic log entries from the source port

get log traffic src-port 8081

system Displays current system log information. The saved switch displays sreversely switch displays information in reverse order.

traffic Specifies traffic log entries.

Page 344: netscreen_CLI

“ip” through “port-mode”

328

macAC) address for a NetScreen

to 111144446666 for the

ansparent mode.

NetScreen CLI Reference Guide

Description: Use the mac commands to configure a static Media Access Control (Minterface, or to display information on the current MAC configurations.

Syntax

get

get mac [ interface ]

set

set mac mac_addr interface

unset

unset mac mac_addr

Keywords and Variables

Variable Parameters

Example: The following command sets the MAC address on an NetScreen deviceethernet7 interface:

set mac 111144446666 ethernet7

Note: You can only execute the mac commands when the device is configured in tr

mac_addr Specifies the MAC address.

interface Specifies the name of the interface, as with ethernet1.

Page 345: netscreen_CLI

“ip” through “port-mode”

329

mac-learns Control (MAC) learning table,

faces are in Transparent mode, IP addresses, and the

NetScreen CLI Reference Guide

Description: Use the mac-learn commands to clear the entries in the Media Accesor to display information on the current MAC configurations.

This command functions only when an interface is in Transparent mode. When interthe NetScreen device operates at Layer 2. The security zone interfaces do not haveNetScreen device forwards traffic like a Layer 2 switch.

Syntax

clear

clear [ cluster ] mac-learn [ stats ]

get

get mac-learn [ interface ]

set

set mac-learn

Keywords and Variables

Variable Parameter

get mac-learn interface

interface Identifies the interface.

Page 346: netscreen_CLI

“ip” through “port-mode”

330

r.

NetScreen CLI Reference Guide

cluster

clear cluster mac-learn [ ... ]

stats

clear [ cluster ] mac-learn stats

cluster Propagates the clear operation to all other devices in a NSRP cluste

stats Clears the MAC learning table statistics.

Page 347: netscreen_CLI

“ip” through “port-mode”

331

memoryonditions.

ted ]

um) and the size (size).

NetScreen CLI Reference Guide

Description: Use the memory commands to set or display the memory allocation c

Syntax

get

get memory[

[ di | ipc | kernel | id_num | module id_num | protec[ all | bin | error | free | used ]

[ address id_num size | chunk [name_str] [ debug ] | pool [ name_str ] [ debug ] ]

]

Keywords and Variables

Variable Parameters

get memory id_num

address

get memory address id_num size

id_num The task ID number.

address Displays the address memory fragments of the task ID number (id_n

Page 348: netscreen_CLI

“ip” through “port-mode”

332

n module.

NetScreen CLI Reference Guide

all

get memory all

bin

get memory bin

chunk

get memory chunk [ name_str ]

di

get memory di [ ... ]

error

get memory error

all Displays memory fragments.

bin Displays the task memory bin.

chunk Displays the object pool (name_str) memory.

di Displays the statistics about the memory used by the deep inspectio

error Displays erroneous memory fragments.

Page 349: netscreen_CLI

“ip” through “port-mode”

333

ess communication (IPC).

NetScreen CLI Reference Guide

free

get memory free

ipc

get memory ipc [ ... ]

kernel

get memory kernel [ ... ]

module

get memory module id_num

pool

get memory pool [ name_str ] [ debug ]

free Displays free memory.

ipc Displays memory statistics about the memory used by the inter-proc

kernel Displays memory statistics about the kernel heap.

module Displays a single memory module (id_num).

pool Displays pooled memory.

Page 350: netscreen_CLI

“ip” through “port-mode”

334

NetScreen CLI Reference Guide

protected

get memory protected

used

get memory used

protected Displays protected memory.

used Displays used memory.

Page 351: netscreen_CLI

“ip” through “port-mode”

335

mirrornterface to a destination example, you can connect a erfaces.

ay drop some frames due to a

NetScreen CLI Reference Guide

Description: Use the mirror commands to mirror all traffic for at least one source iinterface. This command is useful for debugging and monitoring network traffic. For sniffer to a destination interface to monitor traffic passing through multiple source int

Syntax

get

get mirror port

set

set mirror port source interface1 destination interface2

unset

unset mirror port source interface

Keywords and Variables

destination | source

set mirror port source interface1 destination interface2

Note: When a destination interface mirrors multiple source interfaces, the device mbandwidth mismatch.

destination Specifies the source and destination interfaces.

Page 352: netscreen_CLI

“ip” through “port-mode”

336

modem for the serial link.

NetScreen CLI Reference Guide

Description: Use the modem commands to configure modem and dial-up settings

Syntax

get

get modem[config |

queue { rcv-q | xmt-q } |settings |state |stats]

set

set modem{idle-time number |interval number |isp name_str

{account login string password pswd_str |primary-number string [ alternative-number string ] |priority number}

retry number |settings name_str { active | init-strings string } |speed number }

Page 353: netscreen_CLI

“ip” through “port-mode”

337

r

bodie45 for the ISP account

NetScreen CLI Reference Guide

unset

unset modem{idle-time number |interval number |isp name_str [ alternative-number ] |retry number |settings name_str |speed}

exec

exec modem command string

Keywords and Variables

account

set modem isp name_str account login string password pswd_st

Example: The following command configures the login kgreen and the password isp1:

set modem isp isp1 account login kgreen password bodie45

account Specifies the user login and password for the ISP account.

Page 354: netscreen_CLI

“ip” through “port-mode”

338

ber string

rs to access the ISP ‘isp1’:

ber 4085551313

nfigured settings.

NetScreen CLI Reference Guide

active

set modem settings name_str activeunset modem settings name_str

Example: The following command activates settings for the modem usr14400:

set modem settings usr14400 active

alternative-number

set modem isp name_str primary-number string alternative-num

Example: The following command configures primary and alternate phone numbe

set modem isp isp1 primary-number 4085551212 alternative-num

command

exec modem command string

config

get modem config

active Activates the specified modem settings and deactivates any other co

alternative-number Specifies an alternate phone number to access the ISP.

command Sends Hayes AT commands to the modem.

config Displays HDLC/PPP configuration.

Page 355: netscreen_CLI

“ip” through “port-mode”

339

4400:

I0&K1&M4&R2S7=60

l-up connection before the . A value of 0 means the modem n.

ommand that is recognized by

lt is 60 seconds. Range is 3-60

NetScreen CLI Reference Guide

idle-time

set modem idle-time numberunset modem idle-time number

Example: The following command sets an idle time of 12 minutes:

set modem idle-time 12

init-strings

set modem settings name_str init-strings stringunset modem settings name_str

Example: The following command sets an initialization string for the modem usr1

set modem settings usr14400 init-strings AT&FX4&A3&B1&D2&H1&

interval

set modem interval numberunset modem interval number

idle-time Specifies the number of minutes that elapse with no traffic on the diaNetscreen device disconnects the modem. The default is 10 minutesnever disconnects, even if there is no traffic on the dial-up connectio

init-strings Specifies the initialization string for the specified modem. AT string cthe modem.

interval Specifies the number of seconds between dial-up retries. The defauseconds.

Page 356: netscreen_CLI

“ip” through “port-mode”

340

bodie45 for the ISP isp1:

s the ISP isp1 and specifies

m uses tone dial by default, but our modem uses pulse dial by th a T .

SPs that may be configured. A

NetScreen CLI Reference Guide

Example: The following command sets a dial-up interval of 45 seconds:

set modem interval 45

isp

set modem isp name_str { ... }unset modem isp name_str

Example: The following command configures the login kgreen and the password

set modem isp isp1 account login kgreen password bodie45

primary-number

set modem isp name_str primary-number string

Example: The following command configures the primary phone number to accestone dial:

set modem isp isp1 primary-number T4085551212

priority

set modem isp name_str priority number

isp Specifies the ISP.

primary-number Specifies the primary phone number to access the ISP. If your modeyou want to use pulse dial, precede the phone number with a P . If ydefault, but you want to use tone dial, precede the phone number wi

priority Specifies the priority of this ISP for dial-up backup, relative to other Ivalue of 1 is the highest priority. The number can be 0 or 1-4.

Page 357: netscreen_CLI

“ip” through “port-mode”

341

for dial-up backup:

.

.

nd then the alternative-number, if imes. The range is 0-10 times.

NetScreen CLI Reference Guide

Example: The following command configures the ISP isp1 as the highest priority

set modem isp isp1 priority 1

queue

set modem queue {...}get modem queue {...}

Example: The following command displays the content of the HDLC rcv queue:

set modem queue rcv-q

retry

set modem retry numberunset modem retry number

Example: The following command sets the number of dial-up retries to 4:

set modem retry 4

settings

set modem settings name_str active | init-strings stringunset modem settings name_strget modem settings

rcv-q Displays contents for the HDLC rcv queue. Used for debugging only

xmt-q Displays contents for the HDLC xmt queue. Used for debugging only

retry Specifies the number of times ScreenOS dials the primary number, athe line is busy or there is no answer from the ISP. The default is 3 t

settings Configures settings for the specified modem.

Page 358: netscreen_CLI

“ip” through “port-mode”

342

erial link:

ce and the modem. The baud rate 5200 bps.

al states.

d the IN table and OUT table

NetScreen CLI Reference Guide

Example: The following command activates settings for the modem usr14400:

set modem settings usr14400 active

speed

set modem speed numberunset modem speed

Example: The following command sets a maximum baud rate of 56Kbps for the s

set modem speed 57600

state

get modem state

stats

get modem stats

speed Specifies the maximum baud rate for the serial link between the devican be 9600, 19200, 38400, 57600, or 115200 bps. The default is 11

state Shows modem state information. Displays failover and call and glob

stats Shows modem status. Displays modem and HDLC layer statistics anstatistics.

Page 359: netscreen_CLI

“ip” through “port-mode”

343

ast-group-policys multicast control traffic to

NetScreen CLI Reference Guide

multicDescription: Use the multicast-group-policy command to define a policy that allowcross the NetScreen device.

Syntax

get

get multicast-group-policy between zone1 zone2

set

set multicast-group-policyfrom zone1

{mgroup { mcst_addr1/mask | any }

to zone2 [ mgroup ][igmp-message |pim-message

{bsr-static-rp [ join-prune ] |join-prune}

[ bi-directional ]

] |mgroup-list id_num

to zone2{igmp-message |pim-message

Page 360: netscreen_CLI

“ip” through “port-mode”

344

NetScreen CLI Reference Guide

{bsr-static-rp [ join-prune ] |join-prune}

[ bi-directional ] ]

}

unset

unset multicast-group-policyfrom zone1

{mgroup { mcst_addr1/mask | any }

to zone2 [ mgroup ][igmp-message |pim-message

{bsr-static-rp [ join-prune ] |join-prune}

[ bi-directional ]

] |mgroup-list id_num

to zone2{igmp-message |pim-message

{bsr-static-rp [ join-prune ] |join-prune}

[ bi-directional ] ]

Page 361: netscreen_CLI

“ip” through “port-mode”

345

onal

tional

hat allows PIM messages

pim-message

one2

... }zone2

zone2 { ... }

o zone2

.

NetScreen CLI Reference Guide

Keywords and Variables

between

get multicast-group policy between zone1 zone2

bi-directional

set multicast-group policy from { ... } to { ... } bi-directiunset multicast-group policy from { ... } to { ... } bi-direc

Example: The following command defines a bi-directional multicast group policy tbetween the trust and untrust zones:

set multicast-group-policy from trust mgroup any to untrust bsr-static-rp join-prune bi-directional

from ... to

set multicast-group policy from zone1 mgroup mcst_addr1 to zmgroup mcst_addr2 { ... }

set multicast-group policy from zone1 mgroup any to zone2 {

set multicast-group policy from zone1 mgroup-list id_num to

unset multicast-group policy from zone1 mgroup mcst_addr1 to

unset multicast-group policy from zone1 mgroup any to zone2

unset multicast-group policy from zone1 mgroup-list id_num t

between Displays the multicast policy configured between the specified zones

bi-directional Specifies that the policy applies to both directions of multicast traffic.

Page 362: netscreen_CLI

“ip” through “port-mode”

346

ages from the Trust zone to the

ust igmp-message

ge

sage

which the zone accepts multicast

nslating a multicast group address

ast groups from which the zone

en the specified zones.

NetScreen CLI Reference Guide

Example: The following command creates a multicast policy allowing IGMP messUntrust zone:

set multicast-group-policy from trust mgroup-list 12 to untr

igmp-message

set multicast-group policy from { ... } to { ... } igmp-messaunset multicast-group policy from { ... } to { ... } igmp-mes

from { ... } to Specifies the two zones between which the policy applies.

• zone1 is the name of the source security zone.

• zone2 is the name of the destination security zone.

• mcst_addr1 is the multicast IP address of the multicast group frompackets

• mcst_addr2 is the translated multicast group address, if you are trafrom one zone to another

• id_num is the ID number of the access list that specifies the multicaccepts multicast packets

igmp-message Specifies a multicast group policy that allows IGMP messages betwe

Page 363: netscreen_CLI

“ip” through “port-mode”

347

e

age

une messages between the

NetScreen CLI Reference Guide

pim-message

set multicast-group policy from { ... } to { ... } pim-messag{ bsr-static-rp | join-prune }

unset multicast-group policy from { ... } to { ... } pim-mess{ bsr-static-rp | join-prune }

pim-message Specifies a multicast group policy that allows PIM BSR and/or join-prspecified zones.

Page 364: netscreen_CLI

“ip” through “port-mode”

348

nrtpr Protocol) packet queues.

een devices are in a es that the primary NetScreen

ter.

NetScreen CLI Reference Guide

Description: Use the nrtp command to clear all NRTP (NetScreen Reliable Transfe

NRTP is for multicasting NSRP control messages to multiple receivers when NetScrredundancy cluster (interconnected through the High Availability ports). NRTP ensurdevice always forwards configuration and policy messages to the backup devices.

Syntax

clear

clear [ cluster ] nrtp queues

get

get nrtp{counters ( all | receive number | send } |group |xmtq}

Keywords and Variables

cluster

clear cluster nrtp queues

cluster Propagates the clear operation to all other devices in a NSRP clus

Page 365: netscreen_CLI

“ip” through “port-mode”

349

that the device receives from ID number that identifies a

ce sends to other devices.

ount of the devices in the group.

responses from other devices.

NetScreen CLI Reference Guide

counters

get nrtp counters ( all | receive number | send }

groups

get nrtp group

queues

clear [ cluster ] nrtp queues

xmtq

get nrtp xmtq

counters Displays statistical information tracked by counters.

• all Displays all counter statistics.

• receive [ number ] Displays only counter statistics for informationother devices in the cluster. The optional number parameter is anparticular device in the cluster.

• send Displays only counter statistics for information that the devi

group Displays the ID numbers of devices belonging to the group, and a c

queues Clears the NRTP packet queues.

xmtq Displays the length of the queue containing packets awaiting ACK

Page 366: netscreen_CLI

“ip” through “port-mode”

350

nsgpication feature on the Gi firewall

ate subscriber returns his IP vulnerable because the session ed and reported, the attacker scriber) or send data to other

ts reassigned to another MS. sing the new MS to be billed for

NetScreen CLI Reference Guide

Description: Use the nsgp command to configure the GPRS Overbilling Attack notif(the server).

An Overbilling attack can occur in various ways. Namely, it can occur when a legitimaddress to the IP pool, at which point an attacker can hijack the IP address, which is is still open. When the attacker takes control of the IP address, without being detectcan download data for free (or more accurately, at the expense of the legitimate subsubscribers.

An Overbilling attack can also occur when an IP address becomes available and geTraffic initiated by the previous MS might be forwarded to the new MS, therefore cauunsolicited traffic.

Syntax

clear

clear nsgp { ip_addr | all }

get

get nsgp [ detail ]

set

set nsgp{context id_num type session zone zone |md5-authentication password |port port_num}

Page 367: netscreen_CLI

“ip” through “port-mode”

351

close active connections on e keyword “all”.

ces only supports the

xt.

er.

or virtual system. At the root

NetScreen CLI Reference Guide

unset

unset nsgp [ context id_num | md5-authentication | port ]

Keywords and Variables

all

clear nsgp all

context

set nsgp context id_num type string zone zone unset nsgp context id_num

detail

get nsgp [ detail ]

all Closes all active connections on the NetScreen device. You can alsoa per IP address basis by entering a specific IP address instead of th

context Creates or deletes a context of a specific type for the specified zone.

• type string Identifies the type of context. Currently NetScreen devi“session” type.

• zone name Identifies the zone for which you are creating the conte

Note that the same context must exist on both the client and the serv

detail Displays NSGP settings and status of contexts within the current root level, this command also displays information for all virtual systems.

Page 368: netscreen_CLI

“ip” through “port-mode”

352

e TCP header. You can only

e vsys level.

ng Attack notifications. The

vsys level.

NetScreen CLI Reference Guide

md5-authentication

set nsgp md5-authentication passwordunset nsgp md5-authentication

port

set nsgp port port_numunset nsgp port

md5-authentication Directs the Gi firewall to enforce the MD5 auth option specified in thspecify one MD5 authentication password per NetScreen device.Note: This command is only available at the root level and not at th

port Identifies the port number used by the Gi firewall to receive Overbillidefault port number is 12521.Note: This command is only available at the root level and not at the

Page 369: netscreen_CLI

“ip” through “port-mode”

353

nsmgmtration and monitoring by t configures multiple NetScreen

ent which resides on the ent system and pushes it to nagement system.

4 Administrator’s Guide.

NetScreen CLI Reference Guide

Description: Use the nsmgmt commands to set up a NetScreen device for configuNetScreen-Security Manager 2004, an enterprise-level management application thadevices from remote hosts.

The nsmgmt command can modify settings for the NetScreen-Security Manager AgNetScreen device. The Agent receives configuration parameters from the managemScreenOS. The Agent also monitors the device and transmits reports back to the ma

For more information, refer to “Adding Devices” in NetScreen-Security Manager 200

Syntax

get

get nsmgmt[proto-dist

{table { bytes | packets } |user-service}

]

set

set nsmgmt{enable |

bulkcli reboot-timeout { number | disable }

Page 370: netscreen_CLI

“ip” through “port-mode”

354

spf | tcp | udp }

le

rface interface ] |

NetScreen CLI Reference Guide

init{id string |installer name name_str password pswd_str |otp string} |

report{alarm { attack | di | other | traffic } enable |log { config | info | self | traffic } enable |proto-dist

{enable |user-service svc_name { ah | esp | gre | icmp | o

{ port_num1-port_num2 }} |

statistics { attack | ethernet | flow | policy } enab}

serverprimary | secondary

{ name_str | ip_addr } [ port number ] [ src-inte}

unset

unset nsmgmt{all |

enable | bulkcli reboot-timeout { number | disable }init { id | installer | otp } |report

{alarm { attack | di | other | traffic } enable |log { config | info | self | traffic } enable |

Page 371: netscreen_CLI

“ip” through “port-mode”

355

le

s.

ssed in seconds). This setting tion drops during an update igured NSM servers once to see if pecified time period before it

NetScreen CLI Reference Guide

proto-dist{enable |user-service svc_name} |

statistics { attack | ethernet | flow | policy } enab}

server { primary | secondary { name_str | ip_addr } }}

Keywords and Variables

all

unset nsmgmt all

bulkcli

set nsmgmt bulkcli reboot-timeout { number | disable }unset nsmgmt bulkcli reboot-timeout { number | disable }

all Unsets all NetScreen-Security Manager management configuration

bulkcli Enables, disables or sets the bulk-CLI reboot timeout value (expredetermines how the device performs rollback when a NSM connecsession. When this happens, the Agent iterates through all the confit can establish another connection. If not, the agent waits for the sreboots the device to roll back the configuration.The range for the reboot-timeout value is 60 through 86400.

Page 372: netscreen_CLI

“ip” through “port-mode”

356

ment server.

server.

between the NetScreen device D to the Management System to

ller name and password, used reen device and the management

evice uses this password one time ntact between the device and the to erase the OTP.

NetScreen CLI Reference Guide

enable

get nsmgmt enableset nsmgmt enableunset nsmgmt enable

init

get nsmgmt initset nsmgmt init id stringset nsmgmt init installer name name_str password pswd_strset nsmgmt init otp stringunset nsmgmt init {...}

enable Enables remote management by initiating contact with the manage

init Sets initialization parameters for interaction with the management

• id string An ID used (only once) during initiation of the connectionand the management server. The NetScreen device passes the Ilook up the One-Time Password in the management database.

• installer name name_str password pswd_str Specifies an insta(only once) during initiation of the connection between the NetScserver.

• otp string Sets the One-Time Password (OTP). The NetScreen dto contact the Security Management system. After initiation of comanagement database, the device executes an unset command

Page 373: netscreen_CLI

“ip” through “port-mode”

357

{ ... }} { ... }

the server.

f alarms are as follows:

more information on such attacks,

ffic alarms.

sage.

are as follows:

in device configuration.

ere changes that occur on the

as those denied by a policy) and ative traffic). The self log displays ation, and service for each

llowing services:

NetScreen CLI Reference Guide

report

set nsmgmt report { alarm | log | proto-dist | statistics } unset nsmgmt report { alarm | log | proto-dist | statistics

report Specifies which event messages the NetScreen device transmits to

alarm Enables the transmission of alarm events. The categories o

• attack Transmits attack alarms such as syn-flag or syn-flood. Forsee “zone” on page 683.

• di Transmits attack alarms generated during Deep Inspection.

• traffic Transmits traffic alarms.

• other Transmits alarms other than attack, Deep Inspection, or tra

The enable switch enables messaging for the specified alarm mes

log Enables the transmission of log events. The categories of logs

• config Transmits log messages for events triggered by changes

• info Transmits low-level notification log messages about non-sevdevice, as when an authentication procedure fails.

• self Transmits log messages concerning dropped packets (such traffic that terminates at the NetScreen device (such as administrthe date, time, source address/port, destination address/port, durdropped packet or session terminating at the NetScreen device.

• user-service svc_name Specifies messages generated by the fo

- ah AH (Authentication Header) service.

- esp ESP (Encapsulating Security Payload) service.

Page 374: netscreen_CLI

“ip” through “port-mode”

358

rs.

records the traffic permitted by n:

ge.

ormation to the server:

stics.

statistics.

tistics.

tics.

essage.

NetScreen CLI Reference Guide

- gre GRE (Generic Routing Encapsulation).

- icmp ICMP (Internet Control Message Protocol).

- ospf OSPF (Open Shortest Path First).

- tcp TCP (Transmission Control Protocol).

- udp UDP (User Datagram Protocol).

The port_num1-port_num2 setting specifies a range of port numbe

• traffic Transmits alarms generated while the device monitors andpolicies. A traffic log notes the following elements for each sessio

- Date and time that the connection started

- Source address and port number

- Translated source address and port number

- Destination address and port number

- The duration of the session

- The service used in the session

The enable switch enables messaging for the specified log messa

statistics Enables the NetScreen device for reporting statistical inf

• attack Enables transmission of messages containing attack stati

• ethernet Enables transmission of messages containing ethernet

• flow Enables transmission of messages containing traffic flow sta

• policy Enables transmission of messages containing policy statis

The enable switch enables messaging for the specified statistical m

Page 375: netscreen_CLI

“ip” through “port-mode”

359

dr } [ port number |

ing protocol distribution

the server.

protocol distribution table.

NetScreen CLI Reference Guide

proto-dist

get nsmgmt proto-dist

server

set nsmgmt server { primary | secondary } { name_str | ip_adsrc-interface ]

proto-dist Sets or displays parameters for transmission of messages concernparameters. The categories of protocol distribution are as follows:

• enable Enables transmission of protocol distribution messages to

• table Displays the number of bytes or packets transmitted to the

server Identifies the Security Management system server.

Page 376: netscreen_CLI

“ip” through “port-mode”

360

nsrpilover cluster, and to create and

urity devices within a defined device from the cluster, and evices in the cluster.

es the same cluster id, you can VSD group at a time. For in another.

and assigns an identical cluster

.

rface command.

NetScreen CLI Reference Guide

Description: Use the nsrp commands to assign a NetScreen security device to a faconfigure a Virtual Security Device (VSD) group for the cluster.

The purpose of a VSD group is to allow failover between two or more NetScreen seccluster. Each VSD group represents a group of devices in a cluster, elects a primaryprovides a virtual security interface (VSI) that external devices use to reference the d

A group may contain every device in the cluster. For example, if you give three deviccreate a VSD group containing all three devices. A device can be in more than one example, a device can be the primary in one VSD group, while serving as a backup

The basic steps needed to set up failover VSD groups are as follows.

1. Set up a cluster of devices using the set nsrp cluster command. This commid to each device.

2. Set up a VSD group for the cluster using the set nsrp vsd-group command

3. Set up a virtual security interface (VSI) for the VSD group using the set inte

Syntax

clear

clear [ cluster ] nsrp counter[packet-fwd |protocol |rto]

Page 377: netscreen_CLI

“ip” through “port-mode”

361

}

NetScreen CLI Reference Guide

exec

exec nsrp{probe interface [ mac_addr ] [ count number ] |sync

{file [ name filename ] from peer |global-config [ check-sum | save ] |rto

{all |arp |attack-db |auth-table |dhcp |dip-in |dns |h323 |l2tp |phase1-SA |pki |rm |rpc |session |vpn |}

{ from peer }} |

vsd-group grp_num mode { backup | ineligible | init | pb}

Page 378: netscreen_CLI

“ip” through “port-mode”

362

NetScreen CLI Reference Guide

get

get nsrp[cluster |counter [ packet-fwd | protocol | rto ] |group |ha-link |monitor [ all | interface | track-ip | zone ] |rto-mirror |track-ip [ ip ip_addr ] |vsd-group [ id id_num | all ]]

set

set nsrp{arp number |auth password pswd_str |cluster [ id number | name name_str ] |config sync |data-forwarding |encrypt password pswd_str |ha-link probe [ interval number ] [ threshold number ]interface interface |link-hold-time number |link-up-on-backup |monitor

{interface interface [ weight number ] |threshold number |track-ip

{ip

Page 379: netscreen_CLI

“ip” through “port-mode”

363

NetScreen CLI Reference Guide

[ ip_addr[interface interface |interval number |method { arp | ping } |threshold number |weight number]

]threshold number |weight number |} |

zone zone [ weight number ]} |

rto-mirror{hb-interval number |hb-threshold number |id id_num { direction { in | out } } |session [ ageout-ack | non-vsi | off ] |sync}

secondary-path interface |track-ip

[ip

[ ip_addr[interface interface |interval number |method { arp | ping } |threshold number |weight number]

]threshold number

Page 380: netscreen_CLI

“ip” through “port-mode”

364

NetScreen CLI Reference Guide

] |vsd-group

{id id_num

[mode ineligible |preempt [ hold-down number ] |priority number] |

hb-interval number |hb-threshold number |init-hold number |master-always-exist}

}

unset

unset nsrp{arp number |auth |cluster id |config sync |data-forwarding |encrypt |ha-link probe [ interval ] [ threshold ] |link-hold-time |link-up-on-backup |monitor

[interface interface [ weight ] |threshold |track-ip weight |zone zone [ weight ]

Page 381: netscreen_CLI

“ip” through “port-mode”

365

NetScreen CLI Reference Guide

][ all ] |

rto-mirror{hb-interval number |hb-threshold number |id id_num { direction { in | out } } |session [ ageout-ack | non-vsi | off ] |syncmaster-always-exist}

secondary-path |track-ip

{ip [ ip_addr ]

[interface |interval number |method { arp | ping } |threshold number |weight number] |

threshold |weight}

vsd-group[all |id number [ mode | preempt | priority ] |hb-interval number |hb-threshold number |init-hold number |master-always-exist]

Page 382: netscreen_CLI

“ip” through “port-mode”

366

en ARP requests:

ordfish”:

ary unit sends out, notifying other

ns using the specified password.

(from 1 to 7, inclusive) to identify

NetScreen CLI Reference Guide

Keywords and Variables

arp

set nsrp arp numberunset nsrp arp number

Example: The following command instructs the NetScreen device to send out sev

set nsrp arp 7

auth

set nsrp auth password pswd_strunset nsrp auth

Example: The following command sets the NSRP authentication password to “sw

set nsrp auth password swordfish

cluster

get nsrp clusterset nsrp cluster id number

arp Sets the number of gratuitous ARP requests that a newly elected primnetwork devices of its presence. The default is 4.

auth Instructs the NetScreen device to authenticate NSRP communicatioValid passwords contain from 1 to 15 characters.

cluster id Assigns the NetScreen device to a cluster, expressed as an integer the cluster.

Page 383: netscreen_CLI

“ip” through “port-mode”

367

]

r.

members of the NSRP cluster. propagates to the other devices in

NetScreen CLI Reference Guide

Example: The following command assigns the NetScreen device to cluster 2:

set nsrp cluster id 2

cluster (clear)

clear cluster nsrp counter [ ... ]

config sync

set nsrp config syncunset nsrp config sync

counter

clear [ cluster ] nsrp counter [ packet-fwd | protocol | rtoget nsrp counter [ packet-fwd | protocol | rto ]

cluster Propagates the clear operation to all other devices in a NSRP cluste

config sync Enables or disables synchronization of device configuration betweenAfter you enable this setting, any configuration change automaticallythe cluster.

counter Clears or displays the NSRP counter values.

• packet-fwd Clears or displays packet-forwarding counters only.

• protocol Clears or displays NSRP protocol counters only.

• rto Clears or displays RTO message counters only.

Page 384: netscreen_CLI

“ip” through “port-mode”

368

”:

led.

ified password. Valid passwords

NetScreen CLI Reference Guide

data-forwarding

set nsrp data-forwardingunset nsrp data-forwarding

encrypt password

set nsrp encrypt password pswd_strunset nsrp encrypt

Example: The following command sets the NSRP encryption password to “manta

set nsrp encrypt password manta

group

get nsrp group

data-forwarding Enables of disables packet forwarding. The default setting is enab

encrypt password Specifies that NSRP communications be encrypted using the speccontain from 1 to 15 characters.

group Displays information on the VSD group.

Page 385: netscreen_CLI

“ip” through “port-mode”

369

r ]

faces that are bound to the HA link is considered to be up. If the

from the peer reaches or exceeds the following optional parameters:

requests are sent. Enter a number ts are sent every second.

the number of consecutive probe ceeds the threshold, the HA link is ault threshold is 5.

nformation on interfaces, see

NetScreen CLI Reference Guide

ha-link probe

set nsrp ha-link probe [ interval number ] [ threshold numbeunset nsrp ha-link probe [ interval ] [ threshold ]

interface

set nsrp interface interface

Example: The following command specifies that the NSRP interface is ethernet4:

set nsrp interface ethernet4

link

get nsrp link

ha-link probe Specifies the automatic sending of NSRP probe requests on all interzone. If a reply is received from the peer within the threshold, the HAnumber of consecutive probe requests sent without receiving a replythe threshold, the HA link is considered to be down. You can specify

• interval number Specifies the interval, in seconds, at which probe between 0 and 255. If you do not specify an interval, probe reques

• threshold number Specifies the failure threshold for the HA link. Ifrequests sent without receiving a reply from the peer reaches or exconsidered to be down. Enter a value between 0 and 255. The def

interface The name of the interface to serve as the high-availability port. For i“Interface Names” on page A-I.

link Displays HA link information

Page 386: netscreen_CLI

“ip” through “port-mode”

370

the link with the peer device.

e, or tracked IP addresses) to arameters:

D) to which the threshold or VSD, the threshold or monitored

. If you specify vsd-group id, only

be monitored and the weight that default weight is 255.

NetScreen CLI Reference Guide

link-hold-time

set nsrp link-hold-time numberunset nsrp link-hold-time

link-up-on-backup

set nsrp link-up-on-backupunset nsrp link-up-on-backup

monitor

get nsrp monitor [ zone | interface | track-ip ] [ all ]set nsrp [ vsd-group id id_num ] monitor { ... }unset nsrp [ vsd-group id id_num ] monitor { ... }

link-hold-time The delay time (in seconds) before the NetScreen device brings up

link-up-on-backup Specifies that the link is always up on the backup device.

monitor Specifies monitoring of NSRP objects (a physical interface, a zondetermine VSD or device failure. You can specify the following p

• vsd-group id id-num Identifies the Virtual Security Device (VSmonitored objects you configure applies. If you do not specify aobjects you configure apply to the entire device.

• all Displays monitoring information for the device and all VSDsmonitoring information for the VSD is displayed.

• interface interface [ weight number ] Identifies the interface tofailure of the interface contributes to the failover threshold. The

Page 387: netscreen_CLI

“ip” through “port-mode”

371

nes the failure of a specific VSD (if d). If the cumulative weight of the

racked IP addresses) exceeds the lue is 255.

ables tracked IP object monitoring P addresses) contributes to the 55. The threshold value is the re of the tracked IP object. The IP addresses to determine VSD or ing:

which the NetScreen device t specify an interface, ping tries to tries to find an outgoing interface

king attempt fails.

ping or ARP attempts to the default is 1.

g the specified IP address. The

empts that can occur before the e default is 3.

he specified IP address. The

d and the weight that failure of all old. The default weight is 255.

NetScreen CLI Reference Guide

• threshold number Specifies a failover threshold which determia VSD is specified) or failure of the device (if no VSD is specifiefailure of all monitored objects (a physical interface, a zone, or tthreshold, the VSD or the device fails. The default threshold va

• track-ip weight number [ threshold number ] [ ip ip_addr ] Enand the weight that failure of the tracked IP object (all tracked Idevice or VSD failover threshold. The default weight value is 2total weight of failed tracked IP addresses that determines failudefault threshold value is 255. Specifies monitoring of tracked device failure. For each ip ip_addr, you can configure the follow

- interface interface Specifies the outgoing interface throughperforms tracking. for the specified IP address. If you do nofind an outgoing interface from routing table entries and ARPwithin the same subnet. If an interface is not found, the trac

- interval number Specifies the interval, in seconds, betweenspecified IP address. Enter a value between 1 and 200. The

- method { arp | ping } Specifies the method used for trackindefault is ping.

- threshold number Defines the number of failed tracking atttracking of the specified IP address is considered failed. Th

- weight number Defines the weight of the failed tracking of tdefault is 1.

• zone zone [ weight number ] Identifies the zone to be monitorephysical interfaces in the zone contributes to the failover thresh

Page 388: netscreen_CLI

“ip” through “port-mode”

372

uest every second on an HA zone eives a reply, the HA link is s a reply, the HA link is considered -link probe” on page 369.)

are sent. You must specify an

e on a peer device. If you do not RP MAC address to send the

the probe request. Enter a

p to back up runtime objects

cts synchronize after execution of

me.

id_num, an integer value between RTO mirror group direction is

NetScreen CLI Reference Guide

probe

exec nsrp probe interface [ mac_addr ] [ count number ]

rto-mirror

get nsrp rto-mirrorset nsrp rto-mirror { ... }unset nsrp rto-mirror { ... }

probe Directs the device to immediately begin sending an NSRP probe reqinterface, for the number of times specified by count. If the peer recconsidered to be up. (If the request times out before the peer receiveto be down.) The device takes no action if there is no reply. (See “ha

• interface Identifies the HA zone interface on which probe requestsinterface that is bound to the HA zone.

• mac_addr Identifies the destination MAC address of an HA interfacspecify a destination MAC address, the device uses the default NSprobe request.

• count number Specifies the number of times that the device sendsnumber greater than or equal to 1. (The default is 1.)

rto-mirror Creates an optional RTO mirror between two devices in a VSD grou(RTOs).In most cases, using this option is not necessary. Normally, RTO objethe set nsrp rto sync command.A NetScreen device can belong to only one RTO mirror group at a ti

• id id_num Identifies the VSD group using its identification number 1 and 127 inclusive. The direction setting determines whether theinbound or outbound.

• hb-interval number Specifies the heartbeat interval in seconds.

Page 389: netscreen_CLI

“ip” through “port-mode”

373

ion is inbound:

e is ethernet5:

inimum threshold value is 16

ckup device sends an ack out. The session age-out value of

from one unit to the other.

uting the file option without

NetScreen CLI Reference Guide

Example: The following command specifies that the RTO mirror group (10) direct

set nsrp rto-mirror id 10 direction in

secondary-pathset nsrp secondary-path interfaceunset nsrp secondary-path

Example: The following command specifies that the secondary NSRP link interfac

set nsrp secondary-path ethernet5

syncexec nsrp sync { ... }

• hb-threshold number Specifies the heartbeat-lost threshold. The mheartbeats.

• session ageout-ack Specifies a time value based on which the bamessage to the primary device to refresh its sessions or time thema backup device is eight times that of the primary device.

• session non-vsi Enables the synchronization of non-vsi sessions.

• session off Disables the RTO session.

• sync Enables RTO object synchronization.

secondary-path Specifies a secondary NSRP link interface.

sync Specifies the name of a particular configuration, file, or RTO to copy

• file Specifies synchronization of the files in flash memory.

- name filename specifies a particular file in flash memory. (Execspecifying a file name copies all the files.)

- from peer specifies all files from the peer device.

Page 390: netscreen_CLI

“ip” through “port-mode”

374

all runtime objects:

igurations. The check-sum switch ynchronizes the PKI configuration

) in the RTO mirror.

n.

information.

nformation.

sses table.

Associations)

NetScreen CLI Reference Guide

Example: The following command instructs the NetScreen device to synchronize

exec nsrp sync rto all from peer

• global-config Specifies synchronization of the current device confcompares the check-sum after synchronization. The save switch sand saves the synchronization configuration to flash memory.

• rto Specifies synchronization of the current runtime objects (RTOs

- all Specifies all possible realtime objects.

- arp Specifies the ARP (Address Resolution Protocol) informatio

- attack-db Specifies the Deep Inspection attack database table

- auth-table Specifies the authentication table information.

- dhcp Specifies DHCP (Dynamic Host Configuration Protocol) i

- dip-in Specifies information on the incoming dynamic IP addre

- dns Specifies the DNS (Domain Name Service) information.

- h323 Specifies H.323 information.

- pki Specifies certificate information.

- phase1-sa Specifies information on IKE Phase-1 SAs (Security

- rm Specifies Resource Manager information.

- rpc Specifies information on RPC mapping.

- session Specifies the session information.

- vpn Specifies all VPN (Virtual Private Network) information.

Page 391: netscreen_CLI

“ip” through “port-mode”

375

et4 to a device at IP address

nnection between a NetScreen s the other network device to

lt values.

tScreen device performs the path cally chooses the interface for IP e device tries to find an outgoing vice tries to find an outgoing

e tracking attempt fails.

tracking attempts. Required

ing. The default is ping.

ts that can occur before the

een 1 and 255 inclusive. The

that can occur before the device

ddresses that determine failover.

NetScreen CLI Reference Guide

track-ip

get nsrp track-ip [ ip ip_addr ]set nsrp track-ip [ ... ]unset nsrp track-ip [ ... ]

Example: The following command enables path tracking through interface ethern172.16.10.10:

set nsrp track-ip ip 172.16.10.10 interface ethernet4

track-ip Enables path tracking, which is a means for checking the network cointerface and that of another device. The IP address ip_addr identifiecheck.Executing unset nsrp track ip resets the track options to their defau

• ip ip_addr

- interface interface Specifies the interface through which the Netracking. If you do not specify an interface, the device automatitracking using either the ping or ARP method. If ping is used, thinterface from entries in the routing table. If ARP is used, the deinterface within the same subnet. If an interface is not found, th

- interval number Specifies the interval in seconds between pathvalue is between 1 and 200. The default is 1.

- method { arp | ping } Specifies the method used for path track

- threshold number Defines the number of failed tracking attemptracking of the IP address is considered failed. The default is 3.

- weight number Defines the path weight. Valid weights are betwdefault weight is 1.

• threshold number Defines the number of failed tracking attempts fails over. The default is 255.

• Weight number Defines the sum of the weights of the tracked IP aThe default is 255.

Page 392: netscreen_CLI

“ip” through “port-mode”

376

at contains all members belonging rimary unit from the cluster it p through the group’s virtual

ce. The ineligible switch specifies estart. (This may be necessary for ber mode ineligible specifies that

ps its primary status until the unit ry device waits for the specified nds inclusive. The default is 3.

teger from 1 to 254, inclusive. The er order determines which unit is power up simultaneously, and unit with the number closest to 1

al state (init mode). This value can

e can be an integer from 200 to

NetScreen CLI Reference Guide

vsd-groupget nsrp vsd-group [ id id_num | all ]set nsrp vsd-group [ ... ]unset nsrp vsd-group [ ... ]

vsd-group Configures a VSD group for a cluster.id id_numCreates a VSD group, identified by id_num (from 1 to 8, inclusive), thto a single cluster of devices. Once created, a VSD group elects a pcontains. Other devices reference the device cluster in the VSD grousecurity identification (VSI).

• mode ineligible Determines the running mode of the security devithat the local device is not intended for failover, even after system radministrative reasons.) Executing unset nsrp vsd-group id numthe device is eligible again.

• preempt [ hold-down number ] Determines if the primary unit keeitself relinquishes that status. To prevent rapid failovers, the primahold-down interval, expressed as a number between 0 to 600 seco

• priority number The priority level of the device, expressed as an inpriority level determines the failover order for the device. The failovthe primary unit when two NetScreen devices in a redundant groupwhich backup unit becomes the next primary during a failover. (Thebecomes the primary unit.)

init-holdThe number of heartbeats that occur before the system exits the initibe an integer from 5 to 255. The default is 5.

hb-interval numberSpecifies the heartbeat interval, expressed in milliseconds. This valu1000. The default is 1000.

Page 393: netscreen_CLI

“ip” through “port-mode”

377

e exits the initial state:

en the primary unit fails:

allowed before failure. This value

if all units in the NSRP cluster fail xist, and two units tracking an IP traffic cannot go through. If you ts a primary unit, which remains

primary device fails.

rimary device.

t joins the VSD group. (At the end ch as primary, backup, or primary

the primary unit fails.

NetScreen CLI Reference Guide

Examples: The following command disables the local device for failover:

set nsrp vsd-group id 2 mode ineligible

The following command specifies that ten heartbeats must occur before the devic

set nsrp vsd-group init-hold 10

vsd-group (exec)

exec nsrp vsd-group grp_num mode { ... }

Example: The following command instructs the NetScreen device to take over wh

exec nsrp vsd-group 2 mode pb

hb-threshold numberSpecifies the heartbeat-lost threshold, the number of lost heartbeatscan be an integer from 3 to 255. The default is 3.

master-always-existDirects the system to elect a primary unit and keep it operative even(by monitoring result). For example, if you disable master-always-elater fail due to monitoring results, both units become inoperable andenable master-always-exist, and both units fail, the cluster still elecoperable, thus allowing traffic through.

vsd-group grp_num mode

Specifies a VSD group and the NetScreen device’s new mode.

• In backup mode, the device works for the primary device when the

• In ineligible mode, the device is unavailable as a backup for the p

• In init mode, the device is in the transient state that occurs when iof this initial hold up time, the device transitions to another state, subackup.)

• In pb (primary backup) mode, the unit is the first to take over when

Page 394: netscreen_CLI

“ip” through “port-mode”

378

liseconds, or one second).

ices

NetScreen CLI Reference Guide

Defaults

The default value of preempt [ hold-down number ] is zero.

The default value of vsd-group id id_num priority number is 100.

The default value of vsd-group id id_num hb-interval number is 1000 (1,000 mil

Creating an NSRP Cluster

The following commands set up an NSRP cluster consisting of two NetScreen dev

• Two VSD groups for the cluster

• VSI for the VSD group

• RTO object synchronization enabled, including session synchronization

On Device A

Trust Zone Redundant Interface and Manage IP

set interface redundant2 zone trustset interface ethernet2/1 group redundant2set interface ethernet2/2 group redundant2set interface redundant2 manage-ip 10.1.1.3

Cluster and VSD Groups

set nsrp cluster id 1set nsrp vsd-group id 0 preempt hold-down 10set nsrp vsd-group id 0 preemptset nsrp vsd-group id 0 priority 1set nsrp vsd-group id 1set nsrp monitor interface redundant2set nsrp rto-mirror syncsave

Page 395: netscreen_CLI

“ip” through “port-mode”

379

gateway 210.1.1.2501 gateway 210.1.1.250

NetScreen CLI Reference Guide

On Device B

Trust Zone Redundant Interface and Manage IP

set interface redundant2 zone trustset interface ethernet2/1 group redundant2set interface ethernet2/2 group redundant2set interface redundant2 manage-ip 10.1.1.4

Cluster and VSD Groups

set nsrp cluster id 1set nsrp rto-mirror syncset nsrp vsd-group id 1 priority 1set nsrp vsd-group id 1 preempt hold-down 10set nsrp vsd-group id 1 preemptset nsrp monitor interface redundant2set nsrp arp 4set arp always-on-dest

Untrust Zone Redundant Interface

set interface redundant1 zone untrustset interface ethernet1/1 group redundant1set interface ethernet1/2 group redundant1

Virtual Security Interfaces

set interface redundant1 ip 210.1.1.1/24set interface redundant2 ip 10.1.1.1/24set interface redundant1:1 ip 210.1.1.2/24set interface redundant2:1 ip 10.1.1.2/24

Routes

set vrouter untrust-vr route 0.0.0.0/0 interface redundant1 set vrouter untrust-vr route 0.0.0.0/0 interface redundant1:save

Page 396: netscreen_CLI

“ip” through “port-mode”

380

ntpNetwork Time Protocol (SNTP).

uter clocks in the Internet. This d accuracy. To enable the

NetScreen CLI Reference Guide

Description: Use the ntp commands to configure the NetScreen device for Simple

SNTP is a simplified version of NTP, which is a protocol used for synchronizing compversion is adequate for devices that do not require a high level of synchronization anSNTP feature, use the set clock ntp command.

Syntax

exec

exec ntp [ server { backup1 | backup2 | primary } ] update

get

get ntp

set

set ntp{auth { preferred | required } |interval number |max-adjustment number |no-ha-sync |server

{ip_addr | dom_name |backup1 { ip_addr | dom_name } | backup2 { ip_addr | dom_name } | key-id number preshare-key string |

Page 397: netscreen_CLI

“ip” through “port-mode”

381

NetScreen CLI Reference Guide

src-interface interface }

timezone number1 number2}

unset

unset ntp { auth | interval | max-adjustment | no-ha-sync | server { backup1 | backup2 | key-id | src-interface } |interval | timezone }

Page 398: netscreen_CLI

“ip” through “port-mode”

382

e its clock time every 20

e NetScreen device and the NTP

must authenticate all NTP packets device and the NTP server the preshared key over the

first must try to authenticate all ntication information—key id and the NetScreen device then sends

a key id and preshared key to at

time by synchronizing with the 440 minutes (24 hours).

NetScreen CLI Reference Guide

Keywords and Variables

auth

set ntp auth { preferred | required }

interval

set ntp interval numberunset ntp interval

Example: The following command configures the NetScreen device to synchronizminutes:

set ntp interval 20

auth Configures an authentication mode to secure NTP traffic between thserver.

• required The Required mode specifies that the NetScreen device using the key id and preshared key information that the NetScreenpreviously exchanged out of band (the device does not exchange network).

• preferred The Preferred mode specifies that the NetScreen deviceNTP packets by sending out an update request that includes authechecksum—same as for the Required mode. If authentication fails,out another update request without the authentication information.

Note: Before you can set an authentication mode, you must assign least one of the NTP servers configured on the NetScreen device.

interval Defines in minutes how often the NetScreen device updates its clockNTP server. The range for the synchronization interval is from 1 to 1

Page 399: netscreen_CLI

“ip” through “port-mode”

383

key string

the maximum acceptable time received from a NTP server. lculates the time difference nly if the time difference between

t to synchronize its peer device

etScreen device can synchronize

h the NetScreen device can

NetScreen CLI Reference Guide

max-adjustment

set ntp max-adjustment numberunset ntp max-adjustment

no-ha-sync

set ntp no-ha-syncunset ntp no-ha-sync

server

set ntp server { ip_addr | dom_name }set ntp server key-id number preshare-key stringset ntp server { backup1 | backup2 } { ip_addr | dom_name }set ntp server { backup1 | backup2 } key-id number preshare-unset ntp server { ... }

max-adjustment Configures a maximum time adjustment value. This value representsdifference between the NetScreen device system clock and the timeWhen receiving a reply from a NTP server, the NetScreen device cabetween its system clock and the NTP server and updates its clock othe two is within the maximum time adjustment value that you set.

no-ha-sync In a high-availability configuration, instructs the NetScreen device nowith the NTP time update.

server • ip_addr The IP address of the primary NTP server with which the Nits system clock time.

• dom_name The domain name of the primary NTP server with whicsynchronize its system clock time.

Page 400: netscreen_CLI

“ip” through “port-mode”

384

ver with which the NetScreen ry server is not available.

TP server with which the e the primary server is not

tication purposes.

er for authentication purposes.

tion purposes.

r authentication purposes.

ses to send NTP requests.

-12 and 12 inclusive. A value of nutes.

th the time setting on an NTP

NetScreen CLI Reference Guide

timezone

set ntp timezone number1 number2unset ntp timezone

Example: The following command sets the Time Zone to Greenwich Mean time:

set ntp timezone 0

update

exec ntp update

• backup1 | backup2

- ip_addr The IP address of the first (or second) backup NTP serdevice can synchronize its system clock time in case the prima

- dom_name The domain name of the first (or second) backup NNetScreen device can synchronize its system clock time in casavailable.

- key-id number Assigns a key id to the current server for authen

- preshare key Assigns a preshared key to the current serv

• key-id number Assigns a key id to the current server for authentica

- preshare key Assigns a preshared key to the current server fo

• src-interface interface Indicates the source interface the devices u

timezone Defines the Time Zone, expressed as an integer number1 between zero denotes GMT (Greenwich Mean Time). number2 expresses mi

update InstructsUpdates the time setting on a NetScreen device to synchronize it wiserver.

Page 401: netscreen_CLI

“ip” through “port-mode”

385

osperating system of the

ating system.

NetScreen CLI Reference Guide

Description: Use the os commands to display kernel and task information for the oNetScreen device.

Syntax

get

get os { cost | flow | kernel | misc | task name_str }

Keywords and Variables

cost

get os cost

flow

get os flow

kernel

get os kernel

cost Displays the amount of processor time used by elements of the oper

flow Displays flow statistics.

kernel Displays kernel statistics.

Page 402: netscreen_CLI

“ip” through “port-mode”

386

NetScreen CLI Reference Guide

misc

get os misc

task

get os task name_str

misc Displays miscellaneous information.

task Displays information on a specified task (name_str).

Page 403: netscreen_CLI

“ip” through “port-mode”

387

SPF Commands NetScreen virtual router.

NetScreen CLI Reference Guide

ODescription: Use the ospf context to begin configuring OSPF routing protocol for a

Context Initiation

Initiating the ospf context can take up to four steps.

1. Enter the vrouter context by executing the set vrouter command.

set vrouter vrouter

For example:

set vrouter trust-vr

2. Set the router ID for this virtual routing instance.

set router-id { id_num | ip_addr }

For example:

ns(trust-vr)-> set router-id 172.16.10.10

3. Enter the ospf context by executing the set protocol ospf command.

ns(trust-vr)-> set protocol ospf

4. Enable OSPF protocol (it is disabled by default).

ns(trust-vr/ospf)-> set enable

Page 404: netscreen_CLI

“ip” through “port-mode”

388

y the default route of the current

stination. (Any entry with a more

ual routing instance.r virtual routing instances.

the OSPF virtual routing instance.

o automatically create virtual links.g process of creating each virtual nconnected segments that cannot

configure the OSPF local virtual

t OSPF link state database.

e current routing instance.

NetScreen CLI Reference Guide

OSPF Command List

The following commands are executable in the ospf context.

advertise-def-route Use the advertise-def-route commands to advertise or displavirtual routing instance (0.0.0.0/0) in all areas.Every router has a default route entry, which matches every despecific prefix overrides the default route entry.)Command options: get, set, unset

area Use the area commands to configure an area for an OSPF virtAn OSPF area is a region that contains a collection of routers oCommand options: get, set, unset

authentication Use the authentication command to display authentication forCommand options: get

auto-vlink Use the auto-vlink commands to direct the local virtual router tUsing automatic virtual links replaces the more time-consuminlink manually. A virtual link is a conveyance that enables two ureach a backbone router to connect with each other.Command options: get, set, unset

config Use the config command to display all commands executed torouting instance.Command options: get

database Use the database command to display details about the currenCommand options: get

enable Use the enable commands to enable or disable OSPF from thCommand options: set, unset

Page 405: netscreen_CLI

“ip” through “port-mode”

389

hreshold. When a neighbor device ackets, the virtual router drops the

sence of a routing instance on the

router.

te Advertisement (LSA) threshold. virtual router with LSA packets,

e device, network, and routing

devices.

nt protocol than the one used by

de:

igned to it (connected)

NetScreen CLI Reference Guide

hello-threshold Use the hello-threshold commands to set or display the hello texceeds this threshold by flooding the virtual router with hello pextra packets.A Hello packet is a broadcast message that announces the prenetwork.Command options: get, set, unset

interface Use this command to display all OSPF interfaces on the virtual Command options: get

lsa-threshold Use the lsa-threshold commands to set or display the Link StaWhen a neighbor device exceeds this threshold by flooding thethe virtual router drops the extra packets.Link State Advertisements (LSAs) enable OSPF routers to makinformation available for the link state database.Command options: get, set, unset

neighbor Use the neighbor command to display details about neighbor Command options: get

redistribute Use the redistribute commands to import routes from a differethe current virtual routing instance.The types of routing protocols from which to import routes inclu

• manually-created routes (static)

• routes from BGP (bgp)

• routes that have at least one interface with an IP address ass

• routes from RIP (rip)

• routes that have already been imported (imported).

Command options: set, unset

Page 406: netscreen_CLI

“ip” through “port-mode”

390

default route learned from OSPF

efault route matches every default route entry.)

jacency ends.

ethods consistent with standards

t routes imported from a protocol

for routes imported from a protocol

packets, link state packets, ets dropped, errors, and other nce.

ated in the current OSPF virtual

distribution.nstance from a router running a ed (or summarized) address that zing multiple addresses, you allow ute, thus simplifying the process.

NetScreen CLI Reference Guide

reject-default-route Use the reject-default-route commands to reject or restore the(0.0.0.0/0) in the current routing instance.Every router has a default route entry in its routing table. This ddestination. (Any entry with a more specific prefix overrides theCommand options: get, set, unset

retransmit Use the retransmit commands to retransmit packets before adCommand options: set, unset

rfc-1583 Use the rfc-1583 commands to use routing table calculation mspecified in the Request For Comments 1583 document.Command options: get, set, unset

routes-redistribute Use the routes-redistribute command to display details abouother than OSPF.Command options: get

rules-redistribute Use the rules-redistribute command to display conditions set other than OSPF.Command options: get

statistics Use the statistics command to display information about Hellodatabase descriptions, Shortest Path First (SPF) packets, packtraffic statistics related to the current OSPF virtual routing instaCommand options: get

stub Use the stub command to display details about a stub area crerouting instance.Command options: get

summary-import Use the summary-import commands to summarize a route reAfter importing a series of routes to the current OSPF routing idifferent protocol, you can bundle the routes into one generalizuses the same network stem of the prefix address. By summarithe OSPF routing instance to treat a series of routes as one roCommand options: get, set, unset

Page 407: netscreen_CLI

“ip” through “port-mode”

391

routing instance.ect when the backbone router

rtual routing instance neighbor.

NetScreen CLI Reference Guide

vlink Use the vlink commands to create a virtual link for the current A virtual link is a conveyance that allows two segments to connbridging them cannot reach either segment.Command options: get, set, unset

vneighbor Use the vneighbor command to display information about a viCommand options: get

Page 408: netscreen_CLI

“ip” through “port-mode”

392

vertise-def-routefault route of the current virtual

ntry with a more specific prefix

spf context. (See “Context

NetScreen CLI Reference Guide

adDescription: Use the advertise-def-route commands to advertise or display the derouting instance (0.0.0.0/0) in all areas.

Every router has a default route entry, which matches every destination. Any route ethan the default route entry overrides the default entry.

Before you can execute the advertise-def-route commands, you must initiate the oInitiation” on page 387.)

Syntax

get

get advertise-def-route

set

set advertise-def-route{always metric number [ preserve-metric ] |metric number | preserve-metric}

metric-type { 1 | 2 }

unset

unset advertise-def-route

Page 409: netscreen_CLI

“ip” through “port-mode”

393

| 2 }

{ 1 | 2 }

pe { 1 | 2 }

nditions, even if there is no default fy the metric parameter; you can ify always, only a non-OSPF ust specify either the metric or

with the default route. Enter a y the always option.

default route. A type 1 route is a

default route. A type 2 route is a

tric when the route is redistributed.

NetScreen CLI Reference Guide

Keywords and Variables

always

set advertise-def-route always { ... }

metric

set advertise-def-route always metric number metric-type { 1

metric-type

set advertise-def-route [ always ] metric number metric-type

preserve-metric

set advertise-def-route [ always ] preserve-metric metric-ty

always Directs the routing instance to advertise the default route under all coroute in the routing table. If you specify always, you must also specioptionally specify the preserve-metric parameter. If you do not specactive default route is advertised. If you do not specify always, you mpreserve-metric option.

metric Specifies the metric (cost), which indicates the overhead associatednumber between 1-15. You must specify this parameter if you specif

metric-type Specifies the external route type to determine path preference.

• 1 Directs the routing instance to use a Type 1 route to evaluate thecomparable route, with a lower cost than a type 2 route.

• 2 Directs the routing instance to use a Type 2 route to evaluate thenon-comparable route, with a higher cost than a type 1 route.

preserve-metric Instructs the NetScreen device to use the original (source) route me

Page 410: netscreen_CLI

“ip” through “port-mode”

394

areaing instance.

nces.

e “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the area commands to configure an area for an OSPF virtual rout

An OSPF area is a region that contains a collection of routers or virtual routing insta

Before you can execute the area commands, you must initiate the ospf context. (Se387.)

Syntax

get

get area [ id_num | ip_addr ]

set

set area { id_num | ip_addr }[metric-default-route number |no-summary |nssa |range ip_addr/mask { advertise | no-advertise } |stub |type-default-route { 1 | 2 }]

unset

unset area { id_num | ip_addr }[metric-default-route number |no-summary |nssa |

Page 411: netscreen_CLI

“ip” through “port-mode”

395

efault route. The default metric is

vertised into the area. By default,

NetScreen CLI Reference Guide

range ip_addr/mask |stubtype-default-route { 1 | 2 }]

Keywords and Variables

Variable Parameters

get area [ id_num | ip_addr ]set area { id_num | ip_addr }unset area { id_num | ip_addr }

metric-default-route

set area id_num metric-default-route numberunset area id_num metric-default-route number

no-summary

set area id_num no-summaryunset area id_num no-summary

ip_addr The IP address that identifies the area.

id_num The OSPF area ID that identifies the area.

metric-default-route

(NSSA and stub areas only) Specifies the metric for the advertised d1. Enter a number between 1-65535.

no-summary (NSSA and stub areas only) Prevents summary LSAs from being adsummary LSAs are advertised into the area.

Page 412: netscreen_CLI

“ip” through “port-mode”

396

e }

ry LSAs. You can specify multiple ses are advertised inside the area

ute. The default metric type is 1.

NetScreen CLI Reference Guide

nssa

set area id_num nssaunset area id_num nssa

range

set area id_num range ip_addr/mask { advertise | no-advertisunset area id_num range ip_addr/mask

stub

set area id_num stubunset area id_num stub

type-default-route

set area id_num type-default-route { 1 | 2 }unset area id_num type-default-route { 1 | 2 }

nssa Specifies that the area is a “not so stubby area.”

range (All areas) Summarizes a specified range of IP addresses in summaranges for the area. You can specify whether the summarized addresor not with the advertise and no-advertise keywords.

stub Specifies the area is a stub area.

type-default-route

(NSSA area only) Specifies the external metric type for the default roSpecify either 1 or 2.

Page 413: netscreen_CLI

“ip” through “port-mode”

397

authenticationn for the OSPF virtual routing

ntext. (See “Context Initiation”

NetScreen CLI Reference Guide

Description: Use the authentication command to display authentication informatioinstance.

Before you can execute the authentication command, you must initiate the ospf coon page 387.)

Syntax

get

get authentication

Keywords and Variables

None.

Page 414: netscreen_CLI

“ip” through “port-mode”

398

auto-vlinkils about virtual links.

each virtual link manually. A h a backbone router to connect

xt. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the auto-vlink commands to automatically create or display deta

Using automatic virtual links replaces the more time-consuming process of creating virtual link is a conveyance that enables two unconnected segments that cannot reacwith each other.

Before you can execute the auto-vlink commands, you must initiate the ospf contepage 387.)

Syntax

get

get auto-vlink

set

set auto-vlink

unset

unset auto-vlink

Keywords and Variables

None.

Page 415: netscreen_CLI

“ip” through “port-mode”

399

configre the OSPF local virtual

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the config command to display all commands executed to configurouting instance.

Before you can execute the config command, you must initiate the ospf context. (S387.)

Syntax

get

get config

Keywords and Variables

None.

Page 416: netscreen_CLI

“ip” through “port-mode”

400

database database.

(See “Context Initiation” on

router | summary

172.16.10.10:

vertising router (ip_addr).

NetScreen CLI Reference Guide

Description: Use the database command to display details about the current OSPF

Before you can execute the database command, you must initiate the ospf context.page 387.)

Syntax

get

get database[ detail ] [ area [ number | ip_addr ] ]

[ asbr-summary | external | network | nssa-external |[adv-router ip_addr |self-originate]

[ link-state-id ip_addr ]]

Keywords and Variables

adv-router

get database [ ... ] adv-router ip_addr [ ... ]

Example: The following command displays the LSAs from a router with router ID

get database adv-router 172.16.10.10

adv-router Displays the LSAs (Link State Advertisements) from the specified ad

Page 417: netscreen_CLI

“ip” through “port-mode”

401

rea (4):

NetScreen CLI Reference Guide

area

get database [ ... ] area [ number | ip_addr ] [ ... ]

Example: The following command displays the LSAs from an area (4):

get database area 4

detail

get database detail [ ... ]

Example: The following command generates a detailed display of LSAs from an a

get database detail area 4

external

get database [ ... ] external [ ... ]

Example: The following command displays external LSAs:

get database external

link-state-id

get database { ... } link-state-id ip_addr

area Displays the LSAs in the current area.

detail Displays detailed information.

external Displays external LSAs.

link-state-id Displays the LSA with a specified link-state ID (ip_addr).

Page 418: netscreen_CLI

“ip” through “port-mode”

402

with link-state ID 172.16.1.1:

:

NetScreen CLI Reference Guide

Example: The following command generates a detailed display of external LSAs

get database detail external link-state-id 172.16.1.1

network

get database [ ... ] network [ ... ]

Example: The following command displays network LSAs:

get database network

nssa-external

get database [ ... ] nssa-external [ ... ]

Example: The following command displays external LSAs for not-so-stubby areas

get database nssa-external

router

get database [ ... ] router [ ... ]

Example: The following command displays router LSAs:

get database router

network Displays the network LSAs.

nssa-external Displays the not-so-stubby areas (NSSAs) external LSAs.

router Displays router LSAs.

Page 419: netscreen_CLI

“ip” through “port-mode”

403

NetScreen CLI Reference Guide

self-originate

get database [ ... ] self-originate [ ... ]

Example: The following command displays self-originated LSAs:

get database self-originate

summary

get database [ ... ] summary [ ... ]

Example: The following command displays summary LSAs:

get database summary

self-originate Displays self-originated LSAs.

summary Displays summary LSAs.

Page 420: netscreen_CLI

“ip” through “port-mode”

404

enablet routing instance.

t. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the enable commands to enable or disable OSPF from the curren

Before you can execute the set enable command, you must initiate the ospf contexpage 387.)

Syntax

set

set enable

unset

unset enable

Keywords and Variables

None.

Page 421: netscreen_CLI

“ip” through “port-mode”

405

hello-thresholdld. When a neighbor device ter drops the extra packets. A

nce on the network.

ontext. (See “Context Initiation”

in the hello interval to 1000:

m a neighbor in the hello interval.

NetScreen CLI Reference Guide

Description: Use the hello-threshold commands to set or display the hello threshoexceeds this threshold by flooding the virtual router with hello packets, the virtual rouhello packet is a broadcast message that announces the presence of a routing insta

Before you can execute the hello-threshold commands, you must initiate the ospf con page 387.)

Syntax

get

get hello-threshold

set

set hello-threshold number

unset

unset hello-threshold

Keywords and Variables

Variable Parameter

set hello-threshold number

Example: The following command sets the maximum number of packets to allow

ns(trust-vr/ospf)-> set hello-threshold 1000

number The maximum number of hello packets the virtual router accepts fro

Page 422: netscreen_CLI

“ip” through “port-mode”

406

interface

(See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use this command to display all OSPF interfaces on the virtual router.

Before you can execute the interface command, you must initiate the ospf context.page 387.)

Syntax

get

get interface

Keywords and Variables

None.

Page 423: netscreen_CLI

“ip” through “port-mode”

407

lsa-thresholdertisement (LSA) threshold. A packets, the virtual router

d routing information available

ntext. (See “Context Initiation”

NetScreen CLI Reference Guide

Description: Use the lsa-threshold commands to set or display the Link State AdvWhen a neighbor device exceeds this threshold by flooding the virtual router with LSdrops the extra packets.

Link State Advertisements (LSAs) enable OSPF routers to make device, network, anfor the link state database.

Before you can execute the lsa-threshold commands, you must initiate the ospf coon page 387.)

Syntax

get

get lsa-threshold

set

set lsa-threshold number1 number2

unset

unset lsa-threshold

Page 424: netscreen_CLI

“ip” through “port-mode”

408

interval expressed

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameters

set lsa-threshold number1 number2

Example: The following command creates an OSPF LSA threshold:

set lsa-threshold 10 30

number1 The LSA time interval (in seconds).

number2 The maximum number of LSAs that the virtual router accepts within the timeby number1.

Page 425: netscreen_CLI

“ip” through “port-mode”

409

neighbor.

(See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the neighbor command to display details about neighbor devices

Before you can execute the neighbor command, you must initiate the ospf context.page 387.)

Syntax

get

get neighbor

Keywords and Variables

None.

Page 426: netscreen_CLI

“ip” through “port-mode”

410

redistributeunning a different protocol than

nnected)

ext. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the redistribute commands to import known routes from a router rthe current virtual routing instance.

The types of routers from which to import routes include:

• routers with manually created routes (static)

• routers running BGP (bgp)

• routers that have at least one interface with an IP address assigned to it (co

• routers with routes that have already been imported (imported)

• routers running RIP (rip)

Before you can execute the redistribute commands, you must initiate the ospf contpage 387.)

Syntax

get

get routes-redistribute [ summary ]get rules-redistribute

set

set redistribute route-map string protocol{ bgp | connected | imported | rip | static }

unset

unset redistribute route-map name_str protocol{ bgp | connected | imported | rip | static }

Page 427: netscreen_CLI

“ip” through “port-mode”

411

that has at least one interface

connected

routing domain into the current

bgp

o determine whether to forward or

routes in the subnetwork.

routes sent from a router that has

imported routes in the subnetwork.

tes in the subnetwork.

ic routes in the subnetwork.

ould be imported.

NetScreen CLI Reference Guide

Keywords and Variables

protocol

set redistribute route-map string protocol { ... }

Example: The following command redistributes a route that originated on a routerwith an IP address assigned to it:

ns(trust-vr/ospf)-> set redistribute route-map map1 protocol

route-map

set redistribute route-map string protocol { ... }

Example: The following command redistributes a route that originated from a BGPOSPF routing domain:

ns(trust-vr/ospf)-> set redistribute route-map map1 protocol

protocol Specifies routing protocol. The route map can use the protocol type tdeny an incoming packet.

• bgp specifies that the route map performs an action only on BGP

• connected specifies that the route map performs an action only onat least one interface with an IP address assigned to it.

• imported specifies that the route map performs an action only on

• rip specifies that the route map performs an action only on RIP rou

• static specifies that the route map performs an action only on stat

route-map Identifies the route map that indicates the path for which the route sh

Page 428: netscreen_CLI

“ip” through “port-mode”

412

ct-default-routelt route learned from OSPF

every destination. (Any entry

spf context. (See “Context

NetScreen CLI Reference Guide

rejeDescription: Use the reject-default-route commands to reject or restore the defau(0.0.0.0/0).

Every router has a default route entry in its routing table. This default route matcheswith a more specific prefix overrides the default route entry.)

Before you can execute the reject-default-route commands, you must initiate the oInitiation” on page 387.)

Syntax

get

get reject-default-route

set

set reject-default-route

unset

unset reject-default-route

Keywords and Variables

None.

Page 429: netscreen_CLI

“ip” through “port-mode”

413

retransmitbefore adjacency ends.

t. (See “Context Initiation” on

ackets prior to the end of the

transmit range is between 2 and

NetScreen CLI Reference Guide

Description: Use the retransmit command to set the number of packets to resend

Before you can execute the retransmit command, you must initiate the ospf contexpage 387.)

Syntax

set

set retransmit { dc number | non-dc number }

unset

unset retransmit { dc | non-dc }

Keywords and Variables

Variable Parameters

set retransmit dc number

Example: The following command shows setting a demand circuit to resend 10 padjacency:

ns(trust-vr/ospf)-> set retransmit dc 10

number Sets the number of packets to resend before adjacency ends. The re240 packets.

Page 430: netscreen_CLI

“ip” through “port-mode”

414

NetScreen CLI Reference Guide

dc

set retransmit dc numberunset retransmit dc

non-dc

set retransmit non-dc numberunset retransmit non-dc

dc Indicates that the type of connection is a demand circuit.

non-dc Indicates that the type of connection is not a demand circuit.

Page 431: netscreen_CLI

“ip” through “port-mode”

415

rfc-1583consistent with standards

(See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the rfc-1583 commands to use routing table calculation methods specified in the Request For Comments 1583 document.

Before you can execute the rfc-1583 commands, you must initiate the ospf context.page 387.)

Syntax

get

get rfc-1583

set

set rfc-1583

unset

unset rfc-1583

Keywords and Variables

None.

Page 432: netscreen_CLI

“ip” through “port-mode”

416

utes-redistribute imported from a protocol other

pf context. (See “Context

NetScreen CLI Reference Guide

roDescription: Use the routes-redistribute command to display details about routesthan OSPF.

Before you can execute the routes-redistribute command, you must initiate the osInitiation” on page 387.)

Syntax

get

get routes-redistribute

Keywords and Variables

None.

Page 433: netscreen_CLI

“ip” through “port-mode”

417

rules-redistributees imported from a protocol

context. (See “Context

NetScreen CLI Reference Guide

Description: Use the rules-redistribute command to display conditions set for routother than OSPF.

Before you can execute the rules-redistribute command, you must initiate the ospfInitiation” on page 387.)

Syntax

get

get rules-redistribute

Keywords and Variables

None.

Page 434: netscreen_CLI

“ip” through “port-mode”

418

statistics objects associated with an

(See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the statistics command to display information about the followingOSPF virtual routing instance:

• Hello Packets

• Link State Requests

• Link State Acknowledgments

• Link State Updates

• Database Descriptions

• Areas Created

• Shorted Path First Runs

• Packets Dropped

• Errors Received

• Bad Link State Requests

Before you can execute the statistics command, you must initiate the ospf context.page 387.)

Syntax

get

get statistics

Keywords and Variables

None.

Page 435: netscreen_CLI

“ip” through “port-mode”

419

stubr the current OSPF virtual

“Context Initiation” on page

he current OSPF virtual routing

NetScreen CLI Reference Guide

Description: Use the stub command to display details about a stub area created forouting instance.

Before you can execute the stub command, you must initiate the ospf context. (See387.)

Syntax

get

get stub [ ip_addr ]

Keywords and Variables

Variable Parameters

get stub ip_addr

Example: The following command displays details about a stub area created on tinstance:

ns(trust-vr/ospf)-> get stub 192.168.20.20

ip_addr Identifies the stub area.

Page 436: netscreen_CLI

“ip” through “port-mode”

420

summary-importtion.

unning a different protocol, you ame network stem of the prefix o treat a series of routes as one

f context. (See “Context

} ]

NetScreen CLI Reference Guide

Description: Use the summary-import commands to summarize a route redistribu

After importing a series of routes to the current OSPF routing instance from a router rcan bundle the routes into one generalized (or summarized) address that uses the saddress. By summarizing multiple addresses, you allow the OSPF routing instance troute, thus simplifying the process.

Before you can execute the summary-import commands, you must initiate the ospInitiation” on page 387.)

Syntax

get

get summary-import

set

set summary-import ip ip_addr/mask [ tag { ip_addr | id_num

unset

unset summary-import ip ip_addr/mask

Page 437: netscreen_CLI

“ip” through “port-mode”

421

e route (20):

rk mask (mask) encompassing all

al router uses this identifier when

NetScreen CLI Reference Guide

Keywords and Variables

ip

set summary-import ip ip_addr/mask [ ... ]unset summary-import ip ip_addr/mask

tag

set summary-import ip ip_addr/mask tag { ip_addr | id_num }

Example: The following command summarizes a set of imported routes under on

ns(trust-vr/ospf)-> set summary-import ip 2.1.1.0/24 tag 20

ip The summarized prefix, consisting of an address (ip_addr) and netwothe imported routes.

tag A value that acts as an identifier for the summarized prefix. The virtuadvertising a new external LSA.

Page 438: netscreen_CLI

“ip” through “port-mode”

422

vlinkinstance.

ne router bridging them cannot

“Context Initiation” on page

| ip_addr }

NetScreen CLI Reference Guide

Description: Use the vlink commands to create a virtual link for the current routing

A virtual link is a conveyance that allows two segments to connect when the backboreach either segment.

Before you can execute the vlink command, you must initiate the ospf context. (See387.)

Syntax

get

get vlink

set

set vlink area-id { id_num1 | ip_addr } router-id { id_num2 [authentication

{active-md5-key-id id_num |md5 key_str [ key-id id_num ] |password pswd_str} |

dead-interval number |hello-interval number |retransmit-interval number |transit-delay number]

Page 439: netscreen_CLI

“ip” through “port-mode”

423

2 | ip_addr }

ssword pswd_str } [ key-id id_num ]

ink is connected.

ey identifier number (the default is erent key identifier numbers use the active-md5-key-id option

NetScreen CLI Reference Guide

unset

unset vlink area-id { id_num1 | ip_addr } router-id { id_num[authentication

[active-md5-key-id |md5 [ key-id id_num ] ]] |

dead-interval number |hello-interval number |retransmit-interval number |transit-delay number]

Keywords and Variables

area-id

set vlink area-id id_num1 { ... }unset vlink area-id id_num1 { ... }

authentication

set vlink { ... } authentication{ active-md5-key-id | md5 key_str [ key-id id_num ] | pa

unset vlink { ... } authentication [ active-md5-key-id | md5

area-id Specifies the ID or IP address of the area through which the virtual l

authentication Specifies the authentication method, including MD5 key string, the k0), and password. You can specify more than one MD5 key with diff(between 0-255). If there are multiple MD5 keys configured, you can to select the key identifier of the key to be used for authentication.

Page 440: netscreen_CLI

“ip” through “port-mode”

424

aits, after it stops receiving .

ces of the interface sending Hello

erface resends a packet to a for the same packet.

rtual link.

NetScreen CLI Reference Guide

dead-interval

set vlink { ... } dead-interval numberunset vlink { ... } dead-interval number

hello-interval

set vlink { ... } hello-interval numberunset vlink { ... } hello-interval number

retransmit-interval

set vlink { ... } retransmit-interval numberunset vlink { ... } retransmit-interval number

router-id

set vlink area-id id_num1 router-id id_num2 unset vlink area-id id_num1 router-id id_num2

dead-interval Specifies the maximum amount of time that the NetScreen device wpackets from the neighbor, before classifying the neighbor as offline

hello-interval Specifies the amount of time in seconds that elapse between instanpackets to the network announcing the presence of the interface.

retransmit-interval

Specifies the amount of time (in seconds) that elapses before the intneighbor that did not acknowledge a previous transmission attempt

router-id Specifies the ID or IP address of the router at the other end of the vi

Page 441: netscreen_CLI

“ip” through “port-mode”

425

r router with an ID of

0.10.20

tScreen device advertises a

NetScreen CLI Reference Guide

Example: The following command creates a virtual link using an area of 0.0.0.1 fo10.10.10.20:

ns(trust-vr/ospf)-> set vlink area-id 0.0.0.1 router-id 10.1

transit-delay

set vlink { ... } transit-delay numberunset vlink { ... } transit-delay number

transit-delay Specifies the amount of time (in seconds) that elapses before the Nepacket received on the interface.

Page 442: netscreen_CLI

“ip” through “port-mode”

426

vneighboron the virtual link.

t. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the vneighbor command to display information about a neighbor

Before you can execute the vneighbor command, you must initiate the ospf contexpage 387.)

Syntax

get

get vneighbor

Keywords and Parameters

None.

Page 443: netscreen_CLI

“ip” through “port-mode”

427

performancer the NetScreen device.

t 5 minutes, and the last fifteen

seconds, the last 60 minutes,

NetScreen CLI Reference Guide

Description: Use the performance command to retrieve performance information fo

You can display information for the following:

• CPU utilization

• The session ramp-up rate

Syntax

get

get performance { cpu | session } [ detail ]

Keywords and Variables

cpu

get performance cpu [ detail ]

detail

get performance { cpu | session } detail

cpu Displays the current CPU utilization rate for the last minute, the lasminutes.

detail Displays the CPU utilization or session ramp-up rate for last 60and the last 24 hours.

Page 444: netscreen_CLI

“ip” through “port-mode”

428

ast minute, the last 5 minutes, r of sessions or the number of

NetScreen CLI Reference Guide

session

get performance session [ detail ]

session Displays the number of sessions added (ramp-up rate) for the land the last fifteen minutes. It does not display the total numbedeleted sessions.

Page 445: netscreen_CLI

“ip” through “port-mode”

429

PIM CommandsMulticast-Sparse Mode NetScreen virtual router.

entifies the multicast group(s) for

router.

NetScreen CLI Reference Guide

Description: Use the pim context to begin configuring either Protocol Independent (PIM-SM) or Protocol Independent Multicast-Source-Specific Mode (PIM-SSM) for a

Context Initiation

Initiating the pim context can take up to four steps.

1. Enter the vrouter context by executing the set vrouter command.

set vrouter vrouter

For example:

set vrouter trust-vr

2. Enter the pim context by executing the set protocol pim command.

ns(trust-vr)-> set protocol pim

3. Enable PIM (it is disabled by default).

ns(trust-vr/pim)-> set enable

To exit out of each context, enter exit.

PIM Command List

The following commands are executable in the pim context.

accept-group Use the accept-group command to specify the access list that idwhich the virtual router processes PIM messages.Command options: set, unset

bsr Use the bsr command to display information about the bootstrapCommand options: get

Page 446: netscreen_CLI

“ip” through “port-mode”

430

onfigure the PIM routing instance.

nce on the virtual router.

reports.

-SM.

nt to each neighbor.

or RP the multicast group accepts

ntries.

hbors discovered for each

s point).

source or RP.

s per second that triggers the ecific distribution tree.

router.

NetScreen CLI Reference Guide

config Use the config command to display all commands executed to cCommand options: get

enable Use the enable command to enable or disable the PIM-SM instaCommand options: set, unset

igmp-members Use the igmp-members command to display IGMP membershipCommand options: get

interface Use the interface command to display all interfaces running PIMCommand options: get

join-prune Use the join-prune command to display join-prune messages seCommand options: get

mgroup Use the mgroup command to specify from which source(s) and/traffic.Command options: set, unset

mroute Use the mroute commands to display PIM multicast route table eCommand options: get

neighbor Use the neighbor command to display information about all neiginterface.Command options: get

rp Use the rp command to display the status of the RP (rendezvouCommand options: get

rpf Use the rpf command to display RPF information for a particularCommand options: get

spt-threshold Use the spt-threshold command to specify the data rate in bytedevice to switch from the shared distribution tree to the source-spCommand options: set, unset

statistics Use the statistics command to display PIM statics for the virtual

Page 447: netscreen_CLI

“ip” through “port-mode”

431

e

NetScreen CLI Reference Guide

zone Configures the following:

• an RP candidate in the specified zone

• a static RP for the specified multicast groups in the named zon

Command options: get, set, unset

Page 448: netscreen_CLI

“ip” through “port-mode”

432

accept-groupes the multicast group(s) for

ext. (See “Context Initiation” on

r which the virtual router

NetScreen CLI Reference Guide

Description: Use the accept-group command to specify the access list that identifiwhich the virtual router processes PIM messages.

Before you can execute the accept-group command, you must initiate the pim contpage 429.)

Syntax

set

set accept-group number

unset

unset accept-group

Keywords and Variables

Variable Parameter

set accept-group number

number Specifies the access list that identifies the multicast group(s) foaccepts PIM messages.

Page 449: netscreen_CLI

“ip” through “port-mode”

433

bsrap router.

ontext Initiation” on page 429.)

NetScreen CLI Reference Guide

Description: Use the bsr command to display information about the elected bootstr

Before you can execute the bsr command, you must initiate the pim context. (See “C

Syntax

get

get bsr

Keywords and Variables

None.

Page 450: netscreen_CLI

“ip” through “port-mode”

434

configure the PIM routing instance.

e “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the config command to display all commands executed to config

Before you can execute the config command, you must initiate the pim context. (Se429.)

Syntax

get

get config

Keywords and Variables

None.

Page 451: netscreen_CLI

“ip” through “port-mode”

435

enablen the virtual router.

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the enable command to enable or disable the PIM-SM instance o

Before you can execute the enable command, you must initiate the pim context. (S429.)

Syntax

set

set enable

unset

unset enable

Keywords and Variables

None.

Page 452: netscreen_CLI

“ip” through “port-mode”

436

igmp-membersation sent by IGMP.

ntext. (See “Context Initiation”

NetScreen CLI Reference Guide

Description: Use the igmp-members command to display local membership inform

Before you can execute the igmp-members command, you must initiate the pim coon page 429.)

Syntax

get

get igmp-members

Keywords and Variables

None.

Page 453: netscreen_CLI

“ip” through “port-mode”

437

interface

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the interface command to display all interfaces running PIM-SM.

Before you can execute the interface command, you must initiate the pim context. (S429.)

Syntax

get

get interface

Keywords and Variables

None.

Page 454: netscreen_CLI

“ip” through “port-mode”

438

join-pruneeach neighbor.

. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the join-prune command to display join-prune messages sent to

Before you can execute the join-prune command, you must initiate the pim contextpage 429.)

Syntax

get

get join-prune

Keywords and Variables

None.

Page 455: netscreen_CLI

“ip” through “port-mode”

439

mgroup the multicast group accepts

ee “Context Initiation” on page

er }

NetScreen CLI Reference Guide

Description: Use the mgroup command to specify from which source(s) and/or RPtraffic.

Before you can execute the mgroup command, you must initiate the pim context. (S429.)

Syntax

set

set mgroup mcst_addr { accept-rp number | accept-source numb

unset

unset mgroup mcst_addr { accept-rp | accept-source }

Keywords and Variables

Variable Parameter

set mgroup mcst_addr

ip_addr Specifies the IP address of the multicast group.

Page 456: netscreen_CLI

“ip” through “port-mode”

440

e forwards traffic to the multicast rom an RP that is not on the

evice forwards traffic to the traffic is from a source that is not

NetScreen CLI Reference Guide

accept-rp

set mgroup mcst_addr accept-rp number

accept-source

set mgroup mcst_addr accept-source number

accept-rp Specifies the access list that identifies the RP(s) from which the devicgroup. The device drops traffic for the multicast group if the traffic is fspecified access list.

accept-source Specifies the access list that identifies the source(s) from which the dmulticast group.The device drops traffic for the multicast group if the on the specified access list.

Page 457: netscreen_CLI

“ip” through “port-mode”

441

mroute

ee “Context Initiation” on page

detail ] [ brief ] ]

e source address, multicast group

NetScreen CLI Reference Guide

Description: Use the mroute commands to display PIM route table entries.

Before you can execute the mroute command, you must initiate the pim context. (S429.)

Syntax

get

get mroute[

brief |mgroup mcst_addr [ detail ] [ brief ] [ source ip_addr [ ]

Keywords and Variables

brief

get mroute brief

get mroute mgroup mcst_addr brief

get mroute mgroup mcst_addr source ip_addr brief

brief Displays summary information about the multicast routes. Displays thaddress, and the list of incoming and outgoing interfaces.

Page 458: netscreen_CLI

“ip” through “port-mode”

442

]

type of route. It also provides

or defines a multicast route for a

NetScreen CLI Reference Guide

detail

get mroute mgroup mcst_addr detail

get mroute mgroup mcst_addr source ip_addr detail

mgroup

get mroute mgroup mcst_addr brief

get mroute mgroup mcst_addr detail

get mroute mgroup mcst_addr source ip_addr [ brief | detail

source

get mroute mgroup ip_addr source ip_addr

brief Displays information about the multicast route, including the RPF anddetails on the input and output interfaces.

mgroup Displays multicast route table entries for the specified multicast groupparticular multicast group.

source Specifies the IP address of the source of the multicast traffic.

Page 459: netscreen_CLI

“ip” through “port-mode”

443

neighbor discovered for each interface.

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the neighbor command to display information about all neighbors

Before you can execute the neighbor command, you must initiate the pim context. (S429.)

Syntax

get

get neighbor

Keywords and Variables

None.

Page 460: netscreen_CLI

“ip” through “port-mode”

444

rpt).

ontext Initiation” on page 429.)

st groups.

NetScreen CLI Reference Guide

Description: Use the rp command to display the status of the RP (rendezvous poin

Before you can execute the rp command, you must initiate the pim context. (See “C

Syntax

get

get rp{active |all |candidate |mgroup ip_addr [ active ] |proxy}

Keywords and Variables

active

get rp active

active Displays the RP that is actively sending multicast traffic to the multica

Page 461: netscreen_CLI

“ip” through “port-mode”

445

e (*, G) and (S, G) mappings for

zone on the virtual router.

st group. Specify active to display

virtual router.

NetScreen CLI Reference Guide

all

get rp all

candidate

get rp candidate

mgroup

get rp mgroup ip_addr [ active ]

proxy

get rp proxy

all Displays information about all candidate and static RPs. It displays theach RP.

candidate Displays the status of the RP candidates that you configured for each

mgroup Displays information about the group-RP set for the specified multicathe RP for the specified multicast group.

proxy Displays the proxy-RP status for each zone in the PIM instance of the

Page 462: netscreen_CLI

“ip” through “port-mode”

446

rpfation for a particular source or

ontext Initiation” on page 429.)

NetScreen CLI Reference Guide

Description: Use the rpf command to display RPF (reverse path forwarding) informRP.

Before you can execute the rpf command, you must initiate the pim context. (See “C

Syntax

get

get rpf

Keywords and Variables

None.

Page 463: netscreen_CLI

“ip” through “port-mode”

447

spt-threshold the virtual router to switch from

ext. (See “Context Initiation” on

switch from the shared distribution device never switches to a

NetScreen CLI Reference Guide

Description: Use the spt-threshold command to specify the threshold that triggersthe shared distribution tree to the source-based tree.

Before you can execute the spt-threshold command, you must initiate the pim contpage 429.)

Syntax

set

set spt-threshold { number | infinity }

unset

unset spt-threshold

Keywords and Variables

Variable Parameter

set spt-threshold number

number Specifies the data rate in bytes per second that triggers the device to tree to the source-specific distribution tree. If you specify infinity, thesource-specific distribution tree.

Page 464: netscreen_CLI

“ip” through “port-mode”

448

zonee:

“Context Initiation” on page

| proxy }

ber ] ] |

NetScreen CLI Reference Guide

Description: Use the zone command to configure the following for the specified zon

• an RP candidate

• a static RP for the specified multicast groups in the named zone

• a proxy-RP

Before you can execute the zone command, you must initiate the pim context. (See429.)

Syntax

get

get zone

[ zone

[

bsr |

rp { active | all | candidate | mgroup ip_addr [ active ]

]

]

set

set zone zone rp

{

address ip_addr mgroup-list number [ always ] |

candidate interface interface[ mgroup-list number [ holdtime number | priority num

proxy

Page 465: netscreen_CLI

“ip” through “port-mode”

449

]

ess list. If no group is specified,

IP address can also be the IP

s the multicast group(s) mapped

pecified multicast group even if

NetScreen CLI Reference Guide

}

unset

unset zone zone rp address { ip_addr | candidate | proxy }

Keywords and Variables

address

set zone zone rp address ip_addr mgroup-list number [ always

unset zone zone rp address ip_addr

address Configures a static RP for the multicast groups specified in the accthen this RP is used for any multicast group that has no RP.

• zone zone Specifies the zone of the RP.

• address ip_addr Specifies the IP address of the RP. This address an interfaces on the device.

• mgroup-list number Specifies the access list that identifieto the RP.

• always Specifies that this RP should always be used for the sthere is a dynamic group-RP mapping for the same group.

Page 466: netscreen_CLI

“ip” through “port-mode”

450

umber holdtime number

umber priority number

rtised as the RP candidate.

ifies the multicast group(s) for

ootstrap router.

he RP candidate.

te without a multicast group.

NetScreen CLI Reference Guide

bsr

get zone zone bsr

candidate

set zone zone rp candidate interface interface

set zone zone rp candidate interface interface mgroup-list n

set zone zone rp candidate interface interface mgroup-list n

unset zone zone rp candidate

proxy

set zone zone rp proxy

bsr Displays information about the bootstrap router in the zone.

candidate Configures an RP candidate in the specified zone.

• zone zone Specifies the zone of the RP.

• interface interface Specifies the interface that is adve

• mgroup-list number Specifies the access list which identwhich the interface is the RP candidate.

• holdtime number Specifies the holdtime advertised to the b

• priority number Specifies the priority of the interface as t

When you configure proxy RP, you must configure an RP candida

Page 467: netscreen_CLI

“ip” through “port-mode”

451

st traffic to the multicast group in the

ne.

p.

NetScreen CLI Reference Guide

rp

get zone zone rp {...}

proxy Enables proxy RP in the specified zone.

rp Displays information about the RP in the specified zone.

• active Displays information about the RP that is sending multicaspecified zone.

• all Displays all RPs, including candidate RPs, in the specified zo

• candidate Displays the configured RP in the zone.

• mgroup ip_addr Displays the RP for the specifies multicast grou

• proxy Displays the proxy-RP for the specified zone.

Page 468: netscreen_CLI

“ip” through “port-mode”

452

pingstem.

nt of 3:

ork from any existing MIP, or dr (see example in from

NetScreen CLI Reference Guide

Description: Use the ping command to check the network connection to another sy

Syntaxping [ ip_addr | name_str ]

[ count number [ size number [ time-out number ] ] ][ from interface ]

Keywords and Variables

Variable Parameters

ping [ ip_addr | name_str ] [ ... ]

Example: The following command pings a host with IP address 172.16.11.2:

ping 172.16.11.2

count

ping [ ip_addr | name_str ] count number [ ... ]

Example: The following command pings a device at 10.100.2.171 with a ping cou

ping 10.100.2.171 count 3

Note: An extended ping (using the from option) pings a host on the Untrusted netwfrom the Trusted interface IP address. The syntax for specifying a MIP is mip ip_adkeyword description).

ip_addr | name_str Pings the host at address (ip_addr) or with name (name_str).

count The ping count (number).

Page 469: netscreen_CLI

“ip” through “port-mode”

453

nt of 4 from the ethernet1

results to IP address 10.1.1.3:

t number

mation on interfaces, see

ation is on the untrusted side, the ce IP address.

NetScreen CLI Reference Guide

from

ping [ ip_addr | name_str ] [ ... ] from interface

Examples: The following command pings a device at 10.100.2.11 with a ping couinterface:

ping 10.100.2.11 count 4 from ethernet1

The following command pings a host with IP address 192.168.11.2 and sends the

ping 192.168.11.2 from mip 10.1.1.3

size

ping [ ip_addr | name_str ] count number size number [ ... ]

time-out

ping [ ip_addr | name_str ] count number size number time-ou

Example: The following command pings a device at 10.100.2.11.

• Ping count of 4

• Packet size 1000

• Ping timeout of three seconds:

ping 10.100.2.11 count 4 size 1000 time-out 3

from The source interface (interface) for an extended ping. For more infor“Interface Names” on page A-I.Defines the source IP to which the ping will reply. Because this destinsource IP can only be the Mapped IP address or an untrusted interfa

size The packet size (number) for each ping.

time-out The ping timeout in seconds (number).

Page 470: netscreen_CLI

“ip” through “port-mode”

454

pki

quired for public key ificate by tracking a path of authority of a CA domain.

n.

NetScreen CLI Reference Guide

Definition: Use the pki commands to manage public-key infrastructure (PKI).

The term Public Key Infrastructure (PKI) refers to the hierarchical structure of trust recryptography. Using PKI, the NetScreen device verifies the trustworthiness of a certcertificate authorities (CAs) from the one issuing your local certificate back to a root

The pki commands perform the following tasks:

• Manage PKI objects.

• Create new RSA key pairs and acquire a certificate.

• Verify the certificate received from the communication peer.

• Acquire CRLs.

• Configure PKI-related operations, such as verification of certificate revocatio

Syntax

exec

exec pki{convert-cert |dsa new-key number [ & ] |rsa new-key number [ & ] |x509

{install-factory-certs name_str |pkcs10 |scep

{ cert id_num |key { id_num | last-key } |renew id_num |

Page 471: netscreen_CLI

“ip” through “port-mode”

455

}

pending-cert } |

NetScreen CLI Reference Guide

} |self-signed-cert key-pair id_num |tftp ip_addr { cert-name name_str | crl-name name_str}

}

get

get pki{authority { id_num | default }

{cert-path |cert-status |scep} |

ldap |pre-prime |src-interface |x509

{cert { id_num | system } |cert-fqdn |cert-path |crl-refresh |dn |list { ca-cert | cert | crl | key-pair | local-cert |pkcs10 |raw-cn |send-to}

}

Page 472: netscreen_CLI

“ip” through “port-mode”

456

effort ] | none }

NetScreen CLI Reference Guide

set (authority)

set pki authority { id_num | default }{cert-path { full | partial } |cert-status

{crl

{refresh { daily | default | monthly | weekly } |server-name { ip_addr | dom_name } |url url_str}

ocsp{cert-verify id id_num |not-verify-revoke |url url_str} |

revocation-check { crl [ best-effort ] | ocsp [ best-}

scep{authentication { failed | passed } |ca-cgi string |ca-id name_str |challenge pswd_str |current |mode { auto | manual } |polling-int number |ra-cgi string |renew-start number}

}

Page 473: netscreen_CLI

“ip” through “port-mode”

457

NetScreen CLI Reference Guide

set (ldap)

set pki ldap{crl-url url_str |server-name { name_str | ip_addr }}

set (pre-prime)

set pki pre-prime number

set (src-interface)

set pki src-interface interface

set (x509)

set pki x509{cert-fqdn string |default

{cert-path { full | partial }crl-refresh { daily | default | monthly | weekly } |send-to string} |

dn{country-name name_str |email string |ip ip_addr |local-name name_str |name name_str |org-name name_str |

Page 474: netscreen_CLI

“ip” through “port-mode”

458

NetScreen CLI Reference Guide

org-unit-name name_str |phone string |state-name name_str} |

friendly-name string |raw-cn enable |renew id_num}

unset

unset pki{authority { id_num | default }

{cert-path |cert-status

{crl { refresh | server-name | url } |cert-verifyrevocation-check} |

scep{ca-cgi | ca-id |challenge |current |mode |polling-int |ra-cgi |renew-start}

} |ldap

Page 475: netscreen_CLI

“ip” through “port-mode”

459

NetScreen CLI Reference Guide

{crl-url |server-name} |

pre-prime |src-interface |x509

{cert-fqdn |default { cert-path | crl-refresh | send-to } |dn

{country-name |email |ip |local-name |name |org-name |org-unit-name |phone |state-name}

friendly-name id_num |raw-cn}

}

Page 476: netscreen_CLI

“ip” through “port-mode”

460

sed } [ id_num ]

n to passed:

rtificate revocation on a daily

. The id_num value identifies a

ices. The id_num parameter is the

on (used when the CA certificate

NetScreen CLI Reference Guide

Keywords and Variables

authentication

set pki authority { ... } scep authentication { failed | pas

Example: The following command sets the result of a CA certificate authenticatio

set pki authority default scep authentication passed

authority

get pki authority { id_num | default } { ... }set pki authority { id_num | default } { ... }unset pki authority { id_num | default } { ... }

Example: The following command instructs the NetScreen device to check for cebasis:

set pki authority default cert-status crl refresh daily

authentication Sets the result of the CA certificate authentication, failed or passedpending certificate created during a SCEP operation.

authority Defines how the NetScreen device uses the CA’s authorization servidentification number of the CA certificate.The default switch directs the device to use the authority configuratidoes not reside locally).

Page 477: netscreen_CLI

“ip” through “port-mode”

461

rtial }

ull:

certificates received from the considered "trusted".

the root. (The last certificate in

ertificate chain may be any

torage. You can set this certificate

certificate.

NetScreen device updates the ation date decided by the CRL.

erver by IP address and port

NetScreen CLI Reference Guide

cert-pathget pki authority { id_num | default } cert-pathset pki authority { id_num | default } cert-path { full | paunset pki authority id_num cert-path

Example: The following command defines the certificate path validation level as f

set pki authority default cert-path full

cert-statusget pki authority { id_num | default } cert-statusset pki authority { id_num | default } cert-status { ... }unset pki authority { id_num | default } cert-status { ... }

cert-path Defines the X509 certificate path validation level.When the device verifies a certificate, it builds a certificate chain frompeer and the certificate stored locally. Certificates loaded locally are

• full Directs the NetScreen device to validate the certificate chain tothe certificate chain must be a self-signed CA certificate.)

• partial Specifies partial path validation. (The last certificate in the clocally-stored certificate.)

In either case, the last certificate in the chain must come from local spath validation level for a CA.

cert-status Defines how the NetScreen device verifies the revocation status of a

• crl Configures Certificate Revocation List (CRL) parameters.

- refresh Determines how often (daily, monthly, or weekly) theCRL before the CRL expires. The default option uses the valid

- server-name { ip_addr:port_num | dom_name } Specifies the snumber, or by domain name.

- url url_str Specifies the URL for accessing the CRL.

Page 478: netscreen_CLI

“ip” through “port-mode”

462

check certificate status:

_num2

eters.

fying the OCSP response.

the OCSP signing certificate.

r.

tificates to see if they are currently

s.

tificate status.

status.

hich there is no revocation tical. For example, in some el; however, the CRL information st-effort setting, it is advisable to rtificate without revocation epeatedly failing to get revocation tion.

rify the signature on an OCSP

eing verified.

verify the signature on the OCSP

NetScreen CLI Reference Guide

Example: The following command directs the NetScreen device to use the CRL to

set pki authority default cert-status revocation-check crl

cert-verify id

set pki authority id_num1 cert-status ocsp cert-verify id idunset pki authority id_num cert-status ocsp cert-verify

• ocsp Configures Online Certificate Status Protocol (OCSP) param

- cert-verify id number Identifies the certificate to use when veri

- not-verify-revoke Disables verification of revocation status on

- url url_str Specifies the URL for accessing the OCSP responde

• revocation-check Specifies how the NetScreen device checks cerrevoked.

- crl Specifies that the device uses CRL to check certificate statu

- none Specifies that the device does not perform a check of cer

- ocsp Specifies that the device uses OCSP to check certificate

- best-effort Specifies that the device can use a certificate for winformation. This option is useful when CRL retrieval is not pracenvironments the CRL server is only accessible through a tunnis necessary to build the tunnel originally. When you use the becheck the event log periodically. The device should accept a ceinformation only when no revocation information is available. Rinformation for a certificate usually indicates improper configura

cert-verify id Identifies a locally-stored certificate the NetScreen device uses to veresponder.

• id_num1 Identifies the CA certificate that issued the certificate b

• id_num2 Identifies the locally stored certificate the device uses toresponse.

Page 479: netscreen_CLI

“ip” through “port-mode”

463

ess:

enOS 3.0.0) to use the internal

gth (number). Key length is 512,

kground, without waiting for the

ciated with the server is not in the

te revocation list (CRL).

lified domain name or IP address

NetScreen CLI Reference Guide

convert-cert

exec pki convert-cert

dsa new-key

exec pki dsa new-key number [ & ]

ldap

get pki ldapset pki ldap { ... }unset pki ldap { ... }

Example: The following command assigns 162.128.20.12 as the server’s IP addr

set pki ldap server-name 162.128.20.12

convert-cert Converts a virtual system (vsys) certificate (for versions prior to Screvsys identifier in ScreenOS 3.0.0 and above.

dsa new-key Generates a new DSA public/private key pair with a specified bit len786, 1024, or 2048.The & option directs the device to perform key generation in the bacresult. Without this option, the device can wait up to 100 seconds.

ldap Specifies settings for the LDAP server, when the CA certificate assodevice.

• crl-url url_str Sets the default LDAP URL for retrieving the certifica

• server-name { name_str | ip_addr:port_num } Defines the fully-quaand port number of the server.

Page 480: netscreen_CLI

“ip” through “port-mode”

464

length combination. The key type ts depending on the NetScreen

very key type and key length

ation and the number of attempts

or more information, refer to the Specifi-

cific number of pre-calculated

ber of pre-calculated primes. The e information, refer to the

gth (number). Key length is 512,

kground, without waiting for the

NetScreen CLI Reference Guide

pre-prime

get pki pre-primeset pki pre-prime numberunset pki pre-prime

rsa new-key

exec pki rsa new-key number [ & ]

pre-prime The get command displays:

- The number of pre-calculated primes for every key type and keycan be DSA or RSA and the key length can be 1024 or 2048 biplatform*.

- The number of currently available pairs of prime numbers for ecombination.

- Ongoing prime calculation for a key type and key length combinalready made.

* NetScreen appliances generate 1024-bit primes. NetScreen systems generate 1024- and 2048-bit primes. Fcation Sheet for your NetScreen product.

The set command instructs the NetScreen device to generate a speprimes to store in memory.

The unset command reverts the NetScreen device to the default numdefault number of pre-calculated primes is platform specific. For morSpecification Sheet for your NetScreen product.

rsa new-key Generates a new RSA public/private key pair with a specified bit len786, 1024, or 2048.The & option directs the device to perform key generation in the bacresult. Without this option, the device can wait up to 100 seconds.

Page 481: netscreen_CLI

“ip” through “port-mode”

465

| renew }

ish:”

CA authentication, failed or

rtificate for a pending certification.

with a CA as default.

fied key pair. The id_num ameter specifies the most

enticate the certificate.

utes). The default value is 0

(id_num).

n date when you want the

NetScreen CLI Reference Guide

scep

exec pki x509 scep { cert id_num | key { id_num | last-key }get pki authority { id_num | default } scepset pki authority { id_num | default } scep { ... }unset pki authority { id_num | default } scep { ... }

Example: The following command sets the SCEP Challenge password to “swordf

set pki authority default scep challenge swordfish

scep Defines Simple Certificate Enrollment Protocol (SCEP) parameters.

• authentication { passed | failed } [ id_num ] sets the result of thepassed. The id_num value identifies a defined key pair.

• ca-cgi url_str Specifies the path to the CA's SCEP server.

• ca-id string Specifies the identity of the CA's SCEP server.

• cert-id id_num Directs the NetScreen device to retrieve the final ce

• challenge pswd_str Specifies the Challenge password.

• current Directs the NetScreen device to use the SCEP associated

• key id_num Directs the device to acquire a certificate for the speciparameter specifies the ID of a specific key pair. The last_key parrecently-created key pair.

• mode { auto | manual } Specifies the authentication mode to auth

• polling-int number Determines the retrieval polling interval (in min(none).

• ra-cgi url_str Specifies the CGI path to the RA's SCEP server.

• renew id_num Directs the device to renew the specified certificate

• renew-start Set the number of days before the certificate expiratioNetScreen device to request the renewal of the certificate.

Page 482: netscreen_CLI

“ip” through “port-mode”

466

ult:

y pair with ID number

nerated) key pair. To learn the ID ate, enter the following command: f output under “ID num” (not the ID

certificate request file.

device uses to send PKI traffic.

NetScreen CLI Reference Guide

Example: The following command uses the SCEP setting for CA 123 as the defa

set pki authority 123 scep current

self-signed-certexec pki x509 self-signed-cert key-pair id_num

Example: The following command generates a self-signed certificate using the ke70320131:

exec pki x509 self-signed-cert key-pair 70320131

send-toget pki x509 send-toset pki x509 default send-to stringunset pki x509 default send-to

src-interfaceget pki src-interfaceset pki src-interfaceunset pki src-interface

self-signed-cert Generates a self-signed certificate using the specified (previously genumber for a key pair to use when generating the self-signed certificget pki x509 list key-pair. Then note the ID number in the column onumber under “IDX”).

send-to Specifies or displays the e-mail destination (string) to send the x509

src-interface Displays, configures or removes the source interface the NetScreen

Page 483: netscreen_CLI

“ip” through “port-mode”

467

n, and performs various

tificate. The keyword system atically generates during bootup.

DN). PKI uses this value in the

configured.

monthly, or weekly) of the X.509

en device sends the PKCS10

ting certificate.

cate subject name of the

subject name.

NetScreen CLI Reference Guide

x509exec pki x509 { ... }get pki x509 { ... }set pki x509 { ... }unset pki x509 { ... }

x509 Specifies settings for x509 certificates, displays certificate informatiooperations related to x509 PKI object.

• cert { id_num | system } Displays information on the specified cerrefers to the self-signed certificate that the NetScreen device autom

• cert-fqdn string Configures the Fully-Qualified Domain Name (FQcertificate subject alt name extension.

• default Specifies settings for the CA whose certificate is not locally

- crl-refresh Sets or displays the refreshment frequency (daily, CRL. The default option uses the expiration date in each CRL.

- send-to string Assigns the e-mail address to which the NetScrecertificate request file.

• dn Specifies or displays the name that uniquely identifies a reques

- country-name name_str Sets the country name.

- email string Sets the e-mail address.

- ip ip_addr Sets the IP address.

- local-name string Sets the locality.

- name string Sets the name in a common name field.

- org-name string Sets the organization name.

- org-unit-name string Sets the organization unit name.

- phone string Sets a contact phone number as the X.509 certifiNetScreen device.

- state-name string Sets the state name as the X.509 certificate

Page 484: netscreen_CLI

“ip” through “port-mode”

468

e the NetScreen device sends

e certificate (id_num).

ed certificate.

key pair.

s current status.

EP) operation to retrieve meter is the identification number

ertificate for a key pair. The obtain a certificate for the most

ertificate. The variable id_num

) or CRL file (crl-name name_str)

NetScreen CLI Reference Guide

Examples: The following command specifies the destination e-mail address wherthe PKCS10 certificate request:

set pki x509 default send-to [email protected]

• friendly-name name_str id_num A friendly name (name_str) for th

• install-factory-certs name_str Loads a specified factory pre-defin

• list Displays the X.509 object list.

- ca-cert Displays all CA certificates.

- cert Displays all X.509 certificates.

- key-pair Displays all key pairs for which there is no certificate.

- crl Displays all Certificate Revocation Lists (CRLs).

- local-cert Displays all local certificates.

- pending-cert Displays all pending certificates.

• pkcs10 Displays a PKCS10 file (an X.509 certificate request) for a

• raw-cn enable Enables the raw common name (CN) or displays it

• scep

- cert id_num Initiates Simple Certificate Enrollment Protocol (SCcertificates from a certificate authority server. The id_num paraof the pending certificate.

- key { id_num | last-key } Initiates SCEP operation to obtain a cvariable id_num identifies the key pair and last-key specifies torecently created key pair.

- renew id_num Initiates SCEP operation to renew an existing cidentifies the existing certificate to renew.

• tftp ip_addr Uploads the specified certificate (cert-name name_strfor the specified TFTP server at IP address ip_addr.

Page 485: netscreen_CLI

“ip” through “port-mode”

469

marketing at Juniper Networks

tificate from a certificate

.verisign.com/cgi-bin/

.verisign.com/cgi-bin/

erver to pass a user request to ext Transfer Protocol (HTTP).

e RA does not exist, use the

NetScreen CLI Reference Guide

The following command refreshes the certificate revocation list on a daily basis:

set pki x509 default crl-refresh daily

The following command defines a distinguished name for Ed Jones, who works inin Sunnyvale, California:

set pki x509 dn country-name USset pki x509 dn state-name CAset pki x509 dn local-name sunnyvaleset pki x509 dn org-name “juniper networks”set pki x509 dn org-unit-name marketingset pki x509 dn name “ed jones”

Defaults

The RSA key length is set to 1024 bits.

Requesting a CA Certificate

You use the set pki, get pki, and exec pki commands to request an x509 CA cerauthority. The following commands provide a typical example:

1. Specify a certificate authority CA CGI path.

set pki auth default scep ca-cgi “http://pilotonsiteipsecpkiclient.exe”

2. Specify a registration authority RA CGI path

set pki auth default scep ra-cgi “http://pilotonsiteipsecpkiclient.exe”

Note: The Common Gateway Interface (CGI) is a standard way for a web san application program, and to receive data back. CGI is part of the Hypert

Note: You must specify an RA CGI path even if the RA does not exist. If thvalue specified for the CA CGI.

Page 486: netscreen_CLI

“ip” through “port-mode”

470

y, a prompt appears presenting

ing the following command:

es not exist, use the value

ificate authority administrator to

cord the ID number identifying

ined in Step 7) to identify the

NetScreen CLI Reference Guide

3. Generate an RSA key pair, specifying a key length of 1024 bits.

exec pki rsa new 1024

4. Initiate the SCEP operation to request a local certificate.

exec pki x509 scep key last-key

5. If this is the first attempt to apply for a certificate from this certificate authorita fingerprint value for the CA certificate. (Otherwise, go on to Step 6.)

After verification of the fingerprint, allow the operation to continue by execut

set pki auth default scep auth passed

You must specify an RA CGI path even if the RA does not exist. If the RA dospecified for the CA CGI.

6. If the device does not approve the certificate automatically, contact your certapprove the local certificate request.

7. (Optional) Display a list of pending certificates. This allows you to see and rethe pending certificate.

get pki x509 list pending-cert

8. (Optional) Obtain the local certificate from the CA (using the ID number obtacertificate. In this example, the certificate number is 1001.

exec pki x509 scep cert 1001

Page 487: netscreen_CLI

“ip” through “port-mode”

471

policyN traffic.

(interzone policy), between Global zone (global policy). een two interfaces bound to the cks its policy lists for a policy to other, you must configure a e B to flow to zone A, you must

aces the CLI within the context umber 1 and then enter the

TTP permit

cified policy (policy:1 in this er the save command:

dify an existing policy. For

TTP permit

n the original policy. After you already exist in the original

NetScreen CLI Reference Guide

Description: Use the policy commands to define policies to control network and VP

A policy is a set of rules that determines how traffic passes between security zones interfaces bound to the same zone (intrazone policy), and between addresses in theWhen a NetScreen device attempts to pass a packet from one zone to another, betwsame zone, or between two addresses in the Global zone, the NetScreen device chepermit such traffic. For example, to allow traffic to pass from one security zone to anpolicy that permits zone A to send traffic to zone B. To allow traffic originating in zonconfigure another policy permitting traffic from zone B to zone A.

Executing the set policy id pol_num command without specifying further options plof an existing policy. For example, the following commands define a policy with ID n“policy:1” context to add a second service:

ns-> set policy id 1 from trust to untrust host1 host2 Hns-> set policy id 1ns(policy:1)-> set service FTP

After you enter a policy context, all subsequent command executions modify the speexample). To save your changes, you must first exit the policy context, and then ent

ns(policy:1)-> exitns-> save

You can also use the set policy id pol_num command with additional options to moexample, the following commands add a Deep Inspection extension to policy 1:

ns-> set policy id 1 from trust to untrust host1 host2 Hns-> set policy id 1 attack HIGH:HTTP:SIGS action close

Note: The above example adds a Deep Inspection extension that was not present ienter a policy context, you cannot add a Deep Inspection extension if one does notpolicy.

Page 488: netscreen_CLI

“ip” through “port-mode”

472

e ]

NetScreen CLI Reference Guide

Syntax

exec

exec policy verify [ from zone [ to zone ] | global | to zon

get

get policy[all |from zone1 to zone2 |[ global ] id pol_num ]

get (within a policy context)

get configuration

set

set policy[ global ][ id pol_num1 ][ top | before pol_num2 ][ name name_str ][ from zone1 to zone2 ]src_addr dst_addr svc_name

[nat

[ src [ dip-id id_num ] ][ dst ip addr1 [ addr2 | port port_num ] ]

]{deny |

Page 489: netscreen_CLI

“ip” through “port-mode”

473

pol_num ]

able }

e-server | } |

fy } ip | zone |

}

NetScreen CLI Reference Guide

permit |reject |tunnel { l2tp tunn_str | vpn-group id_num } |tunnel vpn tunn_str [ l2tp tunn_str | pair-policy}

[ auth [ server name_str ] | webauth ][group-expression string |user name_str | user-group name_str]

] |[ schedule name_str ][ log [ alert ] ]

[ count [ alarm id_num1 id_num2 ] ][ no-session-backup ]

[ url-filter ][ traffic { gbw number }

{ priority number }{ mbw [ number ]

dscp { disable | en}

][ attack string

{ action { close | close-client | closdrop | drop-packet | ignore | none

logging}

[ ip-action { block | close | noti[ target { dst-ip | serv | src-

zone-serv } ][ timeout value ]

]] |av name_str ]

}set policy move pol_num1 { before pol_num2 | after pol_num3 set policy default-permit-all

Page 490: netscreen_CLI

“ip” through “port-mode”

474

| drop-packet | ignore

e-serv } ]

NetScreen CLI Reference Guide

set policy id number

set policy [ global ] id pol_num disableset policy [ global ] id pol_num application svc_nameset policy [ global ] id pol_num attack string action stringset policy [ global ] id pol_num av name_str

set (within a policy context)

set{attack string

{ action { close | close-client | close-server | drop| none } |logging}

[ ip-action { block | close | notify } [ target { dst-ip | serv | src-ip | zone | zon

[ timeout value ]] |

av name_str |count [ alarm number1 number2 ] |di-alert-disable |di-severity { info | low | medium | high | critical } |dst-address | src-address

{ name_str | negate } |log [ alert | session-init ] |name name_str |service svc_name |src-address { name_str | negate }url protocol sc-cpa profile { name_str | ns-profile }}

Page 491: netscreen_CLI

“ip” through “port-mode”

475

NetScreen CLI Reference Guide

unset

unset policy { pol_num | id pol_num }[application |attack |av name_str |disable]

unset policy default-permit-all

unset (within a policy context)

unset attack string [ logging ]unset av name_strunset countunset { dst-address | src-address } { name_str | negate }unset { ims-alert | ims-log }unset log [ session-init ]unset nameunset service svc_nameunset severity

Keywords and Variables

all

get policy all

all Displays information about all security policies.

Page 492: netscreen_CLI

“ip” through “port-mode”

476

as FTP:

ice and Layer 4 port number. This m services so that the NetScreen malies.

tion choices, instructs the with a predefined service and port t to scan the packet payload and of traffic when it is actually

f which use TCP port 389.lication choices, instructs the quivalent to entering the CLI

NetScreen CLI Reference Guide

application

set policy [ global ] id pol_num application svc_name

Example: The following command identifies the Layer 7 application for policy ID 1

set policy id 1 application FTP

application Defines the type of Layer 7 application associated with a Layer 3 servis particularly important for defining the Layer 7 application for custodevice can properly inspect such traffic for attack signatures and anoThe ignore option, which appears near the end of the list of applicaNetScreen device to ignore the application type typically associated number. Using the ignore option instructs the NetScreen device nocan prevent the NetScreen device from attempting to parse one typeanother type—such as the case with LDAP and H.323 traffic, both oThe none option, which also appears near the end of the list of appNetScreen device to use the default setting. Choosing none is the ecommand: unset policy id id_num application.

Page 493: netscreen_CLI

“ip” through “port-mode”

477

| close-server | drop

ecified attack object group. Attack creen device detects an attack

tion, and sends TCP RST packets

onnection, and sends a TCP RST

connection, and sends a TCP

nection without sending either the

he packet containing the attack

g—or ignores—the remainder of

.

ts through Deep Inspection. To policy:number)-> unset attack

NetScreen CLI Reference Guide

attack

set policy { … } attack string action { close | close-client| drop-packet | ignore | none }

set policy { … } attack string loggingset attack stringunset policy { pol_num | id pol_num } attackunset attack string

attack string Inspects traffic to which the policy applies for attack objects in the spobjects can be stateful signatures or protocol anomalies. If the NetSobject, it then performs one of the following specified actions:

• action

- close The NetScreen device logs the event, severs the connecto both the client and server.

- close client The NetScreen device logs the event, severs the cpacket to the client.

- close server The NetScreen device logs the event, severs theRST to the server.

- drop The NetScreen device logs the event and severs the conclient or the server TCP RST packets.

- drop packet The NetScreen device logs the event and drops tobject, but it does not sever the connection.

- ignore The NetScreen device logs the event and stops checkinthe connection.

- none The NetScreen device logs the event but takes no action

• logging By default, the NetScreen device logs attacks that it detecdisable logging, enter the policy context and use the command ns(string logging .

Page 494: netscreen_CLI

“ip” through “port-mode”

478

he CRITICAL:HTTP:ANOM, groups in HTTP traffic from any detects any attack objects, it ver so it can clear its resources:

permit attack

rver

s in the Untrust zone

ver wc-server

cate his or her identity before

on (string).

NetScreen CLI Reference Guide

Example: The following commands define a policy to check for attack objects in tCRITICAL:HTTP:SIGS, HIGH:HTTP:ANOM, and HIGH:HTTP:SIGS attack object host in the Untrust zone to webserver1 in the DMZ zone. If the NetScreen device then severs the connection and sends webserver1 a TCP RST to webserver1 ser

ns-> set policy id 1 from untrust to dmz any webserver1 httpCRITICAL:HTTP:ANOM action close-server

ns-> set policy id 1ns(policy:1)-> set attack CRITICAL:HTTP:SIGS action close-sens(policy:1)-> set attack HIGH:HTTP:ANOM action close-serverns(policy:1)-> set attack HIGH:HTTP:SIGS action close-server

auth

set policy { ... } auth [ ... ]

Example: The following command invokes user authentication.

• Permits any kind of traffic from any address in the Trust zone to any addres

• Uses an authentication server named wc-server

set policy from trust to untrust any any any permit auth ser

av

set policy { … } av name_strset av name_str

auth Requires the user to provide a login name and password to authentiaccessing the device and crossing the firewall.

• server name_str Identifies the authentication server (name_str).

• group-expression string Identifies users according to an expressi

• user name_str Identifies a user (name_str).

• user-group name_str Identifies a user group (name_str).

Page 495: netscreen_CLI

“ip” through “port-mode”

479

P traffic originating from the ver “mail1” in the DMZ zone to

t av scan-mgr

itions it before the policy with ID

ermit

s to the specified antivirus (AV) es the data for viruses. If it finds a

ation message to the client. Note:

n the access control list

issue the get configuration

NetScreen CLI Reference Guide

unset policy { pol_num | id pol_num } av name_strunset av name_str

Example: The following command instructs the NetScreen device to forward SMTremote mail server “r-mail1” in the Untrust zone and destined for the local mail serthe internal AV scanner “scan-mgr”:

set policy id 1 from untrust to dmz r-mail1 mail1 smtp permi

before

set policy before pol_num1 { ... }

Example: The following command creates a new policy with ID number 3 and posnumber 2:

set policy id 3 before 2 from trust to untrust any any any p

configuration

get configuration

av name_str Sends FTP, HTTP, POP3, or SMTP traffic to which the policy appliescanner (the internal AV scanner is called “scan-mgr”), which examinvirus, the NetScreen device drops the data and sends a virus notificThe external antivirus feature is not supported in ScreenOS 5.1.0.

before Specifies the position of the policy before another policy (pol_num) i(ACL).

configuration Displays the configuration details for the policy in whose context youcommand.

Page 496: netscreen_CLI

“ip” through “port-mode”

480

... }

he Trust zone to any address in plies:

ows to pass through the

re so that you can view alarms. he number of bytes per minute

for a matching policy.

ice simply drops the packet.

address across the firewall to the

ice drops the packet and sends a and an ICMP “destination or UDP traffic. For types of traffic acket without notifying the source

NetScreen CLI Reference Guide

count

set policy { ... } [ count [ alarm { id_num1 id_num2 } ] ] {

Example: The following command permits any kind of traffic from any address in tthe Untrust zone and maintains a count of all network traffic to which the policy ap

set policy from trust to untrust any any any permit count

default-permit-all

set policy default-permit-all

deny | permit | reject

set policy [ global ] { ... } permit | deny | reject [ ... ]

count Maintains a count, in bytes, of all the network traffic the policy allNetScreen device.The alarm number1 number2 parameter enables the alarm featuYou must enter the number of bytes per second (number1) and t(number2) required to trigger an alarm.

default-permit-all Allows access without checking the access control list (ACL)

deny | permit | reject • deny blocks the service at the firewall. The NetScreen dev

• permit allows the specified service to pass from the sourcedestination address.

• reject blocks the service at the firewall. The NetScreen devTCP reset (RST) segment to the source host for TCP trafficunreachable, port unreachable” message (type 3, code 3) fother than TCP and UDP, the NetScreen device drops the phost, which is also what occurs when the action is “deny”.

Page 497: netscreen_CLI

“ip” through “port-mode”

481

_name { ... } [ ... ]

s. The possible event levels are

.

allows all source IP addresses.

any allows all destination IP

NetScreen CLI Reference Guide

Example: The following command:

• Defines a policy from the Trust zone to the Untrust zone

• Uses any source or destination IP address

• Permits any kind of service

set policy from trust to untrust any any any permit

di-severity (within a policy context)

set di-severity

disable

set policy [ global ] id pol_num disable

from ... to

set policy { ... } from zone1 to zone2 src_addr dst_addr svc

disable Specifies the severity of events that generate error messageinfo, low, medium, high, and critical.

disable Disables the policy without removing it from the configuration

from zone1 to zone2 src_addr dst_addr svc_name

Specifies two zones between which a policy controls traffic.

• zone1 is the name of the source security zone.

• zone2 is the name of the destination security zone.

• src_addr is the name of the source address. Specifying any

• dst_addr is the name of the destination address. Specifyingaddresses.

Page 498: netscreen_CLI

“ip” through “port-mode”

482

rust zone to any address in the

l_num3 }

ts FTP-GET traffic from any

t

fies all available services.

-I.

e address book keeps all the VIPs s. You can use these VIP urity zones.

y.)

NetScreen CLI Reference Guide

Example: The following command permits HTTP traffic from any address in the TUntrust zone:

set policy from trust to untrust any any HTTP permit

global

set policy global before { ... }set policy global id pol_num disableset policy global move pol_num1 { before pol_num2 | after poset policy global name name_str { ... }set policy global top

id

get policy [ global ] id pol_num set policy [ global ] id pol_num1 { ... }

unset policy id pol_num [ disable ]

Example: The following command assigns the policy an ID value of 10 and permiaddress in the Trust zone to any address in the Untrust zone:

set policy id 10 from trust to untrust any any ftp-get permi

• svc_name is the name of the service. Specifying any identi

For more information on zones, see “Zone Names” on page B

global Creates or displays policies that use the Global zone. The Global zonof all interfaces, regardless of the zone to which the interface belongaddresses as destination addresses in policies between any two sec

id pol_num Specifies a policy ID number. (The disable switch disables the polic

Page 499: netscreen_CLI

“ip” through “port-mode”

483

ion string [ target

ute force attack occurs when an works. Attackers might use brute s, or break encryption keys. If the cified IP action for a certain period target.

device performs when it detects a

er traffic matching the target

er traffic matching the target and sends a Reset (RST) for TCP

any action against further traffic the timeout setting.

en device to consider a packet packet arriving during a specified tected as part of a brute force attack. The default is “serv”.

t number, and protocol

; that is, the source security zone

addresses, destination port

ing which the NetScreen device ters. The default is 60 seconds.

NetScreen CLI Reference Guide

ip-action

set policy { ... } permit attack string action string ip-actstring [ timeout number ] ]

ip-action string Activates additional brute force attack defenses to DI detection. A brattacker barrages a target with every possible combination until oneforce attacks when attempting to log in, discover protected resourceNetScreen device detects a brute force attack, it then applies the speof time to other packets with a set of elements that match a defined

• ip-action Specifies one of the following actions that the NetScreenbrute force attack:

- block The NetScreen device logs the event and drops all furthdefinition for the period of time specified in the timeout setting.

- close The NetScreen device logs the event and drops all furthdefinition for the period of time specified in the timeout setting, traffic to the source and destination addresses.

- notify The NetScreen device logs the event but does not take matching the target definition for the period of time specified in

• target Specifies a set of elements that must match for the NetScrepart of a brute force attack. The specified set of elements in an IP timeout period must match that in the packet that the NetScreen deattack for the subsequent packet to be considered part of the same

- dst-ip The destination IP address

- serv The source and destination IP addresses, destination por

- src-ip The source IP address

- zone The security zone to which the ingress interface is boundfrom which the attacking packets originate

- zone-serv The source security zone, source and destination IPnumber, and protocol

• timeout A period of time following brute force attack detection durperforms an IP action on packets matching specified target parame

Page 500: netscreen_CLI

“ip” through “port-mode”

484

y host in the Untrust zone to an :HTTP:ANOM”, which contains

t group, it drops the traffic and two brute force attacks, it also e Untrust zone for the next 30

HIGH:HTTP:ANOM action

str

nel vpn home2office

{ ... }

NetScreen CLI Reference Guide

Example: The following command applies Deep Inspection to HTTP traffic from anHTTP server (“hpp1”) in the DMZ. It searches for attacks in the attack group “HIGHtwo brute force attack objects. If the NetScreen detects any attack included in thasends a TCP RST to the Web server. If the NetScreen device detects either of thedrops further HTTP traffic (using TCP to port 80) to that server from any host in thseconds:

set policy from untrust to dmz any http1 http permit attack close ip-action close target zone-serv timeout 30

l2tp

set policy [ global ] { ... } tunnel l2tp tunn_str { ... }set policy [ global ] { ... } tunnel vpn tunn_str l2tp tunn_

Example: The following command defines an inbound policy for an L2TP tunnel.

• VPN tunnel named “home2office”

• L2TP tunnel named “home-office”

• Dialup VPN group named “home_office”

set policy from untrust to trust dialup_vpn our_side any tunl2tp home_office

log

set policy [ global ] { ... } log [ alert ] [ session-init ]

l2tp Specifies a Layer 2 Tunneling Protocol (L2TP) tunnel.

log Enables logging when a session ends.

alert Enables the syslog alert feature.

session-init Enables logging when a starts.

Page 501: netscreen_CLI

“ip” through “port-mode”

485

ice to log the traffic to which the

e Untrust zone

e NetScreen device generates

rt

r pol_num3 }

re the policy with ID number 2:

ermit

. }

r after a policy (pol_num3) in the licy in the ACL, it has higher

nal.)

NetScreen CLI Reference Guide

Example: The following command creates a policy and directs the NetScreen devpolicy applies.

• Permits HTTP traffic from any address in the Trust zone to any address in th

• Directs the NetScreen device to log the traffic to which the policy applies. Thlogs when sessions end.

• Enables the syslog alert feature

set policy from trust to untrust any any HTTP permit log ale

move

set policy [ global ] move pol_num1 { before pol_num2 | afte

Example: The following command positions a global policy with ID number 4 befo

set policy global move 4 before 2

name

set policy [ global ] [ ... ] name name_str {... }

Example: The following command creates a new policy named “outbound”:

set policy name outbound from trust to untrust any any any p

nat

set policy [ global ] { ... } nat src [ dip-id id_num ] { ..

move Repositions a policy (pol_num1) before another policy (pol_num2) oaccess control list (ACL). When one policy comes before another poprecedence.

name name_str Identifies the policy by name. (Assigning a name to an policy is optio

Page 502: netscreen_CLI

“ip” through “port-mode”

486

t port_num ] { ... }

ic from any address in the Trust

8 permit

1 in the DMZ zone and a policy irtual destination address s from 1.1.1.5 to 10.2.2.5:

0.2.2.5 permit

n):

ation (NAT-src and NAT-dst). This IP packet header to another

etScreen device can perform do not specify a DIP pool) or with

ber can be between 4 and 255.

reen supports the following three

ess specified in the policy. The

om one range of addresses to an maintains a consistent mapping of e specified range using a

ress and port number to the

NetScreen CLI Reference Guide

set policy [ global ] { ... } nat dst ip addr1 [ addr2 | por

Example: The following command creates a policy that applies NAT-src on all traffzone to any address in the Untrust zone and specifies DIP pool 8:

set policy from trust to untrust any any any nat src dip-id

Example: The following commands create an address (1.1.1.5/32) named v-addrthat applies NAT-dst on HTTP traffic from any address in the Untrust zone to the vv-addr1 in the DMZ zone. The NetScreen device translates the destination addres

set address dmz v-addr1 1.1.1.5/32set policy from untrust to dmz any v-addr1 http nat dst ip 1

Example: The following command combines NAT src (source) and dst (destinatio

nat Enables or disables source and destination Network Address Translfeature translates the original source or destination IP address in anaddress.

• src Performs NAT-src on traffic to which the policy applies. The NNAT-src using the egress interface IP address (in which case, youaddresses from a Dynamic IP (DIP) pool:

- dip-id id_num Specifies the ID number of a DIP pool. This num

• dst Performs NAT-dst on traffic to which the policy applies. NetScoptions for NAT-dst:

- ip addr1 Translates the original destination address to the addrNetScreen device does not translate the original port number.

- ip addr1 addr2 Translates the original destination IP address fraddress in another range of addresses. The NetScreen device an original destination address to a translated address within thtechnique called address shifting.

- ip addr1 port port_num Translates the original destination addaddress and port number specified in the policy.

Page 503: netscreen_CLI

“ip” through “port-mode”

487

8 dst ip 10.2.2.5

ll addresses in the Trust zone

itrmit

addresses except those specified . The negate option takes effect at omponent

n the NetScreen device is in a ce operating in HA backs up

NetScreen CLI Reference Guide

set policy from trust to untrust any any any nat src dip-id permit

negate

set { dst-address | src-address } negate

Example: The following commands permit HTTP traffic to the Untrust zone from aexcept from addr1:

ns-> set policy id 1 from trust to untrust any any http permns-> set policy id 2 from trust to untrust addr1 any http pens-> set policy id 2ns(policy:2)-> set src-address negate

no-session-backup

set policy [ global ] { ... } no-session-backup { ... }

negate Applies the policy in whose context you issue this command to allas either the destination (dst-address) or source (src-address)the policy component level, applying to all items in the negated c

no-session-backup Disables backing up the sessions to which the policy applies whehigh availability (HA) configuration. By default, a NetScreen devisessions.

Page 504: netscreen_CLI

“ip” through “port-mode”

488

nel and then bind them into a l with ID 4 and addresses

c dip-id 4 tunnel vpn

L tunnel vpn vpn1

, proto 6, port 25

in the DIP pool or any service hat encompasses both the MIP

/24 ANY

references the same VPN tunnel tion (SA). This is useful when you ere is source destination address ing a MIP or VIP. Without policy oth the outbound and inbound a single proxy ID for the VPN y ID (derived from the policy that mote peer, and they share a

NetScreen CLI Reference Guide

pair-policy

set policy [ global ] { ... } pair-policy pol_num [ ... ]

Example: The following commands create two policies sharing the same VPN tunpolicy pair. (You have previously created on the tunnel interface subnet a DIP poo1.1.1.10 – 1.1.1.20, and a MIP from 1.1.1.5 to host 10.1.1.5 .):

set policy id 1 from trust to untrust addr1 addr2 any nat srvpn1

set policy id 2 from untrust to trust addr2 mip(1.1.1.5) MAIpair-policy 1

The proxy ID for both of these policies is as follows:

local 1.1.1.5/255.255.255.255, remote 10.2.2.0/255.255.255.0

Because the local address in the above proxy ID does not include the addresses other than SMTP (or “MAIL”), you must also set a proxy ID with an address range t(1.1.1.5) and DIP pool (1.1.1.10–1.1.1.20) and change the service to “ANY”:

set vpn vpn1 proxy-id local-ip 1.1.1.0/24 remote-ip 10.2.2.0

pair-policy pol_num Links the policy that you are configuring with another policy that so that both policies share one proxy ID and one security associawant to allow bidirectional traffic over a policy-based VPN and thtranslation using a DIP pool or destination address translation uspairing, the NetScreen device derives a different proxy ID from bpolicies. This causes a problem for the remote peer if it has onlytunnel. By pairing both policies together, they share a single proxyou configured last), which solves the proxy ID problem for the resingle SA, which conserves SA resources.

Page 505: netscreen_CLI

“ip” through “port-mode”

489

ed” and then reference it in a ess in the Untrust zone:

00 Mkt_Sched

ss in the Untrust zone

t

cy at the top of the ACL has the

NetScreen CLI Reference Guide

schedule

set policy [ global ] { ... } schedule name_str [ ... ]

Example: With following commands, you first create a schedule named “Mkt_Schpolicy permitting any kind of traffic from any address in the Trust zone to any addr

set schedule Mkt_Sched recurrent monday start 09:00 stop 12:set policy from trust to untrust any any any permit schedule

top

set policy [ global ] [ ... ] top

Example: The following command:

• Permits any kind of service from any address in the Trust zone to any addre

• Assigns to the policy an ID value of 30

• Places the policy at the top of the ACL

set policy id 30 top from trust to untrust any any any permi

schedule Applies the policy only at times defined in the specified schedule.

top Places the policy at the top of the access control list (ACL). The polihighest precedence.

Page 506: netscreen_CLI

“ip” through “port-mode”

490

| enable }

e Untrust zone

point (DSCP) marking system

gbw 3000 priority 2

e NetScreen device passes traffic ic shaping.

en traffic falls between the ce passes traffic with higher r priority traffic.

r second. Traffic beyond this limit

ht NetScreen priority levels to the tem. In the NetScreen system, 0

NetScreen CLI Reference Guide

traffic gbw

set policy [ global ] [ ... ] trafficgbw number priority number mbw [ number ] dscp { disable

Example: The following command:

• Permits HTTP traffic from any address in the Trust zone to any address in th

• Guarantees bandwidth of 3,000 kilobits per second

• Assigns a priority value of 2

• Sets the maximum bandwidth to 10,000 kilobits per second

• Enables mapping of the eight NetScreen priority levels to the DiffServ Code

set policy from trust to untrust any any HTTP permit trafficmbw 10000 dscp enable

traffic gbw Defines the guaranteed bandwidth (GBW) in kilobits per second. Thbelow this threshold with the highest priority, without performing traff

• priority number Specifies one of the eight traffic priority levels. Whguaranteed and maximum bandwidth settings, the NetScreen devipriority first. Lower priority traffic is passed only if there is no highe

• mbw number Defines the maximum bandwidth (MBW) in kilobits peis throttled and dropped.

• dscp { enable | disable } Enables or disables a mapping of the eigDifferentiated Services—DiffServ—Codepoint (DSCP) marking sysis the highest priority and seven is the lowest.

Page 507: netscreen_CLI

“ip” through “port-mode”

491

l.

ress book entry Headquarters)

vpn To_HQ

nnel, specify vpn and the name of tunnel) and l2tp (with the name of

also referencing the same VPN. ation includes the pair-policy

consist of multiple VPNs, which

policy. Only one URL profile can ted URL filtering feature. For en Concepts & Examples

NetScreen CLI Reference Guide

tunnel

set policy [ global ] { ... } tunnel{ l2tp tunn_str | vpn-group id_num }

set policy [ global ] { ... } tunnel vpn tunn_str[ l2tp tunn_str | pair-policy pol_num ]

Example: The following command defines a policy that uses a defined VPN tunne

• Encrypts traffic exchanged with the corporate headquarters (denoted by add

• Uses a VPN named To_HQ:

set policy from trust to untrust any Headquarters any tunnel

url

set url protocol sc-cpa profile { <name_str> | ns-profile }

tunnel Encrypts outgoing IP packets, and decrypts incoming IP packets.

• vpn [ l2tp tunn_str ] Identifies a VPN tunnel. For an IPSec VPN tuthe VPN tunnel. For L2TP, specify vpn (with the name of the VPN the L2TP tunnel).

• vpn [ pair-policy id_num ] Links this policy with an existing policy The VPN uses the proxy-id derived from the policy whose configurkeyword.

• vpn-group id_num Identifies a VPN group (id_num). A VPN groupyou can specify in a single policy.

• vpn-tunnel Identifies an active tunnel.

profile Specifies the URL filtering profile that you are binding to the specifiedbe linked to a policy. Use this command when configuring the integrainformation about this feature, refer to the Juniper Networks NetScreScreenOS Reference Guide.

Page 508: netscreen_CLI

“ip” through “port-mode”

492

e ]

one to the Untrust zone:

y higher in the list does not n check discovers policy ing which. You can define the

rify the ordering of policies in all

to any zone.

ecified zones.

ified zone.

NetScreen CLI Reference Guide

url filter

set policy { ... } url-filter

verify

exec policy verify [ from zone [ to zone ] | global | to zon

Example: The following command verifies the ordering of policies from the Trust z

exec policy verify from trust to untrust

url-filter Enables URL filtering on the NetScreen device.

verify Verifies that the order of policies in a policy list is valid so that a policeclipse, or “shadow”, another policy lower in the list. If the verificatioshadowing, the command output explains which policies are shadowscope of the verification as follows:

• Not setting any further options instructs the NetScreen device to vepolicy sets.

• from zone Checks the ordering of policies from the specified zone

• from zone to zone Checks the ordering of policies between the sp

• global Checks the ordering of policies in the global policy set.

• to zone Checks the ordering of policies from any zone to the spec

Page 509: netscreen_CLI

“ip” through “port-mode”

493

port-modedings for the NetScreen-5XT t mode setting.)

| extended |

and requires a system reset.

hich is bound to the Untrust zone.

ich is bound as a backup interface

t2 interface, which is bound to the

ich is bound to the Work zone.

T Elite (unrestricted users)

NetScreen CLI Reference Guide

Description: Use the port-mode commands to set the port, interface, and zone binand NetScreen-5GT devices. (Use the get system command to see the current por

Syntax

exec

exec port-mode { combined | dmz-dual-untrust | dual-untrust home_work | trust-untrust }

Keywords and Variables

Warning: Setting the port mode removes any existing configurations on the device

combined Defines the following port, interface, and zone bindings:

• Binds the Untrusted Ethernet port to the ethernet4 interface, w

• Binds the Trusted4 Ethernet port to the ethernet3 interface, whto the Untrust zone.

• Binds the Trusted3 and Trusted2 Ethernet ports to the etherneHome zone.

• Binds the Trusted1 Ethernet port to the ethernet1 interface, wh

The combined port mode is supported only on the NetScreen-5Xplatform.

Page 510: netscreen_CLI

“ip” through “port-mode”

494

ich is bound to the Trust security

und to the DMZ security zone.

und to the Untrust security zone.

h is bound to the Untrust security

und to the Untrust zone.

ich is bound as a backup interface

rnet1 interface, which is bound to

ich is bound to the Trust security

ich is bound to the DMZ security

hich is bound to the Untrust

d as a backup interface to the

hich is bound to the Untrust zone.

t2 interface, which is bound to the

NetScreen CLI Reference Guide

dmz-dual-untrust Defines the following port, interface, and zone bindings:

• Binds the Ethernet ports 1 and 2 to the ethernet1 interface, whzone.

• Binds the Ethernet port 3 to the ethernet2 interface, which is bo

• Binds the Ethernet port 4 to the ethernet3 interface, which is bo

• Binds the Untrust Ethernet port to the ethernet4 interface, whiczone.

dual-untrust Defines the following port, interface, and zone bindings:

• Binds the Untrusted port to the ethernet3 interface, which is bo

• Binds the Trusted4 Ethernet port to the ethernet2 interface, whto the Untrust zone.

• Binds the Trusted1 through Trusted3 Ethernet ports to the ethethe Trust zone.

extended Defines the following port, interface, and zone bindings:

• Binds the Ethernet ports 1 and 2 to the ethernet1 interface, whzone.

• Binds the Ethernet ports 3 and 4 to the ethernet2 interface, whzone.

• Binds the Untrusted Ethernet port to the ethernet3 interface, wsecurity zone.

• Binds the Modem port to the serial interface, which you can binUntrust security zone.

home-work Defines the following port, interface, and zone bindings:

• Binds the Untrusted Ethernet port to the ethernet3 interface, w

• Binds the Trusted4 and Trusted3 Ethernet ports to the etherneHome zone.

Page 511: netscreen_CLI

“ip” through “port-mode”

495

t1 interface, which is bound to the

d as a backup interface to the

h is bound to the Untrust zone.

t interface, which is bound to the

d as a backup interface to the

and requires a system reset.

NetScreen CLI Reference Guide

• Binds the Trusted2 and Trusted1 Ethernet ports to the etherneWork zone.

• Binds the Modem port to the serial interface, which you can binUntrust zone.

trust-untrust Defines the following port, interface, and zone bindings:

• Binds the Untrusted Ethernet port to the untrust interface, whic

• Binds the Trusted1 through Trusted4 Ethernet ports to the trusTrust zone.

• Binds the Modem port to the serial interface, which you can binUntrust zone.

This is the default port mode.

Warning: Setting the port mode removes any existing configurations on the device

Page 512: netscreen_CLI

“ip” through “port-mode”

496

NetScreen CLI Reference Guide
Page 513: netscreen_CLI

4

497

ce (CLI) commands pppoa

you may find that certain ood example is the vsys XP device. Similarly, some e vpn command. This option is

NetScreen CLI Reference Guide

4

“pppoa” through “zone”

This section lists and describes Juniper Networks NetScreen Command Line Interfathrough zone.

Note: As you execute CLI commands using the syntax descriptions in this section,commands and command features are unavailable on your NetScreen platform. A gcommand, which is available on a NetScreen-500 device, but not on a NetScreen-5command options are unavailable on certain platforms, as with the df-bit option of thavailable on a NetScreen-500, but not on a NetScreen-5XP.

Page 514: netscreen_CLI

“pppoa” through “zone”

498

pppoaPPoA configuration parameters.

to be terminated on a s services as it does not require

NetScreen CLI Reference Guide

Description: Use the pppoa commands to configure PPPoA or to display current P

Point-to-Point Protocol over ATM (PPPoA) is usually used for PPP sessions that areNetScreen device with an ADSL interface. PPPoA is primarily used for business clasa desktop client (which is required for PPPoE termination).

Syntax

clear

clear [ cluster ] pppoa [ name name_str ]

exec

exec pppoa [ name name_str ] { connect | disconnect }

get

get pppoa { all | name name_str }

set

set pppoa [ name name_str ]{authentication { CHAP | PAP | any } |auto-connect number |clear-on-disconnect |idle-interval number |interface [ interface ] |netmask [ mask ] |ppp

{

Page 515: netscreen_CLI

“pppoa” through “zone”

499

NetScreen CLI Reference Guide

lcp-echo-retries number |lcp-echo-timeout number} |

static-ip |update-dhcpserver |username name_str password pswd_str}

unset

unset pppoa [ name name_str ]{authentication { CHAP | PAP } |auto-connect |clear-on-disconnect |idle-interval |interface |netmask |ppp

{lcp-echo-retries |lcp-echo-timeout} |

static-ip |update-dhcpserver |username}

Page 516: netscreen_CLI

“pppoa” through “zone”

500

ption gives preference to CHAP.) entication to CHAP only, first

tiation of a previously-closed abled by default.

NetScreen CLI Reference Guide

Keywords and Variables

all

get pppoa all

authentication

set pppoa authentication { CHAP | PAP | any }unset pppoa authentication { CHAP | PAP }

auto-connect

set pppoa auto-connect numberunset pppoa auto-connect

clear-on-disconnect

set pppoa [ name name_str ] clear-on-disconnect

all Displays information for all PPPoA instances.

authentication Sets the authentication methods to CHAP, PAP, or any. (The any oThe default authentication is any (both CHAP and PAP). To set authexecute unset pppoa authentication PAP.

auto-connect Specifies the number of seconds that elapse before automatic re-iniconnection occurs. Valid range is 0-10000. (0 to disable.) This is dis

Page 517: netscreen_CLI

“pppoa” through “zone”

501

ateway for the interface once address and gateway for the

the default instance untrust.

ound to an interface.)

etScreen device terminates a Specifying 0 turns off the idle is 30 minutes.

NetScreen CLI Reference Guide

unset pppoa clear-on-disconnect

connect | disconnect

exec pppoa [ name name_str ] { connect | disconnect }

idle-interval

set pppoa idle-interval numberunset pppoa idle-interval

interface

set pppoa interface [ name_str ]unset pppoa interface

clear-on-disconnect Directs the NetScreen device to clear the IP address and the gPPPoA disconnects. By default, this is disabled; that is, the IP interface remain when PPPoA disconnects.If you do not specify name , ScreenOS sets the parameter for

connect Starts a PPPoA connection for an instance. (Each instance can be b

disconnect Takes down a PPPoA connection.

idle-interval Sets the idle timeout, which is time elapsed (in minutes) before the NPPPoA connection due to inactivity. Valid range is 0-10000 minutes.timeout and the device never terminates the connection. The default

interface Specifies the ADSL interface for PPPoA encapsulation.

Page 518: netscreen_CLI

“pppoa” through “zone”

502

u can assign a username and stance. the parameters for the default

ace bound to the PPPoA instance 55.255.0.

subnets, use the following

NetScreen CLI Reference Guide

name

exec pppoa [ name name_str ] { connect | disconnect }get pppoa [ name name_str | all ]set pppoa [ name name_str ] ...unset pppoa [ name name_str ]

Example: The following commands define a name for a PPPoA instance.

• User name user1 and password 123456

• PPPoA instance pppoa-user-1 bound to the ethernet2 interface

set pppoa name pppoa-user-1 username user1 password 123456set pppoa name pppoa-user-1 interface ethernet2

netmask

set pppoa netmask maskunset pppoa netmask

name Specifies or defines the name for a specific PPPoA instance. Yopassword, interface, and other PPP/PPPoA parameters to the inIf you do not specify name , ScreenOS automatically configures instance untrust.

netmask Specifies a PPPoa subnet mask that the device assigns to the interf(after establishment of the connection). The default netmask is 255.2When it is necessary for two or more interfaces to have overlapping command:set vrouter vrouter ignore-subnet-conflict

Page 519: netscreen_CLI

“pppoa” through “zone”

503

sts before connection is

wo LCP Echo requests. Valid

o your device’s interface. This is

pdates DNS parameters received

NetScreen CLI Reference Guide

ppp

set pppoa ppp { ... }unset pppoa ppp { ... }

static-ip

set pppoa static-ipunset pppoa static-ip

update-dhcpserver

set pppoa update-dhcpserverunset pppoa update-dhcpserver

username

set pppoa username name_str password pswd_str

ppp Specifies PPP parameters.

• lcp-echo-retries the number of unacknowledged LCP Echo requeterminated. Valid range is 1-30. The default is 10.

• lcp-echo-timeout the time that elapses between transmission of trange is 1-1000 seconds. The default is 180 seconds.

static-ip Specifies that your connection uses the static IP address assigned tdisabled by default.

update-dhcpserver Specifies that the DHCP server (on the device) automatically uthrough the PPPoA connection. This is enabled by default.

username Sets the user name and password for authentication.

Page 520: netscreen_CLI

“pppoa” through “zone”

504

pppoePPoE configuration parameters.

of an Ethernet LAN to make PPP payload, which is which allows them to operate E to give their clients Internet

NetScreen CLI Reference Guide

Description: Use the pppoe commands to configure PPPoE or to display current P

Point-to-Point Protocol over Ethernet (PPPoE) is a protocol that allows the membersindividual PPP connections with their ISP by encapsulating the IP packet within the encapsulated inside the PPPoE payload. Some NetScreen devices support PPPoE,compatibly on DSL, Ethernet Direct, and cable networks run by ISPs that use PPPoaccess.

Syntax

clear

clear [ cluster ] pppoe [ name name_str ]

exec

exec pppoe [ name name_str ] { connect | disconnect }

get

get pppoe[all |name name_str | id id_num

[ configuration | statistics ]]

Page 521: netscreen_CLI

“pppoa” through “zone”

505

NetScreen CLI Reference Guide

set

set pppoe [ name name_str ]{ac name_str |authentication { CHAP | PAP | any } |auto-connect number |clear-on-disconnect |default-route-metric number |enable |idle-interval number |interface [ name_str ] |netmask mask |ppp

{lcp-echo-retries number |lcp-echo-timeout number} |

service name_str |static-ip |update-dhcpserver |username name_str password pswd_str}

unset

unset pppoe [ name name_str ]{ac |authentication { CHAP | PAP } |auto-connect |clear-on-disconnect |default-route-metric |enable |idle-interval |

Page 522: netscreen_CLI

“pppoa” through “zone”

506

centrator).

NetScreen CLI Reference Guide

interface |netmask |ppp

{lcp-echo-retries |lcp-echo-timeout} |

service |static-ip |update-dhcpserver |username}

Keywords and Variables

ac

set pppoe ac name_strunset pppoe ac

all

get pppoe all

ac Allows the interface to connect only to the specified AC (access con

all Displays information for all PPPoE instances.

Page 523: netscreen_CLI

“pppoa” through “zone”

507

ption gives preference to CHAP.) thentication to CHAP only, first

tiation of a previously-closed

ateway for the interface once address and gateway for the

the default instance untrust.

r.

NetScreen CLI Reference Guide

authentication

set pppoe authentication { CHAP | PAP | any }unset pppoe authentication { CHAP | PAP }

auto-connect

set pppoe auto-connect numberunset pppoe auto-connect

clear-on-disconnect

set pppoe [ name name_str ] clear-on-disconnectunset pppoe clear-on-disconnect

cluster

clear cluster pppoe

authentication Sets the authentication methods to CHAP, PAP, or any. (The any oThe default of authentication is any (both CHAP and PAP). To set auexecute unset pppoe authentication PAP.

auto-connect Specifies the number of seconds that elapse before automatic re-iniconnection occurs. Valid range is 0-10000. (0 to disable.)

clear-on-disconnect Directs the NetScreen device to clear the IP address and the gPPPoE disconnects. By default, this is disabled; that is, the IP interface remain when PPPoE disconnects.If you do not specify name , ScreenOS sets the parameter for

cluster Propagates the clear operation to all other devices in a NSRP cluste

Page 524: netscreen_CLI

“pppoa” through “zone”

508

for the default instance untrust.

e bound to an interface.)

ect that defines the instance. This r without redefining it.

NetScreen CLI Reference Guide

configuration

get pppoe [ name name_str ] configuration

connect | disconnect

exec pppoe [ name name_str ] { connect | disconnect }

default-route-metric

set pppoe default-route-metric numberunset pppoe default-route-metric

enable

set pppoe [ name name_str ] enableunset pppoe [ name name_str ] enable

configuration Displays the configuration options.If you do not specify name , ScreenOS displays the parameters

connect Starts a PPPoE connection for an instance. (Each instance can b

disconnect Takes down a PPPoE connection.

default-route-metric Sets the metric for the default route for the current instance.

enable Enables or disables a PPPoE instance, without removing the objallows you to temporarily disable the instance, and enable it late

Page 525: netscreen_CLI

“pppoa” through “zone”

509

etScreen device terminates a eout and the device never

u can assign a username and stance. the parameters for the default

NetScreen CLI Reference Guide

idle-interval

set pppoe idle-interval numberunset pppoe idle-interval

id

get pppoe id id_num

interface

set pppoe interface [ name_str ]unset pppoe interface

name

exec pppoe [ name name_str ] { connect | disconnect }get pppoe [ name name_str | all ]set pppoe [ name name_str ] ...unset pppoe [ name name_str ]

idle-interval Sets the idle timeout, which is time elapsed (in minutes) before the NPPPoE connection due to inactivity. Specifying 0 turns off the idle timterminates the connection.

id Specifies a PPPoE instance by ID number.

interface Specifies the interface for PPPoE encapsulation.

name Specifies or defines the name for a specific PPPoE instance. Yopassword, interface, and other PPP/PPPoE parameters to the inIf you do not specify name , ScreenOS automatically configures instance untrust.

Page 526: netscreen_CLI

“pppoa” through “zone”

510

ace bound to the PPPoE instance

subnets, use the following

ts before connection is terminated.

o Lcp Echo requests. Valid range

NetScreen CLI Reference Guide

Example: The following commands define a name for a PPPoE instance.

• User name user1 and password 123456

• PPPoE instance pppoe-user-1 bound to the ethernet2 interface

set pppoe name pppoe-user-1 username user1 password 123456set pppoe name pppoe-user-1 interface ethernet2

netmask

set pppoe netmask maskunset pppoe netmask

ppp

set pppoe ppp { ... }unset pppoe ppp { ... }

netmask Specifies a PPPoE subnet mask that the device assigns to the interf(after establishment of the connection).When it is necessary for two or more interfaces to have overlapping command:set vrouter vrouter ignore-subnet-conflict

ppp Specifies PPP parameters.

• lcp-echo-retries the number of unacknowledged Lcp Echo requesValid range is 1-30.

• lcp-echo-timeout the time that elapses between transmission of twis 1-1000 seconds.

Page 527: netscreen_CLI

“pppoa” through “zone”

511

ce tags to enable a PPP over es during call setup. The user can ervice when the PPPoE session o charge customers according to

device’s interface.

pdates DNS parameters received

NetScreen CLI Reference Guide

service

set pppoe service name_strunset pppoe service

static-ip

set pppoe static-ipunset pppoe static-ip

statistics

get pppoe statistics

update-dhcpserver

set pppoe update-dhcpserverunset pppoe update-dhcpserver

service Allows only the specified service (name_str). This feature uses serviEthernet (PPPoE) server to offer PPPoE clients a selection of servicchoose an offered service, and the NetScreen device provides the sbecomes active. This allows service providers to offer services and tthe service chosen.

static-ip Specifies that your connection uses the IP address assigned to your

statistics Specifies the statistics information.

update-dhcpserver Specifies that the DHCP server (on the device) automatically uthrough the PPPoE connection.

Page 528: netscreen_CLI

“pppoa” through “zone”

512

sword to “!@%)&&”:

NetScreen CLI Reference Guide

user-name

set pppoe username name_str password pswd_str

Example: The following command sets the username to “Phred”, and Phred’s pas

set pppoe username Phred password !@%)&&

DefaultsThe defaults for this command are as follows.

• Disabled

• Authentication method any

• Timeout 30 minutes

• auto-connect setting disabled

• lcp-echo-timeout value 180 seconds

• retries value 10

• netmask value 255.255.255.255

• update-dhcpserver setting enabled

• static-ip setting disabled

• clear-on-disconnect setting disabled

username Sets the user name and password.

Page 529: netscreen_CLI

“pppoa” through “zone”

513

proxy-idxy ID updates. A proxy ID is a

proxy ID for both peers must e the same, and the local IP for the other peer. The peers

oading this file, the NetScreen involves MIPs or VIPs can n in the file. To resolve this efault behavior of the device to

large number of policies, the vior does not update proxy IDs

ng the exec proxy-id update reen recommends either of the

oxy ID from the policy that

by the policies rather than olicies.

NetScreen CLI Reference Guide

Description: Use the proxy-id commands to set device behavior for processing prothree-part tuple consisting of local IP address, remote IP address, and service. The match, which means that the service specified in the proxy ID for both peers must baddress specified for one peer must be the same as the remote IP address specifiedexchange proxy IDs during IKE Phase 2 negotiations.

During the startup process, the NetScreen device loads its configuration file. While ldevice reads the policies before the routes. Because of this, routing information thatresult in the NetScreen device deriving incorrect proxy-IDs from the policy informatioproblem, you can use the unset proxy-id manual-update command to change the dupdate proxy IDs after the configuration file finishes loading. However, if you have aupdate procedure can take a very long time to complete. By default, the device behaautomatically during startup. Instead, you must manually update proxy IDs by entericommand. For VPN traffic that uses source or destination address translation, NetScfollowing approaches:

• Use routing-based VPNs and separate the VPN and its manually defined prenforces address translation.

• Use policy-based VPNs and assign proxy IDs to the VPN tunnels referencedallow the NetScreen device to automatically derive the proxy IDs from the p

Syntax

exec

exec proxy-id update

get

get proxy-id

Page 530: netscreen_CLI

“pppoa” through “zone”

514

s only in response to the exec vice to update the proxy IDs

NetScreen CLI Reference Guide

set

set proxy-id manual-update

unset

unset proxy-id manual-update

Keywords and Variables

update

exec proxy-id update

manual-update

set proxy-id manual-updateunset proxy-id manual-update

Defaults

By default, the NetScreen device does not update proxy IDs automatically.

update Instructs the NetScreen device to update all VPN proxy IDs.

manual-update When set, instructs the NetScreen device to update all VPN proxy IDproxy-id update command. When unset, instructs the NetScreen deautomatically during route change.

Page 531: netscreen_CLI

“pppoa” through “zone”

515

reset

ion before resetting.

before resetting.

NetScreen CLI Reference Guide

Description: Use the reset command to restart the NetScreen device.

Syntaxreset

[no-prompt |save-config { no | yes } [ no-prompt ]]

Keywords and Variables

no-prompt

reset no-prompt

save-config

reset save-config [ no | yes ] [ no-prompt ]

no-prompt Indicates no confirmation.

save-config • no Directs the NetScreen device to not save the current configurat

• yes Directs the NetScreen device to save the current configuration

• no-prompt Does not display a confirmation prompt.

Page 532: netscreen_CLI

“pppoa” through “zone”

516

RIP Commands(RIP) for a NetScreen virtual

route (0.0.0.0/0) of the current

s every destination. (Any entry

rnate routes in the RIP database

NetScreen CLI Reference Guide

Description: Use the rip context to begin configuring Routing Information Protocol router.

Context Initiation

Initiating the rip context can take up to four steps.

1. Enter the vrouter context by executing the set vrouter command.

set vrouter vrouter

For example:

set vrouter trust-vr

2. Enter the rip context by executing the set protocol rip command.

ns(trust-vr)-> set protocol rip

3. Enable RIP (it is disabled by default).

ns(trust-vr/rip)-> set enable

RIP Command ListThe following commands are executable in the rip context.

advertise-def-route Use the advertise-def-route commands to advertise the defaultvirtual router in the RIP routing domain.Every virtual router may have a default route entry, which matchewith a more specific prefix overrides the default route entry.)Command options: get, set, unset

alt-route Use the alt-route commands to set the maximum number of altefor a network prefix. Command options: set, unset

Page 533: netscreen_CLI

“pppoa” through “zone”

517

onfigure the RIP routing instance.

virtual router.

tributed routes. The default value

l router.

nds that elapse before the virtual 120 seconds.

is list contains routes did not obtain the routes in the h Timer interval elapses for an

ds that elapse before the virtual high metric.

irtual router.

onds that elapse after a neighbor efault is 180 seconds.

umber of RIP neighbors allowed.

NetScreen CLI Reference Guide

config Use the config command to display all commands executed to cCommand options: get

database Use the database command to display the RIP database in the Command options: get

default-metric Use the default-metric commands to set the RIP metric for redisis 10.Command options: set, unset

enable Use the enable commands to enable or disable RIP in the virtuaCommand options: set, unset

flush-timer Use the flush-timer commands to configure the number of secorouter automatically removes an invalidated route. The default isCommand options: set, unset

garbage-list Displays all routes currently contained in the RIP garbage list. Thautomatically removed from the routing table because the devicetime interval specified by the Invalid Timer setting. When the Flusentry, the device purges the entry from the garbage list.Command options: get

hold-timer Use the hold-timer commands to configure the number of seconrouter updates the routing table when RIP detects a route with a Command options: set, unset

interface Use the interface command to display all RIP interfaces in the vCommand options: get

invalid-timer Use the invalid-timer commands to configure the number of secstops advertising a route before the route becomes invalid. The dCommand options: set, unset

max-neighbor-count Use the max-neighbor-count commands to set the maximum nThe default is 16.Command options: set, unset

Page 534: netscreen_CLI

“pppoa” through “zone”

518

ors.

rom RIP neighbors in other t the responses.

imes that triggered requests are and circuit has come up.

outer running a different protocol

n IP address becoming available

default route learned from a

ber of times that triggered smitted over the demand circuit.

ric to a RIP route matrix.

utes.

NetScreen CLI Reference Guide

neighbors Use the neighbors command to display the status of RIP neighbCommand options: get

no-source-validation Use the no-source-validation commands to accept responses fsubnets or to reject such responses. The default action is to rejecCommand options: set, unset

poll-timer Use the poll-timer commands to set the interval and number of tsent over the demand circuit to check if the other end of the demCommand options: set, unset

redistribute Use the redistribute commands to import known routes from a rinto the current routing instance.

You can import the following types of routes:

• Manually created (static) routes

• BGP routes

• OSPF routes

• Routes created by an external router, due to an interface with a

• Routes imported from other virtual routes

Command options: set, unset

reject-default-route Use the reject-default-route commands to cause RIP to reject aneighbor.Command options: get, set, unset

retransmit-timer Use the retransmit-timer commands to set the interval and nummessages waiting for acknowledgement or a response are retranCommand options: set, unset

route-map Use the route-map commands to filter routes and offset the metCommand options: get, set, unset

routes-redistribute Use the routes-redistribute command to display redistributed roCommand options: get

Page 535: netscreen_CLI

“pppoa” through “zone”

519

les.

orresponds to a summary range.

ber of routing packets allowed per

defines RIP neighbors.

when route updates are issued to

uting packets per update interval.

virtual router.

NetScreen CLI Reference Guide

rules-redistribute Use the rules-redistribute command to display redistribution ruCommand options: get

summary Use the summary command to display summary routes.Command options: get

summary-ip Use the summary-ip command to create a summary route that cCommand options: set, unset

threshold-update Use the threshold-update commands to set the maximum numupdate interval.Command options: set, unset

timer Use the timer command to display RIP timers.Command options: get

trusted-neighbors Use the trusted-neighbors commands to set an access list thatCommand options: get, set, unset

update-timer Use the update-timer commands to set the interval, in seconds,RIP neighbors.Command options: set, unset

update-threshold Use the update-threshold command to display the number of roCommand options: get

version Use the version command to set the RIP protocol version for theCommand options: set, unset

Page 536: netscreen_CLI

“pppoa” through “zone”

520

vertise-def-route (0.0.0.0/0) of the current virtual

y entry with a more specific

p context. (See “Context

e-metric }

NetScreen CLI Reference Guide

adDescription: Use the advertise-def-route commands to advertise the default routerouter.

Every router might have a default route entry, which matches every destination. (Anprefix overrides the default route entry.)

Before you can execute the advertise-def-route commands, you must initiate the riInitiation” on page 516.)

Syntax

get

get advertise-def-route

set

set advertise-def-route [ always ] { metric number | preserv

unset

unset advertise-def-route

Page 537: netscreen_CLI

“pppoa” through “zone”

521

onditions, even if there is no o specify the metric parameter; not specify always, you must

with the default route. Enter a pecify the always option.

r advertisement when the route is njunction with a value specified by nce over the metric value when a

NetScreen CLI Reference Guide

Keywords and Variables

always

set advertise-def-route always ...

metric

set advertise-def-route always metric number

preserve-metric

set advertise-def-route ... [ preserve-metric ]

always Directs the routing instance to advertise the default route under all cdefault route in the routing table. If you specify always, you must alsyou can optionally specify the preserve-metric parameter. If you dospecify either the metric or preserve-metric option.

metric Specifies the metric (cost), which indicates the overhead associatednumber between 1 and 15. You must specify this parameter if you s

preserve-metric Instructs the virtual router to use the original (source) route’s metric foredistributed. When you execute a preserve-metric command, in cothe metric command, the preserve-metric parameter takes precederoute is redistributed.

Page 538: netscreen_CLI

“pppoa” through “zone”

522

alt-route routes that the NetScreen

ee “Context Initiation” on page

or a network prefix. Enter a value no alternate routes in the

NetScreen CLI Reference Guide

Description: Use the alt-route commands to set the maximum number of alternatedevice maintains in the RIP database for a network prefix.

Before you can execute the alt-route commands, you must initiate the rip context. (S516.)

Syntax

set

set alt-route number

unset

unset alt-route

Keywords and Variables

number

set alt-route number

number Sets the maximum number of alternate routes in the RIP database fbetween 0 and 3. The default value is 0, which means that there aredatabase for a network prefix.

Page 539: netscreen_CLI

“pppoa” through “zone”

523

configure the RIP local virtual router.

“Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the config command to display all commands executed to config

Before you can execute the config command, you must initiate the rip context. (See516.)

Syntax

get

get config

Keywords and Variables

None.

Page 540: netscreen_CLI

“pppoa” through “zone”

524

databaseirtual router.

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the database command to display the RIP database in the local v

Before you can execute the database command, you must initiate the rip context. (S516.)

Syntax

get

get database [ prefix ip_addr/mask ]

Keywords and Variables

prefix

get database prefix ip_addr/mask

prefix Shows specific RIP entries in detail.

Page 541: netscreen_CLI

“pppoa” through “zone”

525

default-metriced routes.

ext. (See “Context Initiation” on

n be from 1 to 15.

NetScreen CLI Reference Guide

Description: Use the default-metric commands to set the RIP metric for redistribut

Before you can execute the default-metric commands, you must initiate the rip contpage 516.)

Syntax

set

set default-metric number

unset

unset default-metric

Keywords and Variables

Variable Parameter

set default-metric number

number The metric for the routes redistributed into RIP. This metric value ca

Page 542: netscreen_CLI

“pppoa” through “zone”

526

enableirtual router.

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the enable commands to enable or disable RIP from the current v

Before you can execute the enable commands, you must initiate the rip context. (S516.)

Syntax

set

set enable

unset

unset enable

Keywords and Variables

None.

Page 543: netscreen_CLI

“pppoa” through “zone”

527

flush-timerore an invalid route is removed.

t. (See “Context Initiation” on

ved. This value must be greater ds.

NetScreen CLI Reference Guide

Description: Use the flush-timer commands to configure the time that elapses bef

Before you can execute the flush-timer commands, you must initiate the rip contexpage 516.)

Syntax

set

set flush-timer number

unset

unset flush-timer

Keywords and Variables

Variable Parameter

set flush-timer number

number The number of seconds that elapses before an invalid route is remothan the current update-timer value. The default value is 120 secon

Page 544: netscreen_CLI

“pppoa” through “zone”

528

garbage-listed in the RIP garbage list. The e device did not obtain the

er interval elapses for an entry,

xt. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the garbage-list commands to display all routes currently containgarbage list contains routes automatically removed from the routing table because throutes in the time interval specified by the Invalid Timer setting. When the Flush Timthe device automatically purges the entry from the garbage list.

Before you can execute the garbage-list commands, you must initiate the rip contepage 516.)

Syntax

get

get garbage-list

Keywords and Variables

None.

Page 545: netscreen_CLI

“pppoa” through “zone”

529

hold-timerre the virtual router makes any metric routes. This minimizes

. (See “Context Initiation” on

s the routing table when RIP ee times the update-timer value. xceed the flush-timer value. The

NetScreen CLI Reference Guide

Description: Use the hold-timer commands to configure the time that elapses befoupdates into the routing table whenever RIP detects unreachable routes and higher the effects of route flapping to the routing table.

Before you can execute the hold-timer commands, you must initiate the rip contextpage 516.)

Syntax

set

set hold-timer number

unset

unset hold-timer

Keywords and Variables

Variable Parameter

set hold-timer number

number The number of seconds that elapses before the virtual router updatedetects a route with a high metric. The minimum value should be thrThe sum of the update-timer and the hold-timer values should not edefault value is 90 seconds.

Page 546: netscreen_CLI

“pppoa” through “zone”

530

interfacet virtual router.

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the interface command to display all RIP interfaces on the curren

Before you can execute the interface command, you must initiate the rip context. (S516.)

Syntax

get

get interface

Keywords and Variables

None.

Page 547: netscreen_CLI

“pppoa” through “zone”

531

invalid-timerter a neighbor stops advertising

xt. (See “Context Initiation” on

at the route becomes invalid. This ault value is 180 seconds.

NetScreen CLI Reference Guide

Description: Use the invalid-timer commands to configure the time that elapses afa route before the route becomes invalid.

Before you can execute the invalid-timer commands, you must initiate the rip contepage 516.)

Syntax

set

set invalid-timer number

unset

unset invalid-timer

Keywords and Variables

Variable Parameter

set invalid-timer number

number The number of seconds after a neighbor stops advertising a route thvalue must be greater than the current update-timer value. The def

Page 548: netscreen_CLI

“pppoa” through “zone”

532

-neighbor-countr of RIP neighbors, which

rip context. (See “Context

from one to the maximum value nt. Refer to the datasheet for the

NetScreen CLI Reference Guide

maxDescription: Use the max-neighbor-count commands to set the maximum numbebelong to the specified virtual router, allowed on an interface.

Before you can execute the max-neighbor-count commands, you must initiate the Initiation” on page 516.)

Syntax

set

set max-neighbor-count number

unset

unset max-neighbor-count

Keywords and Variables

Variable Parameter

set max-neighbor-count number

number The maximum number of RIP neighbors allowed. This value can be possible for your NetScreen device. The default is platform dependemaximum limit for a particular device.

Page 549: netscreen_CLI

“pppoa” through “zone”

533

neighborss.

See “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the neighbors command to display the status of all RIP neighbor

Before you can execute the neighbors command, you must initiate the rip context. (516.)

Syntax

get

get neighbors

Keywords and Variables

None.

Page 550: netscreen_CLI

“pppoa” through “zone”

534

ource-validationIP neighbors in different

rom neighbors in other subnets.

rip context. (See “Context

NetScreen CLI Reference Guide

no-sDescription: Use the no-source-validation commands to accept responses from Rsubnets. If you do not set this switch, the virtual router does not process responses f

Before you can execute the no-source-validation commands, you must initiate theInitiation” on page 516.)

Syntax

set

set no-source-validation

unset

unset no-source-validation

Keywords and Variables

None.

Page 551: netscreen_CLI

“pppoa” through “zone”

535

poll-timerred requests are sent over a

(See “Context Initiation” on

sent over the demand circuit to s 180 seconds (3 minutes).

NetScreen CLI Reference Guide

Description: Use the poll-timer commands to configure the interval at which triggedemand circuit to check if the other end of the circuit has come up.

Before you can execute the poll-timer commands, you must initiate the rip context.page 516.)

Syntax

set

set poll-timer number [ retry-count number ]

unset

unset poll-timer

Keywords and Variables

Variable Parameter

set poll-timer number

number The interval, in number of seconds, at which triggered requests are check if the other end of the circuit has come up. The default value i

Page 552: netscreen_CLI

“pppoa” through “zone”

536

demand circuit is declared to be sent indefinitely.

NetScreen CLI Reference Guide

retry-count

set poll-timer number retry-count number

retry-count The number of times that the triggered requests are sent before the down. The default is 0, which means that the triggered requests are

Page 553: netscreen_CLI

“pppoa” through “zone”

537

redistributerunning a different protocol into

t. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the redistribute commands to import known routes from a router the current RIP routing instance.

You can import the following types of routes:

• Manually-created routes (static)

• BGP routes (bgp)

• OSPF routes (ospf)

• Directly-connected interface with an IP address assigned to it (connected)

• Routes that have already been imported (imported)

Before you can execute the redistribute commands, you must initiate the rip contexpage 516.)

Syntax

get

get routes-redistributeget rules-redistribute

set

set redistribute route-map name_str protocol { bgp | connected | imported | ospf | static }

unset

unset redistribute route-map name_str protocol { bgp | connected | imported | ospf | static }

Page 554: netscreen_CLI

“pppoa” through “zone”

538

routing domain into the current

bgp

col type to the determine whether

routes in the subnetwork.

routes sent from an external o it.

imported routes in the subnetwork.

F routes in the subnetwork.

ic routes in the subnetwork.

NetScreen CLI Reference Guide

Keywords and Variables

protocol

set redistribute route-map name_str protocol { ... }

route-map

set redistribute route-map name_str protocol { ... }

Example: The following command redistributes a route that originated from a BGPRIP routing instance:

ns(trust-vr/rip)-> set redistribute route-map map1 protocol

protocol Specifies the routing protocol type. The route map can use the prototo permit or deny a route.

• bgp specifies that the route map performs an action only on BGP

• connected specifies that the route map performs an action only onrouter that has at least one interface with an IP address assigned t

• imported specifies that the route map performs an action only on

• ospf specifies that the route map performs an action only on OSP

• static specifies that the route map performs an action only on stat

route-map Identifies the route map that specifies the routes to be imported.

Page 555: netscreen_CLI

“pppoa” through “zone”

539

ct-default-route routes learned from a neighbor

p context. (See “Context

NetScreen CLI Reference Guide

rejeDescription: Use the reject-default-route commands to cause RIP to reject defaultin the RIP domain.

Before you can execute the reject-default-route commands, you must initiate the riInitiation” on page 516.)

Syntax

get

get reject-default-route

set

set reject-default-route

unset

unset reject-default-route

Keywords and Variables

None.

Page 556: netscreen_CLI

“pppoa” through “zone”

540

retransmit-timer triggered responses are

ontext. (See “Context Initiation”

retransmitted over a demand

NetScreen CLI Reference Guide

Description: Use the retransmit-timer commands to configure the interval at whichretransmitted over a demand circuit.

Before you can execute the retransmit-timer commands, you must initiate the rip con page 516.)

Syntax

set

set retransmit-timer number [ retry-count number ]

unset

unset retransmit-timer

Keywords and Variables

Variable Parameter

set retransmit-timer number

number The interval, in number of seconds, at which triggered responses arecircuit. The default is 5 seconds.

Page 557: netscreen_CLI

“pppoa” through “zone”

541

nd circuit is placed into POLL

NetScreen CLI Reference Guide

retry-count

set retransmit-timer number retry-count number

retry-count The number of times any response is retransmitted before the demastate. The default is 10 times.

Page 558: netscreen_CLI

“pppoa” through “zone”

542

route-map

. (See “Context Initiation” on

NetScreen CLI Reference Guide

Description: Use the route-map commands to filter incoming or outgoing routes.

Before you can execute the route-map commands, you must initiate the rip contextpage 516.)

Syntax

getget route-map

set

set route-map name_str { in | out }

unset

set route-map name_str { in | out }

Keywords and Variables

Variable Parameter

set route-map name_str

in

set route-map name_str in

name_str The name of the route map to filter routes.

in Specifies the route map is applied to routes to be learned by RIP.

Page 559: netscreen_CLI

“pppoa” through “zone”

543

vertised by RIP:

NetScreen CLI Reference Guide

out

set route-map name_str out

Example: The following command applies the route map map1 to routes to be ad

ns(trust-vr/rip)-> set route-map map1 out

out Specifies the route map is applied to routes to be advertised by RIP.

Page 560: netscreen_CLI

“pppoa” through “zone”

544

utes-redistribute imported from other protocols

context. (See “Context

NetScreen CLI Reference Guide

roDescription: Use the routes-redistribute command to display details about routesinto RIP.

Before you can execute the routes-redistribute command, you must initiate the ripInitiation” on page 516.)

Syntax

get

get routes-redistribute

Keywords and Variables

None.

Page 561: netscreen_CLI

“pppoa” through “zone”

545

rules-redistributees imported from other

ontext. (See “Context Initiation”

NetScreen CLI Reference Guide

Description: Use the rules-redistribute command to display conditions set for routprotocols into RIP.

Before you can execute the rules-redistribute command, you must initiate the rip con page 516.)

Syntax

get

get rules-redistribute

Keywords and Variables

None.

Page 562: netscreen_CLI

“pppoa” through “zone”

546

summaryth the summary-ip command.

ee “Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the summary command to display summary routes configured wi

Before you can execute the summary command, you must initiate the rip context. (S516.)

Syntax

get

get summary

Keywords and Variables

None.

Page 563: netscreen_CLI

“pppoa” through “zone”

547

summary-ipertised by RIP. You enable the

xt. (See “Context Initiation” on

the largest metric for a constituent

NetScreen CLI Reference Guide

Description: Use the summary-ip commands to summarize the routes that are advadvertising of summary routes on a per-interface basis.

Before you can execute the summary-ip commands, you must initiate the rip contepage 516.)

Syntax

set

set summary-ip ip_addr/mask [ metric number ]

unset

unset summary-ip ip_addr/mask

Keywords and Variables

Variable Parameter

set summary-ip ip_addr/mask

metric

set summary-ip ip_addr/mask [ metric number ]

ip_addr/mask The summary range that encompasses constituent routes.

metric Specifies the metric for the summary route. If no metric is specified, route is used.

Page 564: netscreen_CLI

“pppoa” through “zone”

548

hreshold-update routing packets received and

ontext. (See “Context Initiation”

l. This value must be greater than

NetScreen CLI Reference Guide

tDescription: Use the threshold-update commands to set the maximum number ofprocessed per update interval, per neighbor.

Before you can execute the threshold-update commands, you must initiate the rip con page 516.)

Syntax

set

set threshold-update number

unset

unset threshold-update

Keywords and Variables

Variable Parameter

set threshold-update number

number The maximum number of routing packets allowed per update intervazero.

Page 565: netscreen_CLI

“pppoa” through “zone”

549

timerrs.

“Context Initiation” on page

NetScreen CLI Reference Guide

Description: Use the timer command to display information about various RIP time

Before you can execute the timer command, you must initiate the rip context. (See 516.)

Syntax

get

get timer

Keywords and Variables

None.

Page 566: netscreen_CLI

“pppoa” through “zone”

550

rusted-neighborsefines allowed RIP neighbors.

context. (See “Context

s.

NetScreen CLI Reference Guide

tDescription: Use the trusted-neighbors commands to specify an access list that d

Before you can execute the trusted-neighbors commands, you must initiate the ripInitiation” on page 516.)

Syntax

get

get trusted-neighbors

set

set trusted-neighbors id_num

unset

unset trusted-neighbors

Keywords and Variables

Variable Parameter

set trusted-neighbors id_num

id_num The number of the access list that defines the allowed RIP neighbor

Page 567: netscreen_CLI

“pppoa” through “zone”

551

update-timerute updates to neighbors.

xt. (See “Context Initiation” on

This value must be at least one, 0 seconds.

NetScreen CLI Reference Guide

Description: Use the update-timer commands to set the interval that RIP sends ro

Before you can execute the update-timer commands, you must initiate the rip contepage 516.)

Syntax

set

set update-timer number

unset

unset update-timer

Keywords and Variables

Variable Parameter

set update-timer number

number The interval, in seconds, that RIP sends route updates to neighbors.and no greater than the current invalid-timer value. The default is 3

Page 568: netscreen_CLI

“pppoa” through “zone”

552

pdate-threshold packets per update interval.

ontext. (See “Context Initiation”

NetScreen CLI Reference Guide

uDescription: Use the update-threshold command to display the number of routing

Before you can execute the update-threshold command, you must initiate the rip con page 516.)

Syntax

get

get update-threshold

Keywords and Variables

None.

Page 569: netscreen_CLI

“pppoa” through “zone”

553

versional router.

ee “Context Initiation” on page

faces to either version 1 or version a per-interface basis.

NetScreen CLI Reference Guide

Description: Use the version commands to set the RIP protocol version in the virtu

Before you can execute the version commands, you must initiate the rip context. (S516.)

Syntax

set

set version { v1 | v2 }

unset

unset version

Keywords and Variables

v1 | v2

set version v1 | v2

v1 | v2 Sets the RIP protocol version in the virtual router and on all RIP inter2. The default is version 2. You can override the protocol version on

Page 570: netscreen_CLI

“pppoa” through “zone”

554

route

nd owner vsys

dress on the correct interface.

tic } |

NetScreen CLI Reference Guide

Description: Use the route commands to display entries in the static route table.

The get route command displays:

• The IP address, netmask, interface, gateway, protocol, preference, metric, a

• The protocol value can be any of the following:

– C (Connected)

– S (Static)

– A (Auto Exported)

– I (Imported; that is, route imported from another virtual router)

– iB (internal BGP)

– eB (external BGP)

– H (host)

– O (OSPF)

– E1 (OSPF external type 1)

– E2 (OSPF external type 2)

Use the get route command to see if the NetScreen device has a route to the IP ad

Syntaxgetget route

[id id_num |ip [ ip_addr ] |prefix ip_addr/mask |protocol { bgp | connected | imported | ospf | rip | stasummary]

Page 571: netscreen_CLI

“pppoa” through “zone”

555

D number 477:

h the IP address 172.16.60.1:

:

NetScreen CLI Reference Guide

Keywords and Variables

id

get route id id_num

Example: The following command displays the route information for a route with I

get route id 477

ip

get route ip ip_addr

Example: The following command displays the route information to a machine wit

get route ip 172.16.60.1

prefix

get route prefix ip_addr/mask

Example: The following command displays the routes within the subnet 1.1.1.1/24

get route prefix 1.1.1.1/24

id Displays a specific route for the ID number id_num.

ip Displays a specific route for the target IP address (ip_addr).

prefix Displays routes within a specified subnet (ip_addr/mask).

Page 572: netscreen_CLI

“pppoa” through “zone”

556

| static }

arget IP address is specified.

isplay the routes derived from that

xternal router that has at least one

protocol.

NetScreen CLI Reference Guide

protocol

get route protocol { bgp | connected | imported | ospf | rip

summary

get route summary

Defaults

The get route command displays all entries in the route table unless a particular t

protocol Specifies the routing protocol, and directs the NetScreen device to dprotocol.

• bgp Directs the device to display BGP routes.

• connected Directs the device to display only routes sent from an einterface with an IP address assigned to it.

• imported Directs the device to display imported routes.

• rip Directs the device to display RIP routes.

• ospf Directs the device to display only OSPF routes.

• static Directs the device to display only static routes.

summary Displays summary information, including number of routes, for each

Page 573: netscreen_CLI

“pppoa” through “zone”

557

sans (SAs) or to clear a specified

regarding the methods and unication requires at least two

tunnel. For inbound traffic, the rity protocol (AH or ESP), and of a Phase 1 IKE exchange.

NetScreen CLI Reference Guide

Description: Use the sa commands to display active or inactive security associatioSA.

A security association (SA) is a unidirectional agreement between VPN participants parameters to use while securing a communication channel. Full bidirectional commSAs, one for each direction.

An SA groups together the following components for securing communications:

• Security algorithms and keys

• Protocol mode (transport or tunnel)

• Key management method (Manual Key or AutoKey IKE)

• SA lifetime

For outbound VPN traffic, a security policy invokes the SA associated with the VPN NetScreen device looks up the SA by using the following triplet: destination IP, secusecurity parameter index (SPI) value, which are sent to the peer in the first message

Syntax

clear

clear [ cluster ] sa id_num

get

get sa[id id_num |[ active | inactive ] stat]

Page 574: netscreen_CLI

“pppoa” through “zone”

558

er.

packets.

s failed.

other than those listed in the

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameter

clear [ cluster ] sa id_num

cluster

clear cluster sa id_num

id

get sa id id_num

stat

get sa [ ... ] stat

id_num Specifies a security association (SA) ID number.

cluster Propagates the clear operation to all other devices in a NSRP clust

id Displays an SA entry for the specified ID number.

stat Shows the SA statistics for the device.Displays these statistics for all incoming or outgoing SA pairs:

• Fragment: The total number of fragmented incoming and outgoing

• Auth-fail: The total number of packets for which authentication ha

• Other: The total number of miscellaneous internal error conditionsauth-fail category.

• Total Bytes: The amount of active incoming and outgoing traffic

Page 575: netscreen_CLI

“pppoa” through “zone”

559

sa-statisticsh as the number of an AutoKey IKE VPN tunnel.

agates the clear operation to r.

NetScreen CLI Reference Guide

Description: Use the sa-statistics command to clear all statistical information (sucfragmentations and total bytes through the tunnel) in a security association (SA) for

Syntax

clear

clear [ cluster ] sa-statistics [ id id_num ]

Keywords and Variables

cluster

clear cluster sa-statistics id id_num

id

clear [ cluster ] sa-statistics id id_num

Example: The following command clears the SA statistics for SA 2:

clear sa-statistics id 2

cluster If the NetScreen device is in a high availability (HA) configuration, propall other devices in the NetScreen Redundancy Protocol (NSRP) cluste

id id_num Clears the statistics for a particular SA.

Page 576: netscreen_CLI

“pppoa” through “zone”

560

saveevice, and device configuration authentication certificate to the ownloads for Deep Inspection.

NetScreen CLI Reference Guide

Description: Use the save commands to save ScreenOS images to a NetScreen dsettings to or from a NetScreen device. You can also use this command to save theNetScreen device for authenticating ScreenOS images and attack object database d

Syntax

save

save

save config

save config[all-virtual-system |to

{flash |slot1 filename |tftp ip_addr filename}

[ merge ] |from

{flash |slot1 filename |tftp ip_addr filename

[merge |to

{flash [ from interface ] |

Page 577: netscreen_CLI

“pppoa” through “zone”

561

terface ]

NetScreen CLI Reference Guide

last-known-good |slot1 filename |tftp ip_addr filename [ from interface ]}

[ from interface ]}

]

save image-key

save image-key tftp ip_addr filename

save software

save software from{flash |slot1 filename |tftp ip_addr filename}

to{flash |slot1 filename |tftp ip_addr filename}

[ from interface ]

save attack-db

save attack-db from tftp ip_addr filename to flash [ from in

Page 578: netscreen_CLI

“pppoa” through “zone”

562

terface ]

ory to a file (output.txt) on a

the source interface if you specify

NetScreen CLI Reference Guide

Keywords and Variables

all-virtual-system

save config all-virtual-system

attack-dbsave attack-db from tftp ip_addr filename to flash [ from in

flash

save config from { ... } to flash [ from interface ]save config from flash to { ... } [ from interface ]save software from flash to { ... } [ from interface ]save software from { ... } flash to [ from interface ]

Example: The following command saves the current configuration from flash memTFTP server (172.16.10.10):

save config from flash to tftp 172.16.10.10 output.txt

from { ... } to

save config from { ... } to { ... }save software from { ... } to { ... }

all-virtual-system Saves all virtual system configurations.

attack-db Saves the attack database to the NetScreen device.

flash Saves from (or to) flash memory. The from interface option specifiesTFTP.

from Saves from the specified source.

Page 579: netscreen_CLI

“pppoa” through “zone”

563

ory to a file (output.txt) on a

NetScreen CLI Reference Guide

Example: The following command saves the current configuration from flash memTFTP server (IP address 172.16.10.10):

save config from flash to tftp 172.16.10.10 output.txt

to Saves to the specified destination.

Page 580: netscreen_CLI

“pppoa” through “zone”

564

guration in a file (input.txt) on a

device. After you save this integrity of ScreenOS images en device also uses this certificate files during the download process.

on Documentation CD-ROM that uniper Networks Web site. Log in load Software section, and click

the device to perform tabase downloads. To stop these lete crypto auth-key command.

own-good) configuration. The rollback. The NetScreen device e LKG file or give it a different

rom interface option specifies the

NetScreen CLI Reference Guide

image-keysave image-key from tftp ip_addr filename

last-known-goodsave config to last-known-good

mergesave config from { ... } merge [ from interface ]

Example: The following command merges the current configuration with the confiTFTP server (IP address 172.16.10.10):

save config from tftp 172.16.10.10 input.txt merge

image-key Saves the authentication certificate (imagekey.cer) to the NetScreencertificate onto the NetScreen device, the device uses it to verify thewhen you save them to the device and when it reboots. The NetScreto verify the integrity of Deep Inspection (DI) attack object database

The authentication certificate is available on the NetScreen Productiships with each NetScreen device. It is also available online at the Jat www.juniper.net/support/, click ScreenOS Software in the DownDownload the Authentication Certificate at the top of the page.

Saving this certificate onto a NetScreen device automatically causesauthentication checks on ScreenOS images and DI attack object dachecks, you must remove the authentication certificate, using the de

last-known-good Saves the current configuration to flash memory as the LKG (last-knNetScreen device can revert to this LKG file by doing a configurationautomatically names the LKG file $LKG$.cfg. You cannot rename thname upon saving it.

merge Merges the saved configuration with the current configuration. The fsource interface.

Page 581: netscreen_CLI

“pppoa” through “zone”

565

ut.txt) in the slot1 memory card

]

creen device from a file named

NetScreen CLI Reference Guide

slot1

save config from { ... } to slot1 [ ... ]save config from slot1 to { ... }save software from slot1 to { ... }save software from { ... } to slot1 [ ... ]

Example: The following commands saves the current configuration from a file (inpto flash memory:

save config from slot1 input.txt to flash

tftp

save config from tftp filename to { ... } [ from interface ]save image-key tftp ip_addr filenamesave software from tftp filename to { ... } [ from interface

Example: The following command saves an authentication certificate onto a NetSimagekey.cer on a TFTP server at 10.10.1.2:

save image-key tftp 10.10.1.2 nskey.cer

slot1 Saves from (or to) a file in the memory card slot.

tftp Saves from (or to) a file on a TFTP server.

Page 582: netscreen_CLI

“pppoa” through “zone”

566

schedulersplay the settings in a schedule.

ffect. NetScreen devices use tion of schedules, you can

saturday | sunday

NetScreen CLI Reference Guide

Description: Use the scheduler commands to create or modify a schedule, or to di

A schedule is a configurable object that you can use to define when policies are in eschedules to enforce the policies at specified times or intervals. Through the applicacontrol network traffic flow and enforce network security.

Syntax

get

get scheduler [ name name_str | once | recurrent ]

set

set scheduler name_str[once start date time stop date time [ comment string ] |recurrent

{ monday | tuesday | wednesday | thursday | friday | start time stop time

}[ start time stop time ]

[ comment string ]]

unset

unset scheduler name_str

Page 583: netscreen_CLI

“pppoa” through “zone”

567

... ]

minute defined, and stopping on

e defined day of the week, hour,

NetScreen CLI Reference Guide

Keywords and Variables

name

get scheduler name name_str

once

get scheduler onceset scheduler name_str once start date time stop date time [

recurrent

get scheduler recurrentset scheduler name_str recurrent { ... } [ ... ]

name name_str Defines a name for the schedule.

once Apply the schedule once, starting on the day, month, year, hour, andthe month, day, year, hour, and minute defined.

recurrent Directs the NetScreen device to repeat the schedule according to thand minutes.

• monday Repeats every Monday.

• tuesday Repeat every Tuesday.

• wednesday Repeat every Wednesday.

• thursday Repeat every Thursday.

• friday Repeat every Friday.

• saturday Repeat every Saturday.

• sunday Repeat every Sunday.

Page 584: netscreen_CLI

“pppoa” through “zone”

568

... ]e [ ... ]

” which starts on 1/10/2003 at

03 19:00

rts at 8:00 AM and ends at 5:00

00

).

mm).

NetScreen CLI Reference Guide

start | stop

set scheduler name_str once start date time stop date time [set scheduler name_str recurrent { ... } start time stop tim

Examples: The following command creates a schedule definition named “mytime11:00 AM and ends on 2/12/2003 at 7:00 PM:

set scheduler mytime once start 1/10/2003 11:00 stop 2/12/20

The following command creates a schedule definition named “weekend” which staPM and repeats every Saturday and Sunday:

set scheduler weekend recurrent saturday start 8:00 stop 17:set scheduler weekend recurrent sunday start 8:00 stop 17:00

- start Defines when to start the schedule.

- stop Defines when to stop the schedule.

- comment Defines a descriptive character string.

start | stop Defines the day, month, and year (date) in USA format (mm/dd/yyyy

Defines the hour and minutes (time) in the 24-hour clock format (hh:

Page 585: netscreen_CLI

“pppoa” through “zone”

569

scpver on NetScreen devices. SCP rotocol.

een device itself.

H task is activated if it is not

NetScreen CLI Reference Guide

Description: Use the scp commands to configure the Secure Copy (SCP) client/serprovides a way of transferring files to or from the NetScreen device using the SSH p

Syntax

get

get scp

set

set scp enable

unset

unset scp enable

Keywords and Variables

enable

set scp enableunset scp enable

Note: It is possible to initiate file transfer from an external host, not from the NetScr

enable Enables the Secure Copy (SCP) task. When SCP is enabled, the SSalready active.

Page 586: netscreen_CLI

“pppoa” through “zone”

570

servicey existing service definitions, or

rvice during a secure session. to exchange traffic between to these specifications.

] |

NetScreen CLI Reference Guide

Description: Use the service commands to create custom service definitions, modifdisplay the current entries in the service definition list.

Use service definitions in policies to specify how the NetScreen device provides a seFor example, a custom service definition might permit sessions using TCP protocol specified source and destination ports. Any policy that uses this definition conforms

Syntax

get

get service[svc_name |group [ name_str ] |pre-defined |timeout { other | tcp | udp } [ port number1 [ number2 ]user]

set

set service svc_name{+

{ icmp type number code number |ptcl_num | tcp | udp

{ src-port number-number dst-port number-number }ms-rpc uuid UUID_string |sun-rpc { program id_num1-id_num2 }} |

Page 587: netscreen_CLI

“pppoa” through “zone”

571

r | never } ] ]

ver } ] } |

NetScreen CLI Reference Guide

protocol{

{ ptcl_num | tcp | udp } [ src-port number-number ]

[ dst-port number-number [ timeout { numbeicmp type number code number | ms-rpc { uuid UUID_string [ timeout { number | nesun-rpc

{ program id_num1-id_num2}[ timeout { number | never } ]

} |timeout { number | never }}

unset

unset service svc_name [ timeout ]

Keywords and Variables

Variable Parameters

get service svc_nameset service svc_name [ ... ]unset service svc_name

+

set service svc_name + { ... }

svc_name Identifies a service by name.

+ Appends a service entry to the custom services list.

Page 588: netscreen_CLI

“pppoa” through “zone”

572

l 50:

on Unreachable”.

group. For example, from the ecific messages identified by code able, and so on.

NetScreen CLI Reference Guide

pre-defined

get service pre-defined

protocol

set service svc_name protocol { ... } [ ... ]

Example: The following command sets a service named “ipsec” that uses protoco

set service ipsec protocol 50

pre-defined Displays all the pre-defined services.

protocol Defines the service by IP protocol.

Defines a protocol for the specified service.

• ptcl_num specifies the protocol by protocol number.

• icmp specifies a ICMP-based service.

- type identifies the ICMP message type, for example, “Destinati

- code identifies a specific message from a ICMP message typeDestination Unreachable type group, there are various more spsuch as Net Unreachable, Host Unreachable, Protocol Unreach

• ms-rpc specifies a Microsoft RPC service.

- uuid specifies the interface (16 bytes).

• sun-rpc specifies a Sun RPC service

- program specifies the program (32 bit integer).

• tcp specifies a TCP-based service.

• udp specifies a UDP-based service.

Page 589: netscreen_CLI

“pppoa” through “zone”

573

tion TCP port 1001:

1-1001

umber2 ] ]

e of 10 minutes:

800:

tocol.

protocol.

port for TCP, UDP, or other s or as never.

NetScreen CLI Reference Guide

src-port | dst-port

set service svc_name protocol { ... }[ src-port number-number ] [ dst-port number-number ]

Example: The following command sets a service named “test1” that uses destina

set service test1 protocol tcp src-port 0-65535 dst-port 100

timeout

get service timeout { other | tcp | udp } [ port number1 [ nset service svc_name timeout { number | never }unset service svc_name timeout

Example1: The following command is a service named “telnet” with a timeout valu

set service telnet timeout 10

Example2: The following command displays timeouts for UDP from port 1720 to 1

get service timeout udp port 1720 1800

user

get service user

src-port Defines a range of source port numbers valid for the service and pro

dst-port Defines a range of destination port numbers valid for the service and

timeout Sets or displays the timeout value for session sessions created on aprotocols. You can specify session timeout value (number) in minute

user Displays all user-defined services.

Page 590: netscreen_CLI

“pppoa” through “zone”

574

ser-defined, and service group

2160 minutes.

NetScreen CLI Reference Guide

Defaults

The default timeout for TCP connections is 30 minutes.

The default timeout for UDP connections is 1 minute.

Using the get service command without any arguments displays all pre-defined, uinformation in the service book.

Note: The maximum timeout value for TCP connections and UDP connections is

Page 591: netscreen_CLI

“pppoa” through “zone”

575

sessionable of the NetScreen device.

communicate through the ng hosts, it contains a unique

sses).

dresses).

nd uses the information in the

he NetScreen platform. (For ession command lists currently r administrative traffic. On any ommand lists sessions that are o sessions, one for each ASIC.

NetScreen CLI Reference Guide

Description: Use the session commands to clear or display entries in the session t

The session table contains information about individual sessions between hosts thatNetScreen device. Because each session entry uniquely identifies two communicaticombination of the following criteria:

• An individual IP address for the source host (no subnets with multiple addre

• An individual IP address for the destination host (no subnets with multiple ad

• An individual port number for the source host (not a range of ports).

• An individual port number for the destination host (not a range of ports).

Every time the NetScreen device initiates a new session, it creates a session entry aentry while processing subsequent traffic between the hosts.

The kind of session information listed by the get session command depends upon texample, on any NetScreen platform with a management module in slot 1, the get sactive sessions on that module.) Such sessions include management, log, and otheNetScreen device with one or more Secure Port Modules (SPMs), the get session cactive on the ASIC for each module. If a session crosses two ASICs, it counts as tw

Syntax

clear

clear [ cluster ] session[all |id id_num |[ src-ip ip_addr [ netmask mask ] ]

[ dst-ip ip_addr [ netmask mask ] ][ src-mac mac_addr ] [ dst-mac mac_addr ]

[ protocol ptcl_num [ ptcl_num ] ]

Page 592: netscreen_CLI

“pppoa” through “zone”

576

NetScreen CLI Reference Guide

[ src-port port_num [ port_num ] ][ dst-port port_num [ port_num ] ]

[ vsd-id id_num ]]

get

get session[id id_num |ike-nat |fragment |[ tunnel ]

[ src-ip ip_addr [ netmask mask ] ][ dst-ip ip_addr [ netmask mask ] ]

[ src-mac mac_addr ] [ dst-mac mac_addr ][ protocol ptcl_num [ ptcl_num ] ]

[ src-port port_num [ port_num ] ][ dst-port port_num [ port_num ] ]

]

Keywords and Variables

all

clear [ cluster ] session all

all Specifies all sessions.

Page 593: netscreen_CLI

“pppoa” through “zone”

577

with ID 5116:

]

a specific source IP address:

r.

m.

ss ip_addr. For example, ip_addr

ddress ip_addr.

NetScreen CLI Reference Guide

cluster

clear cluster session [ ... ]

id

clear [ cluster ] session id id_numget session id id_num

Example: The following command displays the session table entry for the session

get session id 5116

ike-nat

get session ike-nat

src-ip | dst-ip

clear [ cluster ] session [ src-ip ip_addr [ netmask mask ] [ dst-ip ip_addr [ netmask mask ] ] [ ... ]

get session [ ... ] [ src-ip ip_addr [ netmask mask ] ][ dst-ip ip_addr [ netmask mask ] ][ ... ]

Example: The following command displays all the entries in the session table for

cluster Propagates the clear operation to all other devices in a NSRP cluste

id id_num Identifies a specific session with Session Identification number id_nu

ike-nat Identifies all IKE NAT ALG session information.

src-ip ip_addr Identifies all sessions initiated by packets containing source IP addrecould be the source IP address in the first TCP SYN packet.

dst-ip ip_addr Identifies all sessions initiated by packets containing destination IP a

Page 594: netscreen_CLI

“pppoa” through “zone”

578

mask ] ]

um ] [ ... ]

_num ] ]

dress mac_addr.

C address mac_addr.

).

urce port port_num in the Layer 4

rt_num port_num).

stination port port_num in the

rt_num port_num).

NetScreen CLI Reference Guide

get session src-ip 172.16.10.92

src-mac | dst-mac

clear [ cluster ] session [ ... ] [ dst-ip ip_addr [ netmask[ src-mac mac_addr ] [ dst-mac mac_addr ]

get session [ ... ] [ src-ip ip_addr [ netmask mask ] ][ dst-ip ip_addr [ netmask mask ] ]

protocol

clear [ cluster ] session [ ... ] protocol ptcl_num [ ptcl_nget session [ ... ] protocol ptcl_num [ ptcl_num ] [ ... ]

src-port | dst-port

clear [ cluster ] session [ ... ] [ src-port port_num [ port[ dst-port port_num [ port_num ] ] [ ... ]

get session [ ... ] [ src-port port_num [ port_num ] ][ dst-port port_num [ port_num ] ]

src-mac Identifies all sessions initiated by packets containing source MAC ad

dst-mac Identifies all sessions initiated by packets containing destination MA

protocol Identifies all sessions that use protocol ptcl_num.You can also specify any protocol within a range (ptcl_num ptcl_num

src-port Identifies all sessions initiated by packets that contain the Layer 4 soprotocol header.You can also specify any Layer 4 destination port within a range (po

dst-port Identifies all sessions initiated by packets that contain the Layer 4 deLayer 4 protocol header.You can also specify any Layer 4 destination port within a range (po

Page 595: netscreen_CLI

“pppoa” through “zone”

579

rotocol 5 and for source ports 2

1, and initiated from the host at

NetScreen CLI Reference Guide

Example: The following command displays all the entries in the session table for pthrough 5:

get session protocol 5 src-port 2 5

tunnel

get session tunnel [ ... ]

vsd-id

clear [ cluster ] session [ ... ] vsd-id id_numget session [ ... ] vsd-id id_num

Example: The following command clears all sessions belonging to VSD group 200IP address 172.16.10.12:

clear session src-ip 172.16.10.12 vsd-id 2001

tunnel Directs the NetScreen device to display tunnel sessions.

vsd-id id_num Identifies all sessions that belong the VSD group id_num.

Page 596: netscreen_CLI

“pppoa” through “zone”

580

sipn device and also to obtain

] |

NetScreen CLI Reference Guide

Description: Use the sip commands to configure SIP functionality on the NetScreeinformation.

Syntax

get

get sip{call |setting}

set

set sip {media-inactivity-timeout number |protect deny [ dst-ip ip_addr/mask | timeout [ number ] signaling-inactivity-timeout number}

unset

unset sip {media-inactivity-timeout |protect deny [ dst-ip ip_addr/mask | timeout ] |signaling-inactivity-timeout}

Page 597: netscreen_CLI

“pppoa” through “zone”

581

r ] ]

ssible on a NetScreen device ifications sheet for your product.

ll can remain active without any P packet occurs within a call, this

a proxy server that denied the

rver.

t is 3) the proxy server will deny in.

NetScreen CLI Reference Guide

Keywords and Variables

call

get sip call

media-inactivity-timeout

set sip media-inactivity-timeout numberunset sip media-inactivity-timeout

protect deny

set sip protect deny [ dst-ip ip_addr/mask | timeout [ numbeunset sip protect deny [ dst-ip ip_addr/mask | timeout ]

call Displays the number of active calls. The maximum number of calls podepends on the platform type. For more information, refer to the spec

media-inactivity-timeout

Configures or removes the maximum length of time (in seconds) a camedia (RTP or RTCP) traffic within a group. Each time a RTP or RTCtimeout resets. The default setting is 120 seconds.

protect deny Specifies that repeat SIP INVITE requests from a source be denied toinitial request.

• dst-ip ip_addr/mask specifies the address of the proxy se

• timeout [ number ] specifies the number of seconds (the defaulrepeated SIP INVITE requests before it begins accepting them aga

Page 598: netscreen_CLI

“pppoa” through “zone”

582

-layer gateway) for SIP signaling tected from repeat SIP INVITE

all can remain active without any in a call, this timeout resets. The

NetScreen CLI Reference Guide

setting

get sip setting

signaling-inactivity-timeout

set sip signaling-inactivity-timeout number unset sip signaling-inactivity-timeout

setting Displays the inactivity timeout parameters of the SIP ALG (applicationand SIP media, and the destination address of a SIP proxy server prorequests the proxy server initially rejected.

signaling-inactivity-timeout

Configures or removes the maximum length of time (in seconds) a cSIP signaling traffic. Each time a SIP signaling message occurs withdefault setting is 43200 seconds (12 hours).

Page 599: netscreen_CLI

“pppoa” through “zone”

583

snmple Network Management ceive notification when

stics ]

NetScreen CLI Reference Guide

Description: Use the snmp commands to configure the NetScreen device for SimpProtocol (SNMP), to gather statistical information from the NetScreen device, and resignificant events occur.

Syntax

clear

get snmp statistics

get

get snmp [ auth-trap | community name_str | settings | stati

set

set snmp{auth-trap enable |community name_str

{ read-only | read-write }[trap-off |trap-on [ traffic ] |version { any | v1 | v2 }] |

contact name_str |host comm_name ip_addr[/mask ]

[src-interface interface |trap { v1 | v2c }

Page 600: netscreen_CLI

“pppoa” through “zone”

584

ion traps.

NetScreen CLI Reference Guide

] |location string |name name_str |port { listen [ port_num ] | trap [ port_num ] } |}

unset

unset snmp{auth-trap enable |community name_str |contact |host comm_name ip_addr [ src-interface ] |location |name |port { listen [ port_num ] | trap [ port_num ] } |}

Keywords and Variables

auth-trap enable

get snmp auth-trapset snmp auth-trap enableunset snmp auth-trap enable

community

get snmp community name_strset snmp community name_str { ... }

auth-trap enable Enables Simple Network Management Protocol (SNMP) authenticat

Page 601: netscreen_CLI

“pppoa” through “zone”

585

the community named “public”:

communities in all products.

.”

e.”

itch includes traffic alarms as

NetScreen CLI Reference Guide

unset snmp community name_str

Examples: The following command configures a community named “public”.

• Allows hosts to read MIB data from the SNMP agent

• Enables SNMP traps for the community

set snmp community public read-only trap-on

The following command configures an SNMP host with IP address 10.20.25.30 for

set snmp host public 10.20.25.30

contact

set snmp contact name_strunset snmp contact

community Defines the name for the SNMP community. It supports maximum 3

• read-only Defines the permission for the community as “read-only

• read-write Defines the permission for the community as “read-writ

- trap-off Disables SNMP traps for the community.

- trap-on Enables SNMP traps for the community. The traffic swSNMP traps.

contact Defines the system contact.

Page 602: netscreen_CLI

“pppoa” through “zone”

586

f the SNMP community named

management host. The mask you define an SNMP community

t it cannot receive SNMP traps. To

NetScreen CLI Reference Guide

host

set snmp host comm_name ip_addr[/mask ] [ ... ]unset snmp host comm_name ip_addr [ ... ]

Example: The following commands configure a community named “netscreen.”

• Specifies read and write permission

• Allows the NetScreen device to send traps to all hosts in the community

• Assigns the community to an SNMP host with IP address 10.40.40.15

set snmp community netscreen read-write trap-onset snmp host netscreen 10.40.40.15

Example: The following command defines the subnet 10.5.1.0/24 as a member oolympia:

set snmp host olympia 10.5.1.0/24

location

set snmp location stringunset snmp location

host Defines the community name string and the IP address of the SNMPvalue defines a SNMP community member as a subnet. Note: Whenmember as a subnet, that member can poll the NetScreen device bureceive SNMP traps, the community member must be a single host.

location Defines the physical location of the system.

Page 603: netscreen_CLI

“pppoa” through “zone”

587

ace

l location of the NetScreen device.

NetScreen CLI Reference Guide

name

set snmp name name_strunset snmp name

port

set snmp port { ... }unset snmp port { ... }

settings

get snmp settings

src-interface

set snmp host comm_name ip_addr[/mask ] src-interface interfunset snmp host comm_name ip_addr[/mask ] src-interface

name Defines the name of the system.

port Specifies the SNMP listen and trap port ( listen | trap ).

settings Displays the name of the contact person, and the name and physica

src-interface Specifies the source interface.

Page 604: netscreen_CLI

“pppoa” through “zone”

588

) and SNMPv2c (v2c), you must

community supports SNMPv1 MP management stations. For

port SNMPv1, NetScreen devices

NetScreen CLI Reference Guide

statistics

clear snmp statisticsget snmp statistics

trap

set snmp host comm_name ip_addr[/mask ] trap v1 | v2c

version

set snmp community { ... } version { any | v1 | v2c }

statistics Displays or clears SNMP statistics.

trap If an SNMP community supports both SNMP versions (SNMPv1 (v1specify a trap version for each community member.

version When you create an SNMP community, you can specify whether the(v1), SNMPv2c (v2c), or both SNMP versions, as required by the SNbackward compatibility with earlier ScreenOS releases that only supsupport SNMPv1 by default.

Page 605: netscreen_CLI

“pppoa” through “zone”

589

socketen device.

etScreen device can send and nd from the socket.

NetScreen CLI Reference Guide

Description: Use the socket commands to display socket information on a NetScre

A socket is a software object that serves as a connection to a network protocol. A Nreceive TCP/IP or UDP traffic by opening a socket and reading and writing data to a

Syntax

get

get socket [ id id_num ]

Keywords and Variables

id

get socket id id_num

Example: The following command displays the information concerning socket 5:

get socket id 5

id Displays the information for an identified socket (id_num).

Page 606: netscreen_CLI

“pppoa” through “zone”

590

sshsk.

tScreen device. When you a secure connection. (The look SSH version 1 (SSHv1) or SSH SSH version that you activate.

ame ip-addr ip_addr

ame ip-addr ip_addr

NetScreen CLI Reference Guide

Description: Use the ssh commands to configure the Secure Shell (SSH) server ta

The SSH server task is an SSH-compatible server application that resides on the Neenable the SSH server task, SSH client applications can manage the device throughand feel of a SSH client session is identical to a Telnet session.) You can run either version 2 (SSHv2) on the NetScreen device; the commands available depend on the

Syntax

clear

clear ssh{all |enables |host-key |pka-key |sessions}

exec (SSHv1)

exec ssh tftp pka-rsa [ user-name name_str ] file-name filen[ from interface ]

exec (SSHv2)

exec ssh tftp pka-dsa [ user-name name_str ] file-name filen[ from interface ]

Page 607: netscreen_CLI

“pppoa” through “zone”

591

|

] |

3

NetScreen CLI Reference Guide

get (SSHv1)

get ssh[host-key |pka-rsa [ all | [ username name_str ] [ index number ] ]report]

get (SSHv2)

get ssh[host-key |pka-dsa [ all | [ user-name name_str ] [ index number ] report]

set (SSHv1)

set ssh{enable |key-gen-time number |pka-rsa [ username name_str ] key number1 number2 number}

Page 608: netscreen_CLI

“pppoa” through “zone”

592

|

NetScreen CLI Reference Guide

set (SSHv2)

set ssh{enable |pka-dsa

{user-name name_str { key string | pka-key-id string }key string} |

pub-key string |version { v1 | v2 }}

unset (SSHv1)

unset ssh{enable |host-key |key-gen-time |pka-rsa

{all |username name_str

{all |index id_num}

}}

Page 609: netscreen_CLI

“pppoa” through “zone”

593

.

bles SSH for the vsys.

NetScreen CLI Reference Guide

unset (SSHv2)

unset ssh{enable |host-key |pka-dsa

{all |user-name name_str

{all |index id_num}

} |pub-key string}

Keywords and Variables

all

clear ssh all

enable

set ssh enableunset ssh enable

all Clear all SSH sessions, enables, PKA keys, and host keys on device

enable Enables the Secure Shell (SSH) task. When issued from a vsys, ena

Page 610: netscreen_CLI

“pppoa” through “zone”

594

v1 and DSA public key for SSHv2) The clear command deletes the t before you can delete the host

SA) for SSHv2.

root user to execute this option; d.

e details of a key bound to the y bound to the specified user.

nnot execute this option.

NetScreen CLI Reference Guide

host-key

get ssh host-keyunset ssh host-key

key-gen-time

set ssh key-gen-time numberunset ssh key-gen-time

pka-dsa

get ssh pka-dsa [ ... ]set ssh pka-dsa [ ... ]unset ssh pka-dsa { ... }

host-key The get command shows the SSH host key (RSA public key for SSHfor the root or current vsys, including the fingerprint of the host key. SSH host key for the root or current vsys; SSH must be disabled firskey.

key-gen-time Specifies the SSHv1 server key regenerating time (in minutes).

pka-dsa Public Key Authentication (PKA) using Digital Signature Algorithm (D

• all Shows all PKA public keys bound to all users. You must be theread-write users and read-only users cannot execute this comman

• index number allows the admin user and read-only user to view thactive admin. It also allows the root user to view the details of a ke

• key string Binds a PKA key to the current user. Read-only users ca

Page 611: netscreen_CLI

“pppoa” through “zone”

595

s”:

VkvpSiLMT7NfZJm24pqMU2

addr 172.16.10.11

urrent user. Read-only users

KA key. file-name filename command, user-name displays all and read-only users can execute d-only user.

NetScreen CLI Reference Guide

Example: The following command binds a hypothetical key to a user named “chri

set ssh pka-dsa user-name chris key AAAAB3NzaC1kc3MAAABBAPrdFFpO49+LFmbOipljEYelWTA4J5...

The following command:

• loads a key contained in a file named “key_file”

• takes the file from a server at IP address 172.16.10.11

• binds the key to a user named “chris”

exec ssh tftp pka-dsa user-name chris file-name key_file ip-

pka-key

clear ssh pka-key

• pka-key-id string Binds a PKA key identified by the key ID to the ccannot execute this option.

• user-name name_str Specifies the name of the user to bind the PSpecifies the file containing the key to bind to the user. For the get PKA public keys bound to a specified user name_str. Admin usersthis option only if name_str identifies the current admin user or rea

pka-key Deletes all SSH PKA keys on the device.

Page 612: netscreen_CLI

“pppoa” through “zone”

596

s”:

071956054093391935 8289801116115376527150

ddr 172.16.10.11

root user to execute this option;

e details of a key bound to the y bound to the specified user.

er. The number1, number2, and odulus, respectively. Read-only

A key. file-name filename command, username displays all and read-only users can execute d-only user.

NetScreen CLI Reference Guide

pka-rsa

get ssh pka-rsa [ ... ]set ssh pka-rsa [ ... ]unset ssh pka-rsa { ... }

Example: The following command binds a hypothetical key to a user named “chri

set ssh pka-rsa username chris key 512 6553768752724884489580332137246155827968137574227156439706261287933655999926577837089019119296718115311887359071551679

The following command loads a key.

• Key contained in a file named “key_file”

• File taken from a server at IP address 172.16.10.11

• Key bound to a user named “chris”

exec ssh tftp pka-rsa username chris file-name key_file ip-a

pka-rsa Public Key Authentication (PKA) using RSA for SSHv1.

• all Shows all PKA public keys bound to all users. You must be theadmin users and read-only users cannot execute this command.

• index number allows the admin user and read-only user to view thactive admin. It also allows the root user to view the details of a ke

• key number1 number2 number3 Binds a PKA key to the current usnumber3 values represent the key length, the exponent, and the musers cannot execute this option.

• username name_str Specifies the name of the user to bind the PKSpecifies the file containing the key to bind to the user. For the getPKA public keys bound to a specified user name_str. Admin usersthis option only if name_str identifies the current admin user or rea

Page 613: netscreen_CLI

“pppoa” through “zone”

597

0 minutes.

he device on which SSH is

creen device. Specify either SSH re that all keys created with the l command. To clear SSHv2 keys;

NetScreen CLI Reference Guide

pub-key

set ssh pub-key stringunset ssh pub-key string

report

get ssh report

sessions

clear ssh sessions

version

set ssh version v1 | v2

Defaults

This feature is disabled by default. The default key generation time for SSHv1 is 6

pub-key Sets the public key for SSHv2.

report Displays SSHv1 (or SSHv2) key, session, and vsys information for tcurrently enabled.

sessions Logs out all administrators that currently have active SSH sessions.

version (Available only at the root level.) Sets the version of SSH on the NetSversion 1 or version 2. Before you can set an SSH version, make suprevious version are removed by executing the delete ssh device alissue the clear scs all command to clear SSHv1 keys.

Page 614: netscreen_CLI

“pppoa” through “zone”

598

sslnnection, or to display the SSL

on between a Web client and a

NetScreen CLI Reference Guide

Description: Use the ssl commands to configure a Secure Sockets Layer (SSL) coconfiguration on a NetScreen device.

Secure Sockets Layer (SSL) is a set of protocols that can provide a secure connectiWeb server communicating over a TCP/IP network.

Syntax

get

get ssl [ ca-list | cert-list ]

set

set ssl{cert number |enable |encrypt { { 3des | des } sha-1 | { rc4 | rc4-40 } md5 }port port_num}

unset

unset ssl { cert | enable | encrypt | port }

Page 615: netscreen_CLI

“pppoa” through “zone”

599

ntly available certificates

NetScreen CLI Reference Guide

Keywords and Variables

ca-list | cert-list

get ssl ca-listget ssl cert-list

Example: The following command displays the SSL certificate list:

get ssl cert-list

cert

set ssl cert numberunset ssl cert

enable

set ssl enableset ssl enableunset ssl enable

ca-list | cert-list Displays currently configured Certificate Authorities (ca-list) or curre(cert-list).

cert Specifies that the named certificate is required.

enable Turns on SSL.

Page 616: netscreen_CLI

“pppoa” through “zone”

600

hentication hashing:

NetScreen CLI Reference Guide

encrypt

set ssl encrypt { 3des | des } sha-1 |{ rc4 | rc4-40 } md5unset ssl encrypt

Example: The following command specifies triple-DES encryption with SHA-1 aut

set ssl encrypt 3des sha-1

port

set ssl port port_numunset ssl port

Example: The following command changes the SSL port to 11533:

set ssl port 11533

Defaults

The default SSL port is 443.

encrypt Enables encryption over the SSL connection.

• 3des Set the 3DES security level.

• des Sets the DES security level.

• rc4 md5 Sets the RC4 MD3 security level.

• rc4-40 md5 Sets the RC4-40 MD3 security level.

port Specifies the SSL port number.

Page 617: netscreen_CLI

“pppoa” through “zone”

601

sys-clockck.

NetScreen CLI Reference Guide

Description: Use the sys-clock command to display information on the system clo

Syntax

get

get sys_clock

Keywords and Variables

None.

Page 618: netscreen_CLI

“pppoa” through “zone”

602

syslog traffic and event messages to

| local6 | local7

ocal5 | local6 | local7

NetScreen CLI Reference Guide

Description: Use the syslog commands to configure the NetScreen device to sendup to four syslog hosts or to display the current syslog configuration.

Syntax

get

get syslog

set

set syslog {config { name_str | ip_addr }

[facilities

AUTH/SEC |local0 | local1 | local2 | local3 | local4 | local5

{AUTH/SEC |local0 | local1 | local2 | local3 | local4 | l} |

log { all | event | traffic } |port number |transport tcp] |

enable |src-interface interface |}

Note: The syslog host must be enabled before you can enable syslog.

Page 619: netscreen_CLI

“pppoa” through “zone”

603

r | ip_addr } parameters define the to four syslog hosts.oves the configuration for the ration for all syslog hosts.

(s).

NetScreen CLI Reference Guide

unset

unset syslog config [ name_str | ip_addr ]

{log all | event | traffic |port transport}

enable | src-interface

Keywords and Variables

config

set syslog config { name_str | ip_addr } { ... }unset syslog config [ ip_addr ]

enable

set syslog enableunset syslog enable

config Defines the configuration settings for the syslog utility. The { name_stname or the IP address of the syslog host device. You can define upSpecifying an IP address with the unset syslog config command remspecified syslog host. Otherwise, this command removes the configu

enable Enables the NetScreen device to send messages to the syslog host

Page 620: netscreen_CLI

“pppoa” through “zone”

604

l6 | local7

local6 | local7

logs:

raffictraffic

syslog host that you specify. The security-related actions such as s unrelated to security, such as

g entries or both traffic and

NetScreen CLI Reference Guide

facility

set syslog config { name_str | ip_addr } facility{AUTH/SEC |local0 | local1 | local2 | local3 | local4 | local5 | loca}

{AUTH/SEC |local0 | local1 | local2 | local3 | local4 | local5 | }

Example: The following command sets the syslog host configuration to report all

set syslog config 172.16.20.249 facility local0 local1

log

set syslog config { name_str | ip_addr } log all | event | tunset syslog config { name_str | ip_addr } log all | event |

facility Defines the security facility level and the regular facility level for eachsecurity facility classifies and sends messages to the syslog host forattacks. The regular facility classifies and sends messages for eventuser logins and logouts, and system status reports.

log Directs the NetScreen device to send traffic log entries, event loevent log entries to the syslog host.

Page 621: netscreen_CLI

“pppoa” through “zone”

605

face

efault WebTrends port number

atagram Protocol (UDP) packets

NetScreen CLI Reference Guide

port

set syslog config { name_str | ip_addr } port port_numunset syslog config { name_str | ip_addr } port

Example: The following command changes the syslog port number to 911:

set syslog config port 911

src-interface

set syslog config { name_str | ip_addr } src-interface interunset syslog config { name_str | ip_addr } src-interface

transport tcp

set syslog config { ip_addr | name_str } transport tcp

Defaults

This feature is disabled by default. The default syslog port number is 514, and the dis 514.

port Defines the port number on the syslog host that receives the User Dfrom the NetScreen device.

src-interface Specifies the source interface.

transport tcp Directs the device to use TCP protocol instead of UDP protocol.

Page 622: netscreen_CLI

“pppoa” through “zone”

606

system

ber, Control Number, Software

version, MAC address, and

NetScreen CLI Reference Guide

Description: Use the get system command to display general system information.

The information displayed by the get system command includes:

• Descriptive indices of the ScreenOS operating system, including Serial NumNumber, and image source file name

• Descriptive indices of the NetScreen hardware platform, including hardwaretype

• Chronological and timekeeping information

• Current operational mode (transparent, NAT, or route)

• Configuration port and user IP

• Interface settings

Syntax

get

get system

Keywords and Variables

None.

Page 623: netscreen_CLI

“pppoa” through “zone”

607

tech-support

ooting the NetScreen device.

NetScreen CLI Reference Guide

Description: Use the tech-support command to display system information.

The information displayed by the get tech-support command is useful for troubleshMost of this information consists of the current authentication and routing settings.

Syntax

get

get tech-support

Keywords and Variables

None.

Page 624: netscreen_CLI

“pppoa” through “zone”

608

rature-thresholdere temperature thresholds for

ice reaches or exceeds 190

egular alarm or a severe alarm. A rates greater number of event log

NetScreen CLI Reference Guide

tempeDescription: Use the temperature-threshold commands to set the normal and sevtriggering temperature alarms.

Syntax

set

set temperature-threshold { alarm | severe }

{ celsius number | fahrenheit number }

unset

unset temperature-threshold { alarm | severe }

{ celsius number | fahrenheit number }

Arguments

Example: To enable the audible alarm to sound when the temperature of the devdegrees fahrenheit:

set temperature-threshold alarm fahrenheit 190

alarm | severe Defines the temperature (celsius or fahrenheit) required to trigger a rsevere alarm sounds a greater frequency of audible alarms and a geneentries.

Page 625: netscreen_CLI

“pppoa” through “zone”

609

tftpmunicate via TFTP sessions.

communicates using TFTP.

NetScreen CLI Reference Guide

Description: Use the tftp commands to specify the interface the device uses to com

Syntax

get

get tftp ip_addr filename

set

unset tftp source-interface ip_addr

unset

unset tftp source-interface

Keywords and Variables

Variable Parameters

get tftp ip_addr filenameset tftp source-interface ip_addr

action

ip_addr Specifies the IP address of the TFTP interface.

filename Specifies the name of the file to access with the TFTP service.

source-interface Specifies the IP address of the interface through which the device

Page 626: netscreen_CLI

“pppoa” through “zone”

610

timerNetScreen device to

d.

ion. Date is in mm/dd/yyyy format.

on. Time is in hh:mm format.

rated by the set timer command.)

NetScreen CLI Reference Guide

Description: Use the timer commands to display timer settings, or to configure the automatically execute management or diagnosis at a specified time.

All timer settings remain in the configuration script after the specified time has expire

Syntax

get

get timer

set

set timer date time action reset

unset

unset timer id_num

Keywords and Variables

Variable Parameters

set timer date time action resetunset timer id_num

date Specifies the date when the NetScreen device executes the defined act

time Specifies the time when the NetScreen device executes the defined acti

id_num Identifies a specific action by ID number in the list of timer settings (gene

Page 627: netscreen_CLI

“pppoa” through “zone”

611

nd date:

me.

NetScreen CLI Reference Guide

action

set timer date time action reset

reset

set timer date time action reset

Example: The following command configures NetScreen to reset at a given time a

set timer 1/31/2000 19:00 action reset

action Defines the event that the command triggers at the given date and ti

reset Resets the timer.

Page 628: netscreen_CLI

“pppoa” through “zone”

612

trace-route

umber ] ]

d display.

NetScreen CLI Reference Guide

Description: Use the trace-route command to display the route to a host.

Syntaxtrace-route { ip_addr | name_str } [ hop number [ time-out n

Keywords

Variable Parameters

trace-route ip_addrtrace-route name_str

hop

trace-route { ip_addr | name_str } hop number [ ... ]

Example: The following command:

• evaluates and displays up to four route trace hops

• sends the output to a host with IP address 172.16.10.10

trace-route 172.16.10.10 hop 4

ip_addr | name_str The IP address (ip_addr) or object name (name_str) of the host.

hop The maximum number of trace route hops (number) to evaluate an

Page 629: netscreen_CLI

“pppoa” through “zone”

613

r

bandoning the route trace.

NetScreen CLI Reference Guide

time-out

trace-route { ip_addr | name_str } hop number time-out numbe

Example: The following command performs a trace-route operation.

• Evaluates and displays up to four route trace hops

• Sends the output to a host with IP address 172.16.10.10

• Specifies a timeout value of four seconds

trace-route 172.16.10.10 hop 4 time-out 4

time-out Specifies the amount of time in seconds (number) to elapse before a

Page 630: netscreen_CLI

“pppoa” through “zone”

614

traffic-shapingystem with the traffic-shaping

very user and application on an capacity at a guaranteed g policies and by applying

r7 number8 |

as a single bound interface.

NetScreen CLI Reference Guide

Description: Use the traffic-shaping commands to determine the settings for the sfunction, or to display information on traffic management device interfaces.

Traffic shaping is the allocation of the appropriate amount of network bandwidth to einterface. The appropriate amount of bandwidth is defined as cost-effective carryingQuality of Service (QoS). You can use a NetScreen device to shape traffic by creatinappropriate rate controls to each class of traffic going through the device.

Syntax

get

get traffic-shaping{dscp-class-selector |interface [ interface ] |ip_precedence |mode}

set

set traffic-shaping{dscp-class-selector |ip_precedence

number1 number2 number3 number4 number5 number6 numbemode { auto | off | on }}

Note: You can only apply traffic shaping to policies for which the destination zone h

Page 631: netscreen_CLI

“pppoa” through “zone”

615

| mode }

number8

g that priority levels set with eam routers.

ping. Each setting should be a

NetScreen CLI Reference Guide

unset

unset traffic-shaping { dscp-class-selector | ip_precedence

Keywords and Variables

dscp-class-selector

get traffic-shaping dscp-class-selectorset traffic-shaping dscp-class-selectorunset traffic-shaping dscp-class-selector

interface

get traffic-shaping interface [ interface ]

ip_precedence

get traffic-shaping ip_precedenceset traffic-shaping ip_precedence

number1 number2 number3 number4 number5 number6 number7 unset traffic-shaping mode ip_precedence

dscp-class-selector Subsumes IP precedence into class selector codepoints, ensurinip_precedence are preserved and handled correctly by downstr

interface Displays the traffic shaping info for an interface.

ip_precedence Specifies the Priorities 0 through 7 for IP precedence (TOS) mapsingle-digit value.

Page 632: netscreen_CLI

“pppoa” through “zone”

616

function. If you select auto, the least one policy in the system with to on. If there is no such policy,

NetScreen CLI Reference Guide

mode

get traffic-shaping modeset traffic-shaping mode { auto | off | on }unset traffic-shaping mode

Defaults

By default, the traffic shaping function is set up to automatic mode.

mode Defines the mode settings for the system with the traffic-shapingsystem automatically determines the mode settings. If there is at traffic-shaping turned on, the system automatically sets the modethe auto mode default setting is off.

Page 633: netscreen_CLI

“pppoa” through “zone”

617

urllicies and to configure and

NetScreen CLI Reference Guide

Description: Use the url commands to enable or disable URL filtering for use in podisplay URL filter settings.

Syntax

get

get url [ all | vsys-name vsys_name ]

set (root level)

set url{config { disable | enable } |fail-mode { block | permit } |message string |profile name name_str |protocol sc-cpa | type { sc-cpa | scfp | websense }server { ip_addr | dom_name } port_num number |src-interface interface |type { netScreen | server }}

set (vsys level)

set url{config { disable | enable } |use-root |use-vsys}

Note: A Websense server provides the URL filtering.

Page 634: netscreen_CLI

“pppoa” through “zone”

618

al Authority (CPA) servers from u must initiate the URL filtering filtering routing context. For & Examples ScreenOS

y to this integrated URL filtering

ange the cache size or timeout.

rval at which the NetScreen device s.

URL to a category. You can add up

urfControl Content Portal Authority

NetScreen CLI Reference Guide

unset

unset url{config |fail-mode |message |profile name |protocol |server |src-interface |type}

URL Filtering ContextSome NetScreen devices support a URL filtering solution that employs Content PortSurfControl. To run this integrated URL filtering feature on the NetScreen device, yocontext. Executing the set url protocol sc-cpa command places the CLI in the URLmore information on this feature, refer to the Juniper Networks NetScreen ConceptsReference Guide.

Once you initiate the URL filtering context, all subsequent command executions applfeature

The following commands are executable in the URL filtering context:.

cache Use the cache command to enable caching. You can also ch

cate-list-query-interval Use the cate-list-query-interval command to specify the intequeries the SurfControl CPA server for categorization update

category Use the category command to create a category or to add a to 20 URLs in a category.

enable Use the enable command to enable URL filtering using the S(CPA) servers.

Page 635: netscreen_CLI

“pppoa” through “zone”

619

hen the URL Filtering server fails.

or to add a category to a profile.

server.

Ls.

n the categorization cache.

the SurfControl CPA server for

NetScreen CLI Reference Guide

Keywords and Variables

cache

set cache { enable | size number | timeout number }unset cache { enable | size | timeout }

You must initiate the URL filtering context before you can execute this command.

cate-list-query-interval

set cate-list-query-interval numberunset cate-list-query-interval

You must initiate the URL filtering context before you can execute this command.

fail-mode Use the fail-mode command to block or permit all requests w

profile Use the profile command to create a new URL filtering profile

ns-profile Use the ns-profile to display the default URL filtering profile.

server Use the server command to define the primary URL filtering

enable Enables the NetScreen device to cache the categorization of UR

size Specifies the memory size of the categorization cache.

timeout Specifies how many hours the NetScreen device stores entries i

cate-list-query-interval Specifies the interval at which the NetScreen device queries categorization updates.

Page 636: netscreen_CLI

“pppoa” through “zone”

620

g a URL

licies. By itself, enabling URL URL filtering at the device and

NetScreen CLI Reference Guide

category

set category name url url_strget category [ name | pre | user ]unset category name [ url url_str ]

You must initiate the URL filtering context before you can execute this command.

config

set url config { disable | enable }unset url config

enable

set enableunset enable

You must initiate the URL filtering context before you can execute this command.

category Specifies the category you are creating or to which you are addin

pre Displays the pre-defined categories.

url Specifies the URL you are adding.

user Displays the user-defined categories.

config{ disable | enable }

Disables or enables URL filtering at the device level for use in pofiltering at the device level does not activate it. You must enable policy level to apply filtering to URL requests.

enable Enables URL filtering using the SurfControl CPA servers.

Page 637: netscreen_CLI

“pppoa” through “zone”

621

blocked”:

nse server is lost, the NetScreen cy requiring URL filtering applies.

to the client who is blocked from

NetScreen CLI Reference Guide

fail-mode

set url fail-mode { block | permit }unset url fail-mode

message

set url message stringunset url message

Example: The following command defines the URL blocking message “This site is

set url message “This site is blocked.”

ns-profile

get ns-profile

You must initiate the URL filtering context before you can execute this command.

fail-mode { block | permit }

If the connection between the NetScreen device and the Websedevice either blocks or permits all HTTP requests to which a poliThe default fail-mode behavior is to block HTTP requests.

message string Defines a custom message, 1-500 characters in length, to send reaching a URL.

ns-profile Displays the NetScreen pre-defined profile.

Page 638: netscreen_CLI

“pppoa” through “zone”

622

ck | permit |

-list ]

on for the Other category.

tegory.

ategory.

ring server.

NetScreen CLI Reference Guide

profile

set profile string1 { other block | permit } | string2 { bloblack-list | white-list }

unset profile string1 [ other | string2 | black-list | whiteget profile [ string ]

You must initiate the URL filtering context before you can execute this command.

profile name

set url profile name name_strunset url profile name

protocol

set url protocol sc-cpa | type { sc-cpa | scfp | websense }unset url protocol sc-cpa

profile string1 Specifies the profile you are creating or updating.

other Specifies the Other category. Use this keyword to define the acti

block The NetScreen device blocks access to URLs in the specified ca

permit The NetScreen device permits access to URLs in the specified c

string2 Specifies the category for which you are defining an action.

black-list The NetScreen device blocks access to URLs in this category.

white-list The NetScreen device permits access to URLs in this category.

profile name_str Identifies a virtual system that connects to a Websense URL-filte

protocol sc-cpa Initiates the URL filtering context.

Page 639: netscreen_CLI

“pppoa” through “zone”

623

er Networks NetScreen Concepts

server:

URL filtering server.

e communicates with the URL

en device waits for a response the time interval, the NetScreen e default is 10 seconds.

ber, and timeout value for the e default values):

nds URLs for categorization. You s command.

NetScreen CLI Reference Guide

server

set url server { ip_addr | dom_name } port_num numberunset url server

set server { america | asia | europe }unset server { america | asia | europe }get server

You must initiate the URL filtering context before you can execute this command.

type Indicates which URL filtering protocol you are configuring: sc-cpa Integrated URL filtering with the SurfControl servers.scfp Redirect URL filtering with the SurfControl servers.websense Redirect URL filtering with the Websense servers.For more information on the URL filtering protocols, see the Junip& Examples ScreenOS Reference Guide.)

server Defines the following connection parameters for the URL filtering

• ip_addr | dom_name Sets the IP address or DNS name of the

• port_num Sets the port number on which the NetScreen devicfiltering server. The default port number is 15868.

• number Sets the timeout interval, in seconds, that the NetScrefrom the Websense filter. If Websense does not respond withindevice either blocks the request or allows it, as you choose. Th

Example: The following command sets the IP address, port numURL filtering server (the port number and timeout interval use th

set url server 1.2.2.20 15868 10

server Defines the primary CPA server to which the NetScreen device semust initiate the URL filtering context before you can execute thi

Page 640: netscreen_CLI

“pppoa” through “zone”

624

hen communicating with the nforces use of that interface, face, the device picks an interface

elivers to clients when URLs are

ts the vsys to share the URL

ts the vsys to use the URL filtering

NetScreen CLI Reference Guide

src-interface

set url src-interface interfaceunset url src-interface

type

set url type { NetScreen | server }unset url type

use-root

set url use-root

use-vsys

set url use-vsys

src-interface interface

Specifies the source interface that the NetScreen device uses wWebsense server. If you specify a source interface, the device ewithout consulting the routing table. If you do not specify an interaccording to entries in the routing table.

type { NetScreen | server }

Specifies the source of the message that the NetScreen device dblocked—the NetScreen device or the Websense server.

use-root When entering this command in a virtual system (vsys), it instrucfiltering server defined at the root level.

use-vsys When entering this command in a virtual system (vsys), it instrucserver defined for that vsys.

Page 641: netscreen_CLI

“pppoa” through “zone”

625

userternal user authentication

are-limit number ] |

NetScreen CLI Reference Guide

Description: Use the user commands to create, remove, or display entries in the indatabase.

The basic user categories are as follows:

• Authentication users (for using network connections)

• IKE users (for using AutoKey IKE VPNs)

• L2TP users (for using L2TP tunnels)

• XAuth users

Syntax

get

get user { name_str | all | id id_num }

set

set user name_str{disable |enable |hash-password string |ike-id

{asn1-dn { [ container string ] wildcard string } [ shfqdn name_str |ip ip_addr |u-fqdn name_str} |

password pswd_str |

Page 642: netscreen_CLI

“pppoa” through “zone”

626

| wins2 } |

:

NetScreen CLI Reference Guide

remote-settings{dns1 ip_addr |dns2 ip_addr |ipaddr ip_addr |ippool name_str |wins1 ip_addr |wins2 ip_addr} |

type { [ auth ] [ ike ] [ l2tp ] [ xauth ] } |uid id_num}

unset

unset user name_str | id_str[remote-settings { dns1 | dns2 | ipaddr | ippool | wins1 type [ auth ] [ ike ] [ l2tp ] [ xauth ]]

Keywords and Variables

Variable Parameters

get user name_strset user name_str { ... }unset user name_str [ ... ]

Examples: The following command displays information for a user named “roger”

get user roger

user Defines the user’s name.

Page 643: netscreen_CLI

“pppoa” through “zone”

627

er database:

IKE identity

user is disabled. I you set a omes enabled automatically.

isplays the same information as

NetScreen CLI Reference Guide

The following command deletes the user named jane:

unset user jane

all

get user all

disable | enable

set user name_str disableset user name_str enable

id

get user id id_num

Example: The following command displays a particular user with user ID “10”:

get user id 10

all Displays the following information for all the entries in the internal us

• User ID number

• User name

• Status (enabled or disabled)

• User type

• IKE ID types – e-mail address, IP address, or domain name—and

disable | enable Disables or enables the user in the internal database. By default, thepassword for an auth user or an IKE ID for an IKE user, the user bec

id Displays information on the user, identified by id_num. This option dget user name_str option.

Page 644: netscreen_CLI

“pppoa” through “zone”

628

e configuration. Only an auth user shed password randomly using

ring, such as www.netscreen.com.

lent to an e-mail address such as

nd field values that define user

ws multiple identity fields for each identity, the peer IKE identity fields The NetScreen device does not identical.

s only one identity field for each identity configuration, the peer IKE s specified in the wildcard identity. ws tunnel communication with creen device does not check any

sh tunnels concurrently using this treats it as a Group IKE ID user. g partial IKE identities.

NetScreen CLI Reference Guide

hash-password

set user name_str hash-password string

ike-id

set user name_str ike-id { ... }

hash-password Creates a hashed password for the specified user and stores it in thcan have a hashed password. The NetScreen device generates a haeither the crypt () or SHA-1 algorithm.

ike-id { ip_addr | name_str }

Adds and defines an AutoKey IKE dialup user.

• ip ip_addr The IP address of the dialup user.

• fqdn name_str The Fully Qualified Domain Name, the complete st

• u-fqdn name_str Specifies the dialup user identity, usually [email protected].

• asn1-dn Specifies the user certificate distinguished name fields, aidentity.

- container string Specifies a container identity. This identity allotype (CN, OU, O, L, ST, C, and E). To match a local ASN1_DN must match all identity fields specified in the container identity. check any undefined container fields. Field sequence must be

- wildcard string Specifies a wildcard identity. This identity allowtype (CN, OU, O, L, ST, C, and E). To match a local ASN1_DN identity must contain fields matching all non-empty identity fieldFor example, the wildcard identity o=ACME,ou=Marketing alloany user whose certificate contains these field values. The NetSundefined wildcard fields. Field sequence is not important.

• share-limit number Specifies the number of users that can establiidentity. When this number is larger than 1, the NetScreen device With Group IKE ID, multiple dialup users can establish tunnels usin

Page 645: netscreen_CLI

“pppoa” through “zone”

629

e IKE-ID number 2.2.2.2:

O field, and “Marketing” in the

” share-limit 10

er definition. For more Reference Guide.)

n internal database for user

ddr }

_addr }

KE or XAuth user.

y DNS servers.

NetScreen CLI Reference Guide

Examples: The following command creates an IKE user named branchsf with th

set user branchsf ike-id ip 2.2.2.2

The following command creates a new user definition named “market”.

• Configures the user definition to recognize up to 10 hosts

• Specifies that the hosts must possess certificates containing “ACME” in the OU field

set user market ike-id asn1-dn wildcard “o=ACME,ou=Marketing

(This command uses Group IKE ID, which allows multiple hosts to use a single usinformation on Group IKE ID, see the NetScreen Concepts & Examples ScreenOS

passwordset user name_str password pswd_str

Example: The following command creates an authentication user in the NetScreeguest with the password JnPc3g12:

set user guest password JnPc3g12

remote-settings

set user name_str remote-settings { dns1 ip_addr | dns2 ip_aset user name_str remote-settings ipaddr ip_addrset user name_str remote-settings ippool name_str |set user name_str remote-settings { wins1 ip_addr | wins2 ip

password Defines a top-level password, used to authenticate the auth, L2TP, I

remote-settings Sets the remote settings for the user.

• dns1 | dns2 Specifies the IP address of the primary and secondar

• ipaddr Specifies the static IPaddress for the user.

Page 646: netscreen_CLI

“pppoa” through “zone”

630

an L2TP ippool named

}

2TP user:

of IP addresses. The NetScreen ing L2TP. (To define a L2TP pool,

e WINS (Windows Internet etBIOS computer names on

IOS name used in a Windows rk.

h xauth, ike l2tp, ike xauth, l2tp

NetScreen CLI Reference Guide

Example: The following command directs the device to obtain an IP address fromNY_Pool for a dialup user named John_Doe:

set user John_Doe remote-settings ippool NY_Pool

type

set user name_str type { [ auth ] [ ike ] [ l2tp ] [ xauth ]

Example: The following command changes the user guest to an authentication/L

set user guest type auth l2tp

• ippool Specifies the named L2TP IP pool, which contains a rangedevice uses IP pools when it assigns addresses to dialup users ususe the set ippool command.)

• wins1 | wins2 Specifies primary and secondary servers that providNaming Service). WINS is a service for mapping IP addresses to NWindows NT server-based networks. A WINS server maps a NetBnetwork environment to an IP address used on an IP-based netwo

type Sets the user type, in any of the following combinations:auth, ike, l2tp, xauth, auth ike l2tp xauth, auth ike, auth l2tp, autxauth, auth ike l2tp, auth l2tp xauth, or ike l2tp xauth.

Page 647: netscreen_CLI

“pppoa” through “zone”

631

user-groupodify it, or to add or remove a

ividual configurations for IKE users on a per-user basis, el configuration is necessary.

authentication user can be a

al }

group.

NetScreen CLI Reference Guide

Description: Use the user-group commands to create or delete a user group, to muser from it.

User groups allow policies to treat multiple users in the same way, thus avoiding indindividual users. For example, even though you can configure dialup VPN tunnels forit is often more efficient to aggregate the users into a group, for which only one tunn

Any policy that references a user group applies to all the members in the group. An member of up to four different user groups.

Syntax

get

get user-group { name_str | all | external | id id_num | loc

set

set user-group name_str{id id_num |location { external | local } |type { [ auth ] [ ike ] [ l2tp ] [ xauth ] } |user name_str}

Note: Different NetScreen platforms allow a different number of members in a user

Page 648: netscreen_CLI

“pppoa” through “zone”

632

orp_Dial:

NetScreen CLI Reference Guide

unset

unset user-group {name_str [ location | type | user name_str ] |id id_num}

Keywords and Variables

Variable Parameter

get user-group name_strset user-group name_str { ... }unset user-group name_str [ ... ]

Example: The following command displays the contents of a user group named C

get user-group Corp_Dial

all

get user-group all

name_str Specifies the name of the user group.

all Displays all existing user groups.

Page 649: netscreen_CLI

“pppoa” through “zone”

633

signs the group an ID of 10:

roups on an external RADIUS define the type of user it contains, . Defining an external user group es requiring authentication. When en contacts the RADIUS server,

NetScreen CLI Reference Guide

external

get user-group externalset user-group name_str location external

id

get user-group id id_numset user-group name_str id id_numunset user-group name_str [ ... ]

unset user-group name_str [ ... ]

Example: The following command creates a user group named Corp_Dial and as

set user-group Corp_Dial id 10

local

get user-group local

external Defines a user group as external. You can store user definitions in gserver. You can then define a user group on the NetScreen device, leave it unpopulated of users, and define the user group as externalon the NetScreen device allows you to reference that group in policithe policy requires an authentication check, the NetScreen device thwhich performs the authentication check.

id Identifies the user group with an identification number id_num.

name_str Specifies the name of the user group.

local Displays all local user groups.

Page 650: netscreen_CLI

“pppoa” through “zone”

634

hentication server. (NetScreen

n the NetScreen device.

ernal RADIUS server. (When the the type of user group.) The

.

NetScreen CLI Reference Guide

location

set user-group name_str location { external | local }unset user-group name_str location

type

set user-group name_str type { ... }

user

set user-group name_str user name_strunset user-group name_str user name_str

location Specifies the location of the user group:

• external Indicates that the user group is stored on an external autsupports user groups on RADIUS servers.)

• local Indicates that the user group is stored in the local database o

type Specifies the type of user group when that group is stored on an extuser-group is stored in the local database, the user types determinefollowing are the possible user group types:

• auth Specifies that the group is comprised of authentication users

• ike Specifies that the group uses IKE.

• l2tp Specifies L2TP users.

• xauth Specifies XAuth users.

user name_str Adds or removes the named user to the specified user group.

Page 651: netscreen_CLI

“pppoa” through “zone”

635

est”.

NetScreen CLI Reference Guide

Examples: The following commands create a new authentication user named “gu

• A authentication user group named “Corp_Dial” with ID 1010

• User added to the user group

set user guest password JnPc3g12set user-group Corp_Dial location localset user-group Corp_Dial user guest

The following command removes the user guest from the group:

unset user-group Corp_Dial user guest

Page 652: netscreen_CLI

“pppoa” through “zone”

636

vipration settings and to enable all

s based on the destination port

NetScreen CLI Reference Guide

Description: Use the vip commands to display the virtual IP (VIP) address configuVIPs to support multi-port services.

A virtual IP (VIP) address maps traffic received at one IP address to another addresnumber in the TCP or UDP segment header.

Syntax

get

get vip[ip_addr { port port_num | port-status } |server |session timeout]

set

set vip{multi-port |session timeout number}

Page 653: netscreen_CLI

“pppoa” through “zone”

637

lay information about the specified

efault, VIPs support single-port rt the device. This command tch back and forth between

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parametersget vip ip_addr { port port_num | port-status }

multi-portset vip multi-port

serverget vip server

sessionget vip session

ip_addr Identifies the VIP address.

port port_num Identifies the destination port, so that the NetScreen device can dispvirtual port defined on the VIP.

port-status Displays information about port allocation on the specified VIP.

multi-port Enables the support of multiple virtual ports per custom service. By dservices. Warning: After you execute this command, you must restachanges the functionality of the VIP, so it is highly inadvisable to swienabling and disabling the multi-port modes.

server Displays the connectivity status of servers receiving traffic via VIPs.

session timeout Displays the outstanding session timeout value for VIP.

Page 654: netscreen_CLI

“pppoa” through “zone”

638

vpn (VPN) tunnel, or to display

of a pair of unidirectional arameter index (SPI), g Security Payload) used to

ey IKE and Manual Key. lishes and maintains encryption nchanged until the participants

name_str4 ] ] ] ] |

NetScreen CLI Reference Guide

Description: Use the vpn commands to create or remove a Virtual Private Networkcurrent VPN tunnel parameters.

A tunnel is a way to secure VPN communication across a WAN. The tunnel consistssecurity associations (SAs), one at each end of the tunnel, that specify the security pdestination IP address, and security protocol (Authentication Header or Encapsulatinexchange packets through the tunnel.

NetScreen devices support two keying methods for establishing VPN tunnels, AutoKAutoKey IKE (Internet Key Exchange) is a standard protocol that automatically estabkeys between the participants. Manual Key VPNs use predefined keys that remain uchange them explicitly.

Syntax

get

get vpn [ name_str [ detail ] | auto | manual | proxy-id | ]

set (AutoKey IKE)

set vpn tunn_str gateway { ip_addr | name_str }[ replay | no-replay ]

[ transport | tunnel ][ idletime number ]

{proposal [ name_str1 [ name_str2 [ name_str3 [sec-level { basic | compatible | standard }}

Page 655: netscreen_CLI

“pppoa” through “zone”

639

_addr ] ]

c_name

NetScreen CLI Reference Guide

set (Manual Key)

set vpn tunn_str manual spi_num1 spi_num2 gateway ip_addr[ outgoing-interface interface ]

{ah { md5 | sha-1 }

{ key key_str | password pswd_str } |esp

{aes128 | aes192 | aes256 | des | 3des

{ key key_str | password pswd_str } |null}

[ auth { md5 | sha-1 }{ key key_str | password pswd_str }

]}

Other set Commands

set vpn tunn_str{bind { interface interface | zone name_str } |df-bit { clear | copy | set } |failover-weight numbermonitor [ source-interface interface [ destination-ip ip

[ optimized } [ rekey ] |proxy-id local-ip ip_addr/mask remote-ip ip_addr/mask sv}

unset

unset vpn vpn_name[ bind { interface | zone } | monitor | proxy-id ]

Page 656: netscreen_CLI

“pppoa” through “zone”

640

... ] ah { ... }

_vpn”.

sing the SHA-1 algorithm, the

ssword swordfish

ket content.

8-bit)

shing algorithm. (160-bit)

exadecimal key, which the ) from the message.s to generate an encryption or

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parameters

get vpn tunn_str [ ... ]

Example: The following command displays a VPN named “branch”:

get vpn branch

ah

set vpn tunn_str manual spi_num1 spi_num2 gateway ip_addr [

Example: The following command creates a Manual Key VPN tunnel named “Mkt

• Sets the local and remote SPI values as 2002 and 3003

• Defines the remote gateway address 2.2.2.2

• Specifies Authentication Header (AH) protocol for IP packet authentication ukey for which is generated from the password “swordfish”

set vpn Mkt_vpn manual 2002 3003 gateway 2.2.2.2 ah sha-1 pa

name_str Defines a name for the VPN.

ah Specifies Authentication Header (AH) protocol to authenticate IP pac

• md5 Specifies the Message Digest 5 (MD5) hashing algorithm. (12

• sha-1Specifies the Secure Hash Algorithm (version) 1 (SHA-1) ha

The key key_str value defines a 16-byte (MD5) or 20-byte (SHA-1) hNetScreen device uses to produce a 96-bit message digest (or hashpassword pswd_str Specifies a password the NetScreen device useauthentication key automatically.

Page 657: netscreen_CLI

“pppoa” through “zone”

641

}

l.1 interface:

st-Tun tunnel zone:

ding.

NetScreen CLI Reference Guide

auto

get vpn auto

Example: The following command displays all AutoKey IKE VPNs:

get vpn auto

bind

set vpn tunn_str bind { interface interface | zone name_str unset vpn vpn_name bind { interface | zone }

Example: The following command binds the VPN tunnel named vpn1 to the tunne

set vpn vpn1 bind interface tunnel.1

Example: The following command binds the VPN tunnel named vpn2 to the Untru

set vpn vpn2 bind zone untrust-tun

auto Displays all AutoKey IKE VPNs.

bind Binds VPN tunnel to a tunnel interface or a security zone.

• interface interface specifies the tunnel interface to use for VPN bin

• zone name_str specifies the tunnel zone to use for VPN binding.

Page 658: netscreen_CLI

“pppoa” through “zone”

642

p { ... }

(DF) bit in the outer header.

fault value.

col, which the NetScreen device

key_str value defines a 128-bit

key_str value defines a 192-bit

key_str value defines a 256-bit

alue defines a 64-bit hexadecimal

key_str value defines a 192-bit

ust specify an authentication

NetScreen CLI Reference Guide

df-bit

set vpn tunn_str df-bit { clear | copy | set }

esp

set vpn tunn_str manual spi_num1 spi_num2 gateway ip_addr es

df-bit Determines how the NetScreen device handles the Don't Fragment

• clear Clears (disables) DF bit from the outer header. This is the de

• copy Copies the DF bit to the outer header.

• set Sets (enables) the DF bit in the outer header.

esp Specifies the use of the Encapsulating Security Payload (ESP) protouses to encrypt and authenticate IP packets.

• aes128 Specifies Advanced Encryption Standard (AES). The key hexadecimal key.

• aes192 Specifies Advanced Encryption Standard (AES). The key hexadecimal key.

• aes256 Specifies Advanced Encryption Standard (AES). The key hexadecimal key.

• des Specifies Data Encryption Standard (DES). The key key_str vkey (truncated to 56 bits).

• 3des Specifies Triple Data Encryption Standard (3DES). The key hexadecimal key (truncated to 168 bits).

• null Specifies no encryption. (When you specify this option, you malgorithm (MD5 or SHA-1) using the auth option.)

Page 659: netscreen_CLI

“pppoa” through “zone”

643

_vpn”.

rdfish” and “avalanche”

ssword swordfish auth

_remote1:

vailable choices are MD5 or ey_str value defines a 16-byte vice uses to produce a 96-bit

s to generate an encryption or

ailed or “down” VPN tunnels bound eenOS fails over to the backup

-backup feature.

NetScreen CLI Reference Guide

Example: The following command creates a Manual Key VPN tunnel named “Mkt

• Specifies local and remote SPI values 2002 and 3003

• Specifies the IP address of the remote gateway 2.2.2.2

• Specifies ESP with 3DES encryption and SHA-1 authentication

• Generates the encryption and authentication keys from the passwords “swo

set vpn Mkt_vpn manual 2002 3003 gateway 2.2.2.2 esp 3des pasha-1 password avalanche

failover-weight

set vpn name_str failover-weight number }

Example: The following command assigns a failover weight of 50% to the VPN to

set vpn to_remote1 failover-weight 50

auth Specifies the use of an authentication (hashing) method. The aSHA-1. (Some NetScreen devices do not support SHA-1.) The key k(MD5) or 20-byte (SHA-1) hexadecimal key, which the NetScreen demessage digest (or hash) from the message.password pswd_str Specifies a password the NetScreen device useauthentication key automatically.

failover-weight Assigns a weight to a VPN tunnel. When the accumulated weight of fto the primary Untrust zone interface reaches or exceeds 100%, ScrUntrust zone interface.Note: This option is available only on devices that support the DIAL

Page 660: netscreen_CLI

“pppoa” through “zone”

644

London. The gateway has the

an remain inactive before the

ult setting is no-replay.

tive IP packet is encapsulated. In iate when both of end points in an iate when either end point is a

e 2 proposal determines how a

NetScreen CLI Reference Guide

gateway

set vpn tunn_str gateway ip_addr [ ... ] { ... }set vpn tunn_str gateway name_str [ ... ] { ... }get vpn gateway [ detail ]

Example: In the following example you define an IKE gateway for a remote site infollowing elements:

• The remote gateway is named London_Office, with IP address 2.2.2.2.

• The outgoing interface is ethernet3.

• The Phase 1 proposal consists of the following components:

– DSA certificate for data source authentication

– Diffie-Hellman group 2 to protect the exchange of keying information

– AES-128 encryption algorithm

– MD-5 authentication algorithm

gateway Specifies the autokey IKE gateway (ip_addr or name_str) to use.

• idletime number The length of time in minutes that a connection cNetScreen device terminates it.

• replay | no-replay Enables or disables replay protection. The defa

• transport | tunnel Defines the IPSec mode. In tunnel mode, the actransport mode, no encapsulation occurs. Tunnel mode is approprexchange lie beyond gateway devices. Transport mode is approprgateway.

• proposal name_str Defines up to four Phase 2 proposals. A PhasNetScreen device sends VPN session traffic.

• sec_level Specifies a predefined set of proposals.

Page 661: netscreen_CLI

“pppoa” through “zone”

645

2 key exchanges

rough encryption and tion

ethernet3 proposal

aes128-sha

... ] { ... }

ual mode, you can encrypt and

eters index (SPI) numbers. Each r active tunnel. Each must be a

tunnel, and vice-versa.

NetScreen CLI Reference Guide

You then reference that gateway in a VPN tunnel that has the following elements:

• The tunnel is named London_Tunnel.

• The Phase 2 proposal consists of the following components:

– Diffie-Hellman group 2 to protect the keying information during Phase

– Encapsulating Security Payload (ESP) to provide both confidentiality thencapsulation of the original IP packet and integrity through authentica

– AES-128 encryption algorithm

– MD-5 authentication algorithm

set ike gateway London_Office ip 2.2.2.2 outgoing-interface dsa-g2-aes128-md5

set vpn London_Tunnel gateway London_Office proposal g2-esp-

manual

get vpn tunn_str [ detail ] manualset vpn tunn_str manual spi_num1 spi_num2 gateway ip_addr [

manual Specifies a Manual Key VPN. When the NetScreen device is in Manauthenticate by HEX key or password.spi_num1 and spi_num2 are 32-bit local and remote security paramSPI number uniquely distinguishes a particular tunnel from any othehexadecimal value between 3000 and 2fffffff.The local SPI corresponds to the remote SPI at the other end of the

Page 662: netscreen_CLI

“pppoa” through “zone”

646

[ ... ]

.1.1.5 as the destination IP

ip 10.1.1.5

... ]

etScreen-Remote client or a

h which the NetScreen device

onitoring feature to ping.

affic for this Manual Key VPN. A-I.

NetScreen CLI Reference Guide

monitor

set vpn tunn_str monitor [ ... ] [ destination-ip ip_addr ] unset vpn tunn_str monitor

Example: The following command uses ethernet3 as the source interface and 10address for VPN monitoring through a VPN tunnel named tun1:

set vpn tun1 monitor source-interface ethernet3 destination-

outgoing-interface

set vpn tunn_str manual spi_num1 spi_num2 gateway ip_addr [ outgoing-interface interface { ... }

monitor Directs the NetScreen device to send VPN monitor messages to a Nnon-NetScreen peer device.The source-interface interface option specifies the interface througsends the monitor messages.

• destination-ip specifies the destination IP address for the VPN m

• optimized performs optimization for scalability.

• rekey triggers rekey of an autokey VPN is a tunnel is down.

outgoing-interface Defines the interface through which the NetScreen device sends trFor more information on interfaces, see “Interface Names” on page

Page 663: netscreen_CLI

“pppoa” through “zone”

647

_addr/mask svc_name

Sales) with the HTTP service:

.0/24 HTTP

. } sec-level

IP address–service.

s traffic through the tunnel.

ceives traffic through the tunnel.

r HTTP that passes through the

sic proposal provides basic-level -used settings. The standard

NetScreen CLI Reference Guide

proxy-id

get vpn proxy-idset vpn tunn_str proxy-id local-ip ip_addr/mask remote-ip ipunset vpn vpn_name proxy-id

Example: The following command creates a VPN proxy configuration for a VPN (

set vpn Sales proxy-id local-ip 10.1.1.0/24 remote-ip 10.2.2

rekey

set vpn corp monitor rekey

sec-level

set vpn tunn_str gateway { name_str | ip_addr } [ ... ] { ..{ basic | compatible | standard }

proxy-id Specifies the three-part tuple consisting of local IP address–remote

• local-ip ip_addr/mask The local IP address that sends and receive

• remote-ip ip_addr/mask The remote IP address that sends and re

• svc_name The name of the service, such as FTP, TELNET, DNS otunnel. (Specifying any enables all services.)

rekey Keeps the SA active even if there is no other VPN traffic.

sec-level Specifies which pre-defined security proposal to use for IKE. The basecurity settings. The compatible proposal provides the most widelyproposal provides settings recommended by NetScreen.

Page 664: netscreen_CLI

“pppoa” through “zone”

648

vpn-group display VPN groups.

een device to perform tunnel ice invokes a policy that uses a atest weight becomes active by not, the device uses the tunnel

NetScreen CLI Reference Guide

Description: Use the vpn-group commands to define or remove VPN groups, or to

A VPN group is a collection of defined VPN tunnels. A VPN group allows the NetScrfailover. Each tunnel in the group has an assigned weight. When the NetScreen devVPN group, the device constructs all tunnels in the group, and the tunnel with the gredefault. The IKE heartbeat periodically checks to see if this tunnel is working. If it is with the next highest weight.

Syntax

get

get vpn-group [ id id_num ]

set

set vpn-group id id_num [ vpn tunn_str [ weight number ] ]

unset

unset vpn-group id id_num [ vpn tunn_str [ weight number ] ]

Keywords and Variables

id

get vpn-group id id_numset vpn-group id id_num [ ... ]unset vpn-group id id_num [ ... ]

id Specifies an identification number for a VPN group.

Page 665: netscreen_CLI

“pppoa” through “zone”

649

pn2). You place them in a VPN r1 in the Trust zone to addr2 in

giving it priority. If traffic cannot

e-g2-3des-md5e-g2-aes128-md5

-group 1001

d from it.

group. The higher the number, the

NetScreen CLI Reference Guide

vpn

set vpn-group id id_num vpn tunn_str [ ... ]unset vpn-group id id_num vpn tunn_str

weight

set vpn-group id id_num vpn tunn_str weight numberunset vpn-group id id_num vpn tunn_str weight number

Example: With the following commands, you create two VPN tunnels (vpn1 and vgroup with ID 1001, which you then reference in a policy permitting traffic from addthe Untrust zone beyond the remote gateway. You assign vpn1 a greater weight, pass through vpn1, the NetScreen device redirects it through vpn2:

set ike gateway gw1 ip 1.1.1.1 preshare bi273T1L proposal prset ike gateway gw2 ip 2.2.2.2 preshare r3ix6403 proposal prset vpn vpn1 gateway gw1 replay proposal g2-esp-3des-shaset vpn vpn2 gateway gw2 replay proposal g2-esp-3des-shaset vpn-group id 1001 vpn vpn1 weight 1set vpn-group id 1001 vpn vpn2 weight 2set policy from trust to untrust addr1 addr2 HTTP tunnel vpn

vpn Specifies the name of a VPN to be placed in a VPN group or remove

weight Specifies a weight (priority) for the VPN relative to other VPNs in the higher the priority.

Page 666: netscreen_CLI

“pppoa” through “zone”

650

vpnmonitorshold.

of active VPNs through the use d traps.

you must import the are on the NetScreen

NetScreen CLI Reference Guide

Description: Use the vpnmonitor commands to set the monitor frequency and thre

The NetScreen ScreenOS provides the ability to determine the status and condition of ICMP pings, and report the conditions by using SNMP VPN monitoring objects an

To enable your SNMP manager application to recognize the VPN monitoring MIBs, NetScreen-specific MIB extension files into the application. The MIB extension files documentation CD that shipped with the NetScreen device.

Syntax

get

get vpnmonitor

set

set vpnmonitor{interval number |threshold number}

unset

unset vpnmonitor interval {interval |threshold}

Page 667: netscreen_CLI

“pppoa” through “zone”

651

device can send vpnmonitor PN Link-Status to down.

NetScreen CLI Reference Guide

Keywords and Variables

interval

set vpnmonitor interval numberunset vpnmonitor interval

threshold

set vpnmonitor threshold numberunset vpnmonitor threshold

interval Specifies the monitor frequency interval (in seconds).

threshold Specifies the monitor threshold, the number of consecutive times therequests without getting a response before the device changes the V

Page 668: netscreen_CLI

“pppoa” through “zone”

652

vroutereen device.

ces the CLI in the routing context:

nce Guide. Protocol-specific CLI Reference Guide.

NetScreen CLI Reference Guide

Description: Use the vrouter commands to configure a virtual router on the NetScr

Executing the set vrouter name_str command without specifying further options placontext. For example, the following command places the CLI in the trust-vr routing

set vrouter trust-vr

To set protocol specific parameters, refer to the Interfaces section of this CLI Referecommands for RIP, OSPF, IGMP, and PIM are listed alphabetically by name in this

Syntax

exec

exec vrouter name_str protocol bgp neighbor ip_addr{connect |disconnect |tcp-connect}

Page 669: netscreen_CLI

“pppoa” through “zone”

653

static }

NetScreen CLI Reference Guide

get

get vrouter name_str[access-list |config |default-vrouter |interface |mcore [ cachemiss ] |mroute [ brief ]

[ mgroup <ip_addr> brief |source <ip_addr>

[ brief | iif interface ]

]preference |protocol { bgp | ospf | rip | pim}1 |route

[id id_num |ip ip_addr |prefix ip_addr/mask |protocol { bgp | connected | imported | ospf | rip | source

[id id_num |in-interface [ interface ] |ip ip_addr |prefix ip_addr/mask |] |

1. For more information on the protocol { bgp | ospf | rip } options, see the bgp, ospf, and rip command descriptions.

Page 670: netscreen_CLI

“pppoa” through “zone”

654

number |

c }

face out-group ip_addr|

NetScreen CLI Reference Guide

summary ] |

route-lookup preference |route-map [ name_str ]

[config | number [ config | match | set ]] |

router-id |rule |statistics |zone

]

set

set vrouter { name name_str | name_str }[access-list id_num

{ permit | deny } { ip ip_addr/mask | default-route }add-default-route vrouter untrust-vr |adv-inact-interface auto-route-export |default-vrouter |export-to | import-from

vrouter name_str route-map name_str protocol{ bgp | connected | imported | ospf | rip | stati

ignore-subnet-conflict |max-ecmp-routes number |max-routes number |mroute {

max-entries number |mgroup ip_addr source ip_addr iif interface oif intermultiple-iif-enable |

Page 671: netscreen_CLI

“pppoa” through “zone”

655

]

NetScreen CLI Reference Guide

negative-cache [ timer number ]}nsrp-config-sync |preference

{auto-exported number |connected number |ebgp number |ibgp number |imported number |ospf number |ospf-e2 number |rip numberstatic number} |

protocol { bgp | ospf | rip | pim}2 |route [ source ] [ in-interface interface ] ip_addr/mask

{interface interface

[ gateway ip_addr ] [ metric number ] [ permanent[ preference number ][ tag id_num ] |

vrouter name_str} |

route-lookuppreference[destination-routing number |sibr-routing number |source-routing number |]|

route-map{name name_str { permit | deny } number |name_str number }

2. For more information on the protocol options, see the bgp, ospf, or rip command descriptions.

Page 672: netscreen_CLI

“pppoa” through “zone”

656

pe2-external-ospf } |

NetScreen CLI Reference Guide

[as-path id_num |community id_num |local-pref number |match

{as-path id_num |community id_num |interface interface |ip id_num |metric number |next-hop id_num |route-type

{ internal-ospf | type1-external-ospf | tytag { number | ip_addr }}|

metric number |metric-type { type-1 | type-2 } |next-hop ip_addr |offset-metric number |origin { igp | incomplete }preserve preference |preserve metric |tag { number | ip_addr } |weight number ]

router-id { id_num | ip_addr } |sharable |sibr-routing enable |snmp trap private |source-routing enable]

Page 673: netscreen_CLI

“pppoa” through “zone”

657

number ] |

c } |

face |

NetScreen CLI Reference Guide

unset

unset vrouter name_str[access-list id_num [ ip_addr/mask number | default-routeadd-default-route |adv-inact-interface |auto-route-export |export-to | import-from

vrouter name_str route-map name_str protocol{ bgp | connected | imported | ospf | rip | stati

ignore-subnet-conflict |max-ecmp-routes |max-routes |mroute {

max-entries |mgroup ip_addr source ip_addr iif interface oif intermultiple-iif-enable |negative-cache [ timer ]

}nsrp-config-sync |preference

{auto-exported |connected |ebgp |ibgp |imported |ospf |ospf-e2 |rip |static} |

protocol { bgp | ospf | rip | pim }3 |

Page 674: netscreen_CLI

“pppoa” through “zone”

658

NetScreen CLI Reference Guide

route [ source ] [ in-interface interface ] ip_addr/mask[vrouter name_str |interface interface [ gateway ip_addr ]] |

route-lookup preference |route-map name_str

[ number ] |as-path |community |local-pref |match

{as-path |community |interface |ip |metric |next-hop |route-type |tag |}|

metric |metric-type |next-hop |offset-metric |preserve metric |preserve preference |tag |weight

3. For more information on the protocol { bgp | ospf | rip } options, see the bgp, ospf, and rip command descriptions.

Page 675: netscreen_CLI

“pppoa” through “zone”

659

vate the BGP routing context,

mber }

d virtual router, such as trust-vr or ith the name keyword. (Creating devices and requires a vsys

NetScreen CLI Reference Guide

] |router-id |sharablesibr-routing enable |snmp trap private |source-routing enable |]

Keywords and Variables

Variable Parameter

set vrouter name_str

Example: The following commands activate the trust-vr virtual router context, actiand execute the context-dependent command get config.

set vrouter trust-vrns(trust-vr)-> set protocol bgpns(trust-vr/bgp)-> get config

access-list

get vrouter name_str access-listset vrouter name_str access-list id_num

{ permit | deny } { ip ip_addr/mask | default-route } nu

name_str The name of the virtual router. The name can be a predefineuntrust-vr, or it can be a user-defined virtual router created wcustom virtual routers is only supported on certain NetScreensoftware key.).

Page 676: netscreen_CLI

“pppoa” through “zone”

660

efault-route ] number

entry permits (or denies) routes e identifies the access list. The

ist.

access list.

er. (This command is available if this virtual router is not

ces for redistribution or export. By tributed to other protocols or

NetScreen CLI Reference Guide

unset vrouter name_str access-list id_num [ ip_addr/mask | d

add-default-route

set vrouter name_str add-default-route vrouter name_strunset vrouter name_str add-default-route

adv-inact-interface

set vrouter name_str adv-inact-interfaceunset vrouter name_str adv-inact-interface

auto-route-export

set vrouter name_str auto-route-export

access-list Creates or removes an access list, or entries in the access list. Eachaccording to IP address and mask, or default route. The id_num valunumber identifies the sequence number for this entry in the access l

• permit Directs the virtual router to permit the route.

• deny Directs the virtual router to deny the route.

• default-route Enters the default route for the virtual router into the

add-default-route Adds a default route with the next hop as another virtual routonly in the default virtual router of the current vsys, and only untrust-vr.)

adv-inact-interface Directs the virtual router to consider active routes on inactive interfadefault, only active routes defined on active interfaces can be redisexported to other virtual routers.

Page 677: netscreen_CLI

“pppoa” through “zone”

661

e_str { ... }ame_str { ... }

rust-vr vrouter.T mode. For information on Route ples Reference Guide.fied vrouter (name_str) has export

(source), or to export routes to

.

ed or exported routes.

.

y Protocol (BGP) routes.

NetScreen CLI Reference Guide

unset vrouter name_str auto-route-export

configget vrouter name_str config

default-vrouterget vrouter name_str default-vrouterset vrouter name_str default-vrouter

export-to | import-from

set vrouter name_str { export-to | import-from } vrouter namunset vrouter name_str { export-to | import-from } vrouter n

auto-route-export Directs the virtual router to export public interface routes to the untAn interface is public if it is in Route mode, and private if it is in NAmode and NAT mode, refer to the NetScreen Concepts and ExamNote: The auto-route-export switch does not take effect if the specior import rules to the untrust-vr virtual router.

config Displays configuration information about the virtual router.

default-vrouter Sets the specified virtual router as the default router for the vsys.

export-to | import-from

Directs the virtual router to import routes from another virtual router another virtual router (destination).

• vrouter name_str identifies the source or destination virtual router

• route-map name_str identifies the route map that filters the import

• protocol Specifies the protocol for the imported or exported routes

- bgp Directs the virtual router to import or export Border Gatewa

Page 678: netscreen_CLI

“pppoa” through “zone”

662

ted routes.

t were redistributed into the virtual

t Path First (OSPF) routes.

tion Protocol (RIP) routes.

ult route.

interfaces in the virtual router. By terfaces in the same virtual router.

es to the same destination

NetScreen CLI Reference Guide

ignore-subnet-conflict

set vrouter name_str ignore-subnet-conflictunset vrouter name_str ignore-subnet-conflict

interface

get vrouter name_str interface

max-ecmp-routes

set vrouter name_str max-ecmp-routes numberunset vrouter name_str max-ecmp-routes

- connected Directs the virtual router to import or export connec

- imported Directs the virtual router to import or export routes tharouter from another virtual router.

- ospf Directs the virtual router to import or export Open Shortes

- rip Directs the virtual router to import or export Routing Informa

- static Directs the virtual router to import or export static routes.

• default-route Directs the virtual router to export or import the defa

ignore-subnet-conflict

Directs the virtual router to ignore overlapping subnet addresses for default, you cannot configure overlapping subnet IP addresses on in

interface Displays the interfaces in the virtual router.

max-ecmp-routes

Specifies the maximum number of equal cost multipath (ECMP) routnetwork. Enter a value between 1 and 4 (1 is the default).

Page 679: netscreen_CLI

“pppoa” through “zone”

663

if interface1 ]

ce1 oif interface2

face1 oif interface2

tual router. By default, the n the NetScreen device and the

multicast routing protocol is

NetScreen CLI Reference Guide

max-routes

set vrouter name_str max-routes numberunset vrouter name_str max-routes

mcore

get vrouter name_str mcore [ cachemiss ]

mroute

get vrouter name_str brief

get vrouter name_str mroute mgroup ip_addr1 brief

get {...} mroute mgroup ip_addr1 source ip_addr2 [ brief | iset vrouter name_str mroute max-entries number

set {...} mroute mgroup ip_addr1 source ip_addr2 iif interfa

set {...} mroute mgroup ip_addr1 {...} out-group ip_addr3

set vrouter name_str mroute multiple-iif-enable

set vrouter name_str negative-cache [ timer number ]unset vrouter name_str mroute max-entries

unset {...} mroute mgroup ip_addr1 source ip_addr2 iif inter

max-routes Specifies the maximum number of routing entries allowed for this virmaximum number of entries allowed for a virtual router depends uponumber of virtual routers configured on the device.

mcore Displays multicast routing information for each interface on which aenabled.

cachemiss Displays the current multicast cachemiss data.

Page 680: netscreen_CLI

“pppoa” through “zone”

664

the multicast routing table.

r.

interface

up.

e interface on which the packet NetScreen device drops packets also set the timer value to specify the entries in the negative cache. he when it receives information

irtual routers is only supported on

NetScreen CLI Reference Guide

unset vrouter name_str mroute multiple-iif-enable

unset vrouter name_str negative-cache [ timer number ]

name

set vrouter name name_str

brief Displays summary information.

max-entries Specifies the maximum number of multicast routes allowed in

mroute Configures a static multicast route in the specified virtual route

• ip_addr1 is the multicast group address of the route

• ip_addr2 is the source address of the multicast data

• interface1 is the incoming interface of the multicast data

• interface2 is the outgoing interface of the multicast data

• ip_addr3 is the multicast group address on the outgoing

multiple-iif-enable Permits multiple multicast routes for the same source and gro

negative-cache Creates negative multicast routes if the protocol that owns thwas received cannot create a forwarding multicast route. Thewhen they need to go on a negative multicast route. You canthe duration, in seconds, that the NetScreen device maintainsThe NetScreen device removes the entry in the negative cacenabling it to create a forwarding multicast route entry.

name Specifies the name of a user-defined virtual router. Creating custom vcertain NetScreen devices and requires a vsys software key.

Page 681: netscreen_CLI

“pppoa” through “zone”

665

irtual router on a NSRP peer. This

value, the more preference given

ublic interfaces) that the virtual ault is 30.

efault is 0.

col (EBGP) routes. The default is

ol (IBGP) routes. The default is

d to another protocol and passed

F) routes. The default is 60.

s. The default is 200.

) routes. The default is 100.

.

NetScreen CLI Reference Guide

nsrp-config-sync

set vrouter name_str nsrp-config-syncunset vrouter name_str nsrp-config-sync

preference

get vrouter name_str preferenceset vrouter name_str preferenceunset vrouter name_str preference

nsrp-config-sync Synchronizes the specified virtual router (name_str) with the same vswitch is enabled by default.

preference Specifies route preference level based upon protocol. The lower theto the route. You can specify a value between 1-255.

• auto-exported Specifies preference levels for routes (defined on prouter automatically exports to the untrust-vr virtual router. The def

• connected Specifies preference level for connected routes. The d

• ebgp Specifies preference level for External Border Gateway Proto120.

• ibgp Specifies preference level for Internal Border Gateway Protoc40.

• imported Specifies preference level for pre-existing routes exporteon to other routers. The default is 140.

• ospf Specifies preference level for Open Shortest Path First (OSP

• ospf-e2 Specifies preference level for OSPF External Type 2 route

• rip Specifies preference level for Routing Information Protocol (RIP

• static Specifies preference level for static routes. The default is 20

Page 682: netscreen_CLI

“pppoa” through “zone”

666

e ] ip_addr/mask [ ...

face ] ip_addr/mask

: BGP, OSPF, RIP or PIM. (For nd descriptions in this manual.)

and has the following options:

or.

table.

umber. The ID number is a vrouter name_str route

the interface on which a packet

NetScreen CLI Reference Guide

protocol

exec vrouter name_str protocol { ... }get vrouter name_str protocol { bgp | ospf | rip | pim }set vrouter name_str protocol { bgp | ospf | rip | pim }unset vrouter name_str protocol { bgp | ospf | rip | pim }

route

get vrouter name_str route [ ... ]set vrouter name_str route [ source ] [ in-interface interfac

]unset vrouter name_str route [ source ] [ in-interface inter

[ ... ]

protocol Places the NetScreen device in the context of the specified protocolinformation on these contexts, see the bgp, ospf, rip or pim comma

The exec vrouter name_str protocol bgp neighbor ip_addr comm

• connect Establishes a BGP connection to the specified neighbor.

• disconnect Terminates a BGP connection to the specified neighb

• tcp-connect Tests the TCP connection to the neighbor.

route Configures routes for the routing table for the virtual router.

• ip_addr/mask Specifies the IP address that appears in the routing

• gateway ip_addr Specifies the gateway for the next hop.

• id id_num Displays information for the route that matches the ID nsystem-assigned number that you can see when you enter the getcommand with no options.

• in-interface interface For source interface-based routes, specifiesarrives on the NetScreen device.

Page 683: netscreen_CLI

“pppoa” through “zone”

667

outing number ]

is route is to be forwarded.

een 1 and 65535.

e is down or the IP address is

pecify a value between 0 and 255.

t address.

c routes.

playing a source-based route, you

route. The tag can be used as a cify a value between 1 and 65535.

r. The route lookup type that has highest preference value. The last. Enter a number between

NetScreen CLI Reference Guide

route-lookup preference

get vrouter name_str route-lookup preferenceset vrouter name_str route-lookup preference [ destination-r

[ sibr-routing number ] [ source-routing number ]unset vrouter name_str route-lookup preference

• interface interface Specifies the interface on which a packet for th

• ip ip_addr Displays the route for the specified IP address.

• metric number Specifies the cost of the route. Specify a value betw

• permanent Specifies that the route is kept active when the interfacremoved from the interface.

• preference number Specifies the preference value for the route. S

• prefix ip_addr/mask Displays the routes within the specified subne

• protocol Displays BGP, connected, imported, OSPF, RIP, or stati

• source Specifies that the route is a source-based route. When discan optionally specify:

- id id_num

- ip ip_addr

- prefix ip_addr/mask

• summary Displays a summary of the routes.

• tag number For destination-based routes, specifies the tag for thisfilter when redistributing routes (see the route-map keyword). Spe

• vrouter name_str Specifies a virtual router as the next hop.

route-lookuppreference

Configures the order in which route lookups occur in the virtual routethe highest preference value is performed first, followed by the next route lookup type that has the lowest preference value is performed 1-255 for the preference.

Page 684: netscreen_CLI

“pppoa” through “zone”

668

me_str [ ... ]

kups based on destination IP

sed on source interface. The

based on source IP address. The

map (name_str). Otherwise, ap must have a sequence

tries are compared against an e if the entry allows redistribution

ified parameters. You can match

GP AS path attribute to be

defines the community attribute to

.

f routes to be matched.

5535.

p for routes to be matched

NetScreen CLI Reference Guide

route-map

get vrouter name_str route-map [ ... ]set vrouter name_str { ... } vrouter name_str route-map

{ name name_str | name_str } [ ... ]unset vrouter name_str { ... } vrouter name_str route-map na

• destination-routing number Specifies the preference for route looaddress. The default value is 1.

• sibr-routing number Specifies the preference for route lookups badefault value is 3.

• source-routing number Specifies the preference for route lookupsdefault is 2.

route-map Configures a route map for the virtual router.With the name keyword, the route-map option creates a new route name_str configures an existing route map. Each entry in the route mnumber (number) that identifies the order in which the route map enincoming or outgoing route. The permit and deny switches determinof routes to another virtual router or another protocol.

The match keyword directs the virtual router to match routes to specthe following parameters:

• as-path id_num Specifies an AS path access list that defines the Bmatched.

• community id_num Specifies a BGP community list (id_num) that be matched.

• interface interface Specifies an interface on the NetScreen device

• ip id_num Specifies an access list that defines the IP addresses o

• metric number The cost of the route. Enter a number between 1-6

• next-hop id_num Specifies an access list that defines the next-ho

Page 685: netscreen_CLI

“pppoa” through “zone”

669

map entry.

es.

es.

s.

matching routes. You can set the

repended to the path list of the

t in the community attribute for the

route.

number between 1-65535.

g route.

ng route.

or the matching route. For RIP tes that are learned. For other ther virtual router.

ute is preserved when the route is

atching route is preserved when

hing route.

NetScreen CLI Reference Guide

• route-type Specifies which kind of OSPF route matches the route

- internal-ospf Matches only OSPF internal routes.

- type1-external-ospf Matches only external OSPF Type-1 rout

- type2-external-ospf Matches only external OSPF Type-2 rout

• tag { number | ip_addr } Matches either a route tag or an IP addres

Other keywords allow you to optionally set values for parameters onfollowing parameters:

• as-path id_num Specifies the AS path access list values that are pmatching route.

• community id_num Specifies the community list values that are sematching route.

• local-pref number Specifies the path preference for the matching

• metric number Specifies the metric for the matching route. Enter a

• metric-type Specifies OSPF metric type that is set for the matchin

- type-1 Specifies OSPF Type-1 route.

- type-2 Specifies OSPF Type-2 route.

• next-hop ip_addr Specifies the next hop IP address for the matchi

• offset-metric number Specifies the value to increment the metric froutes, you can use this option for routes that are advertised or rouroutes, you can use this option to routes that are exported into ano

• origin Specifies the origin of a route advertised by BGP

• preserve metric Specifies that the metric value for the matching roexported to another virtual router.

• preserve preference Specifies that the preference value for the mthe route is exported to another virtual router.

• tag { number | ip_addr } Specifies a tag or IP address for the matc

• weight number Sets the weight of the matching route for BGP.

Page 686: netscreen_CLI

“pppoa” through “zone”

670

ch, and get set commands to ns.

unicate with other routing devices. tion (like an IP address) or a

ecify a router identification, the router as the router identification.

(vsys) on the device.

NetScreen CLI Reference Guide

router-id

get vrouter name_str router-idset vrouter name_str router-id { id_num | ip_addr }unset vrouter name_str router-id

rule

get vrouter name_str rule

sharable

set vrouter name_str sharableunset vrouter name_str sharable

While configuring a route map, you can use the get config, get matdisplay route map configuration commands, or match or set conditio

router-id Specifies the router identification that the virtual router uses to commYou can enter the router identification in either a dotted decimal notadecimal number (this is converted to 0.0.0.number). If you do not spdevice uses the highest IP address of the any interface in the virtual

rule Displays import and export rules for the virtual router.

sharable Makes the root-level virtual router accessible from any virtual system

Page 687: netscreen_CLI

“pppoa” through “zone”

671

he source interface.

irtual router. Private traps include fault root-level virtual router. (This ault virtual router at the root level.)

ource IP address.

NetScreen CLI Reference Guide

sibr-routing enableset vrouter name_str sibr-routing enableunset vrouter name_str sibr-routing enable

snmp

set vrouter name_str snmp trap privateunset vrouter name_str snmp trap private

source-routing enableset vrouter name_str source-routing enableunset vrouter name_str source-routing enable

statistics

get vrouter name_str statistics

source- routing enable

Directs the virtual router to perform routing table lookups based on t

snmp Makes SNMP traps private for the dynamic routing MIBs under the vthe virtual router identification.This option is available only for the deis usually the trust-vr virtual router, although you can change the def

source- routing enable

Directs the virtual router to perform routing table lookups based on s

statistics Displays statistics for the virtual router.

Page 688: netscreen_CLI

“pppoa” through “zone”

672

NetScreen CLI Reference Guide

zone

get vrouter name_str zone

zone Displays the zones bound to the virtual router.

Page 689: netscreen_CLI

“pppoa” through “zone”

673

vsys the root level of a NetScreen

provide multi-tenant services. strators, called “virtual system domain by setting their own y a root-level administrator can es and subinterfaces.)

te that you are now operating ystem and all its settings.

NetScreen CLI Reference Guide

Description: Use the vsys commands to create and configure virtual systems fromdevice.

Virtual systems allow you to logically partition a single NetScreen security system toEach virtual system (vsys) is a unique security domain and can have its own adminiadministrators” or “vsys admins”. Such adminstrators can individualize their securityaddress books, virtual routers, user lists, custom services, VPNs, and policies. (Onlset firewall security options, create virtual system administrators, and define interfac

When you execute the set vsys command, the command prompt changes to indicawithin a virtual system. Use the unset vsys command to remove a specific virtual s

Syntax

get

get vsys [ name_str ]

set

set vsys name_str[vrouter

[name [ name_str ] [ id id_num ] [ vsd number ] |share [ name_str ] [ vsd number ] |vsd number] |

vsd number]

Page 690: netscreen_CLI

“pppoa” through “zone”

674

itches the console to the new

[ vsd number ] ]] ]

the root level admin within the

.

lt router.

NetScreen CLI Reference Guide

unset

unset vsys name_str

Keywords and Variables

Variable Parameters

get vsys [ name_str ]set vsys name_strunset vsys name_str

Example: The following command creates a virtual system named vsys1 and swvirtual system:

set vsys vsys1

vrouter

set vsys name_str vrouter [ name [ name_str ] [ id id_num ] set vsys name_str vrouter [ share [ name_str ] [ vsd number

name_str Defines the name of a virtual system (vsys) and automatically placesvsys. Subsequent commands configure the newly created vsys.

vrouter Defines and configures the default virtual router for the vsys.

• name Specifies a name for the virtual router.

- id id_num Assigns an identification number to the virtual router

- vsd id_num See “vsd” on page 675.

• share Specifies a shared root-level virtual router to use as a defau

• vsd id_num See “vsd” on page 675.

Page 691: netscreen_CLI

“pppoa” through “zone”

675

irtual router named

root-level virtual router

rtual router named stem:

router. A VSD group is a pair of ly comprise a single VSD. A VSD the primary device fails. For more es ScreenOS Reference Guide.

NetScreen CLI Reference Guide

Examples: The following command creates a vsys named Acme_Org, creates a vAcme_Router with ID 1025, and switches the console to the new virtual system:

set vsys Acme_Org vrouter name Acme_Router id 1025

The following command creates a vsys named Acme_Org and specifies a default,(trust-vr):

set vsys Acme_Org vrouter share trust-vr

vsd

set vsys name_str vrouter [ vsd number ]

Example: The following command creates a vsys named Acme_Org, creates a viAcme_Router, creates a VSD ID 5, and switches the console to the new virtual sy

set vsys Acme_Org vrouter vsd 5

vsd number Assigns a Virtual Security Device (VSD) group number to the virtualphysical NetScreen devices (a primary and a backup) that collectiveprovides failover capability, allowing the backup device to take over ifinformation on VSD groups, see the NetScreen Concepts & Exampl

Page 692: netscreen_CLI

“pppoa” through “zone”

676

webauthrform WebAuth authentication.

ion and input authentication

“policy” on page 471).

NetScreen CLI Reference Guide

Description: Use the webauth commands to configure the NetScreen device to pe

WebAuth is an authentication method that requires the user to initiate an HTTP sessinformation, before the user can send traffic to the destination node.

You specify authentication in policy definitions (see the auth keyword description in

Syntax

get

get webauth [ banner ]

set

set webauth { banner success string | server name_str }

unset

unset webauth { banner success | server }

Page 693: netscreen_CLI

“pppoa” through “zone”

677

bAuth service successful”:

”:

ccess.

ll existing WebAuth server names

NetScreen CLI Reference Guide

Keywords and Variables

banner success

get webauth bannerset webauth banner success stringunset webauth banner success

Example: The following command changes the WebAuth success banner to “We

set webauth banner success “WebAuth service successful”

server

set webauth server name_strunset webauth banner server

Example: The following command specifies a WebAuth server named “wa_serv1

set webauth server wa_serv1

Defaults

The default banner value is WebAuth Success.

banner success Specifies the banner (string) displayed in response to WebAuth su

server Specifies the WebAuth server name (name_str). (You can obtain aby executing the command get auth-server all.)

Page 694: netscreen_CLI

“pppoa” through “zone”

678

webtrendsWebTrends.

rt, and emergency events to cus on areas such as firewall lert, and emergency.

NetScreen CLI Reference Guide

Description: Use the webtrends commands to configure the NetScreen device for

The WebTrends Firewall Suite allows you to customize syslog reports of critical, aledisplay the information you want in a graphical format. You can create reports that foattacks (emergency-level events) or on all events with the severity levels of critical, a

Syntax

get

get webtrends

set

set webtrends{VPN |enable |host-name name_str |port port_num}

unset

unset webtrends{VPN |enable |host-name |port}

Page 695: netscreen_CLI

“pppoa” through “zone”

679

NetScreen CLI Reference Guide

Keywords and Variables

vpn

set webtrends VPNunset webtrends VPN

enable

set webtrends enableunset webtrends enable

host-name

set webtrends host-name name_strunset webtrends host-name

port

set webtrends port port_numunset webtrends port

vpn Enables WebTrends VPN encryption.

enable Enables WebTrends.

host-name Specifies the WebTrends host name.

port port_num Specifies the WebTrends host port.

Page 696: netscreen_CLI

“pppoa” through “zone”

680

xauthm XAuth authentication.

ves when connecting to the ttings from the NetScreen ays or clients, XAuth user enter information unique to that

NetScreen CLI Reference Guide

Description: Use the xauth commands to configure the NetScreen device to perfor

An XAuth user or user group is one or more remote users who authenticate themselNetScreen device via an AutoKey IKE VPN tunnel and optionally receive TCP/IP sedevice. Whereas IKE user authentication is actually the authentication of VPN gatewauthentication is the authentication of the users themselves. It requires each user to user (the user name and password).

Syntax

get

get xauth { active | default | lifetime }

set

set xauth{default

{auth server name_str [ chap ] [ query-config ] |dns1 ip_addr | dns2 ip_addr |ippool name_str |wins1 ip_addr | wins2 ip_addr} |

lifetime number}

Page 697: netscreen_CLI

“pppoa” through “zone”

681

).

e Authentication Protocol (CHAP)

XAuth clients and DNS server IP

.

n device draws when assigning

NetScreen CLI Reference Guide

unset

unset xauth {default { dns1 | dns2 | ippool | wins1 | wins2 } |lifetime}

Keywords and Variables

active

get xauth active

default

get xauth defaultset xauth default { ... }unset xauth default { ... }

active Displays all currently active XAuth login instances.

default Sets or displays default XAuth settings.

• auth server Identifies the XAuth server by object name (name_str

- chap Directs the NetScreen device to use Challenge Handshakwhile performing authentication with the XAuth client.

- query-config Queries client settings (such as IP addresses foraddresses) from an external authentication server.

• dns1 Identifies the DNS primary server by IP address (ip_addr).

• dns2 Identifies the DNS secondary server by IP address (ip_addr)

• ippool Identifies the pool of IP addresses from which the NetScreeaddresses to XAuth clients.

Page 698: netscreen_CLI

“pppoa” through “zone”

682

erver (Our_Auth):

30 minutes:

r).

rver holds resources (such as IP

NetScreen CLI Reference Guide

Example: The following command sets up the NetScreen device to use a XAuth s

set xauth default auth server Our_Auth

lifetime

get xauth lifetimeset xauth lifetime numberunset xauth lifetime number

Example: The following command specifies a maximum XAuth session length of

set xauth lifetime 30

• wins1 Identifies the WINS primary server by IP address (ip_addr).

• wins2 Identifies the WINS secondary server by IP address (ip_add

lifetime number Specifies the maximum length of time (in minutes) that the XAuth seaddress) on behalf of a client.

Page 699: netscreen_CLI

“pppoa” through “zone”

683

zone, and to set screen options.

apply various security options. ding the network into segments er device, basically to protect ne many security zones, security appliances.

e interfaces, see “Interface B-I.

NetScreen CLI Reference Guide

Description: Use the zone commands to create, remove, or display a security zone

A security zone is method for sectioning the network into segments to which you canYou can configure multiple security zones for individual NetScreen devices, thus divito which you can apply security options. There must be at least two security zones pone area of the network from the other. On some NetScreen platforms, you can defibringing finer granularity to your network security design, without deploying multiple

Each security zone has at least one interface bound to it. For a brief description of thNames” on page A-I. For information on security zones, see “Zone Names” on page

Syntax

get

get zone[id id_num |all |zone [ screen { all | attack | counter | info } ]]

set

set zone{name zone [ { L2 id_num | tunnel zone } ] |zone

{asymmetric-vpn |block |screen

Page 700: netscreen_CLI

“pppoa” through “zone”

684

d [ number ] ] |

NetScreen CLI Reference Guide

{alarm-without-drop |block-frag |component-block [ activex | java | zip | exe ] |fin-no-ack |icmp-flood [ threshold number ] |icmp-fragment |icmp-large |ip-bad-option |ip-filter-src |ip-loose-src-route |ip-record-route |ip-security-opt |ip-spoofing [ drop-no-rpf-route | zone-based ] |ip-stream-opt |ip-strict-src-route |ip-sweep [ threshold number ] |ip-timestamp-opt |land |limit-session

[ source-ip-based number | destination-ip-basemal-url { string1 string2 number | code-red } |ping-death |port-scan [ threshold number ] |syn-ack-ack-proxy [ threshold number ] |syn-fin |syn-flood

[alarm-threshold number |attack-threshold number |destination-threshold number |drop-unknown-mac |queue-size number |source-threshold number |timeout number] |

Page 701: netscreen_CLI

“pppoa” through “zone”

685

NetScreen CLI Reference Guide

syn-frag |tcp-no-flag |tear-drop |udp-flood [ dst-ip ip_addr | threshold number ] |unknown-protocol |winnuke}

reassembly-for-alg |tcp-rst |vrouter name_str} |

}

unset

unset zone zone{asymmetric-vpn |block |screen

{block-frag |component-block |fin-no-ack |icmp-flood [ threshold ] |icmp-fragment |icmp-large |ip-bad-option |ip-filter-src |ip-loose-src-route |ip-record-route |ip-security-opt |ip-spoofing [ drop-no-rpf-route | zone-based ] |ip-stream-opt |ip-strict-src-route |

Page 702: netscreen_CLI

“pppoa” through “zone”

686

d ] |

NetScreen CLI Reference Guide

ip-sweep [ threshold ] |ip-timestamp-opt |land |limit-session [ source-ip-based | destination-ip-basemal-url { string1 | code-red } |ping-death |port-scan [ threshold ] |syn-ack-ack-proxy [ threshold number ] |syn-fin |syn-flood

[alarm-threshold |attack-threshold |destination-threshold number |drop-unknown-mac |queue-size |source-threshold |timeout] |

syn-frag |tcp-no-flag |tear-drop |udp-flood [ threshold number ] |unknown-protocol |winnuke}

tcp-rst |}

Page 703: netscreen_CLI

“pppoa” through “zone”

687

es, see “Zone Names” on page

to match any applicable VPN mple, traffic coming from VPN A s free routing of VPN traffic r VPN traffic.for asymmetric traffic.

NetScreen CLI Reference Guide

Keywords and Variables

Variable Parametersget zone zone [ ... ]set zone zone { ... }unset zone zone { ... }

all

get zone all [ ... ]

asymmetric-vpn

set zone asymmetric-vpn

block

set zone zone blockunset zone zone block

zone The name of the zone. For more information on zones and zone namB-I.

all Displays information on all existing zones.

asymmetric-vpn When enabled, this option allows any incoming VPN traffic in a zonesession, regardless of the origin for the original VPN tunnel. For exacan match a session created by traffic for VPN B. This feature allowbetween two or more sites when there are multiple possible paths foNote: It is not advisable to mix policy-based and route-based VPNs

block Imposes intra-zone traffic blocking.

Page 704: netscreen_CLI

“pppoa” through “zone”

688

, with VLAN ID number 1:

ntrust as the out zone:

e in Transparent Mode). The ID he name you specify (zone) must

identifies the tunnel-out zone

TTP and FTP traffic that arrives at . With this option enabled, the ker has deliberately broken into

also improves application layer mine the complete text within

NetScreen CLI Reference Guide

name

set zone name zone { ... }

Examples: The following command creates a new Layer-2 zone named L2-Sales

set zone name L2-Sales L2 1

The following command creates a tunnel zone named Engineering, and specify u

set zone name Engineering tunnel untrust

reassembly-for-alg

set zone untrust reassembly-for-alg

name Creates a new zone with name zone.

• L2 id_num specifies that the zone is Layer-2 (for running the devicnumber (id_num) identifies the VLAN to which the zone is bound. Tbegin with “L2-”.

• tunnel zone specifies that the new zone is a VPN tunnel zone, and(zone).

reassembly-for-alg Reassembles all fragmented IP packets and TCP segments for Hany interface bound to the zone on which you enable this optionNetScreen device can better detect malicious URLs that an attacpacket or segment fragments. Packet and segment reassembly gateway (ALG) filtering by allowing the NetScreen device to exapayloads.

Page 705: netscreen_CLI

“pppoa” through “zone”

689

k, but does not block the attack. our network that you have sentially a decoy network with

of the following components:

n (a Trojan Horse) on a protected ble the blocking of HTTP

device blocks them all. specified components.locks packets containing Java ithin an ActiveX control.

kets that have them.

ontrol Message Protocol (ICMP) cast with the purpose of flooding a ut and is disconnected. The to ping the same destination . The range is 1 to 1,000,000.

Fragments flag set, or with an

NetScreen CLI Reference Guide

screen

set zone zone screen { ... }set zone zone screen { ... }

screen Enables or disables firewall services through the interface.

• alarm-without-drop Generates an alarm when detecting an attacThis option is useful if you allow the attack to enter a segment of ypreviously prepared to receive it—such as a honeynet, which is esextensive monitoring capabilities.

• block-frag Enables IP packet fragmentation blocking.

• component-block Selectively blocks HTTP traffic containing any

- activex ActiveX controls

- java Java applets

- exe .EXE files

- zip ZIP files

An attacker can use any of these components to load an applicatiohost, then use the application to gain control of the host. If you enacomponents without specifying which components, the NetScreenAlternatively, you can configure the NetScreen device to block onlyNote: If you enable ActiveX-blocking, the NetScreen device also bapplets, .exe files, and .zip files because they might be contained w

• fin-no-ack Detects an illegal combination of flags, and rejects pac

• icmp-flood [ threshold number ] Detects and prevents Internet Cfloods. An ICMP flood occurs when ICMP echo requests are broadsystem with so much data that it first slows down, and then times othreshold defines the number of ICMP packets per second allowedaddress before the NetScreen device rejects further ICMP packets

• icmp-fragment Detects and drops any ICMP frame with the Moreoffset indicated in the offset field.

Page 706: netscreen_CLI

“pppoa” through “zone”

690

reater the 1024.

rmatted IP option in the IP packet ounters list for the ingress

ption enabled. The Source Route network, and receive returned . The administrator can block all IP rce Routing) enabled.

e Source Routing) and records the tion specifies a partial route list for ket must proceed in the order of in between those specified.

Route) and records the event in

) and records the event in the

NetScreen CLI Reference Guide

• icmp-large Detects and drops any ICMP frame with an IP length g

• ip-bad-option Detects and drops any packet with an incorrectly foheader. The NetScreen device records the event in the SCREEN cinterface.

• ip-filter-src Detects and drops all packets with the Source Route OOption can allow an attacker to use a false IP address to access atraffic addressed to the real IP address of the attacker’s host deviceSource Routed frames having Strict Source Routing (or Loose Sou

• ip-loose-src-route Detects packets where the IP option is 3 (Loosevent in the SCREEN counters list for the ingress interface. This opa packet to take on its journey from source to destination. The pacaddresses specified, but it is allowed to pass through other routers

• ip-record-route Detects packets where the IP option is 7 (Recordthe SCREEN counters list for the ingress interface.

• ip-security-opt Detects packets where the IP option is 2 (securitySCREEN counters list for the ingress interface.

Page 707: netscreen_CLI

“pppoa” through “zone”

691

en unauthorized agents attempt to g the ip-spoofing option

rop any packet with a source vice drops the packet if it does not -routable, as with 127.0.0.1). contains a reverse path

. For example, the device drops an ives the packet on ethernet1, and

.5.1.0/24) on that interface. This is

oofing decisions on zones, instead continue when the device e zone. Thus, the user can specify Note: The default behavior is to fault behavior, execute the

) and records the event in the

t Source Routing) and records the ption specifies the complete route he last address in the list replaces

ttack. An IP Sweep attack occurs stination addresses. If a target an set the IP Sweep threshold to a creen device receives 10 ICMP k, and rejects the 11th and all d.

s option 4 (Internet Timestamp) interface.

NetScreen CLI Reference Guide

• ip-spoofing Prevents spoofing attacks. Spoofing attacks occur whbypass firewall security by imitating valid client IP addresses. Usininvalidates such false source IP address connections.

The drop-no-rpf-route option instructs the NetScreen device to daddress that is not contained in the route table. For example, the decontain a source route, or if the source IP address is reserved (nonConversely, the device does not drop the packet if the routing tableforwarding route that matches the source IP address on the packetincoming packet with source IP address 10.5.1.5, if the device recethere is no reverse path route for 10.5.1.5 (such as 0.0.0.0/0 or 10true even if such a reverse path exists on another interface.The zone-based option instructs the NetScreen device to base spof on individual interfaces. Enabling this setting allows sessions to asymmetrically routes traffic between multiple interfaces in the samspoofing decisions based on either the zone or an exact interface. base spoofing decisions on individual interfaces. To restore the defollowing command:unset zone zone screen ip-spoofing zone-based

• ip-stream-opt Detects packets where the IP option is 8 (Stream IDSCREEN counters list for the ingress interface.

• ip-strict-src-route Detects packets where the IP option is 9 (Stricevent in the SCREEN counters list for the ingress interface. This olist for a packet to take on its journey from source to destination. Tthe address in the destination field.

• ip-sweep threshold number Detects and prevents an IP Sweep awhen an attacker sends ICMP echo requests (pings) to multiple dehost replies, it reveals the target’s IP address to the attacker. You cvalue between 1 and 1,000,000 microseconds. Each time the NetSecho requests within this interval, it flags this as an IP Sweep attacfurther ICMP packets from that host for the remainder of the secon

• ip-timestamp-opt Detects packets where the IP option list includeand records the event in the SCREEN counters list for the ingress

Page 708: netscreen_CLI

“pppoa” through “zone”

692

echanism with IP spoofing packets with headers containing esses. The attacker sends these e target to create empty sessions

number ] Limits the number of address, or the number of , the limit is 128 sessions. Limit

t scans HTTP packets for suspect s. The code-red switch enables orks as follows.

acket. Typically, this starting ast one space, plus the beginning en the command “GET” and the

-LF.

ackets. Although the TCP/IP ations allow larger packet sizes. shing, freezing, and restarting.

an attack occurs when an attacker s. The attack succeeds if a port gs the number of different ports t scans 10 ports in 0.005 seconds e NetScreen device flags this as a . The port-scan threshold number

1,000,000 microseconds.

attach occurs when the attacker to terminate. This consumes all

NetScreen CLI Reference Guide

• land Prevents Land attacks by combining the SYN flood defense mprotection. Land attacks occur when an attacker sends spoofed IPthe target’s IP address for both the source and destination IP addrpackets with the SYN flag set to any available port. This induces thwith itself, filling its session table and overwhelming its resources.

• limit-session [ source-ip-based number | destination-ip-based concurrent sessions the device can initiate from a single source IPsessions it can direct to a single destination IP address. By defaultvalue range is 1 to 49,999.

• mal-URL [ name_str id_str number | code-red ] Sets up a filter thaURLs. The NetScreen device drops packets that contain such URLblocking of the Code Red worm virus. Using the name_str option w

- name_str A user-defined identification name.

- id_str Specifies the starting pattern to search for in the HTTP ppattern begins with the HTTP command GET, followed by at leof a URL. (The NetScreen device treats multiple spaces betwecharacter “/” at the start of the URL as a single space.)

- number Specifies a minimum length for the URL before the CR

• ping-of-death Detects and rejects oversized and irregular ICMP pspecification requires a specific packet size, many ping implementThis can trigger a range of adverse system reactions including cra

• port-scan threshold number Prevents port scan attacks. A port scsends packets with different port numbers to scan available serviceresponds. To prevent this attack, the NetScreen device internally loscanned from a single remote source. For example, if a remote hos(equivalent to 5000 microseconds, the default threshold setting), thport scan attack, and rejects further packets from the remote sourcevalue determines the threshold setting, which can be from 1000 to

• syn-ack-ack-proxy Prevents the SYN ACK ACK attack. Such an establishes multiple Telnet sessions without allowing each sessionopen slots, generating a Denial of Service condition.

Page 709: netscreen_CLI

“pppoa” through “zone”

693

consume sessions on the target

ccur when the connecting host esponding ACK responses.

proxy connections per second at og.

per second required to trigger the

egments received per second for a ins dropping connection requests u might want to set a threshold tion port number.

n destination MAC addresses.

quests held in the proxy ction requests.

ents received per second from a ess and port number) before the at source.

half-completed connection is nds.

gments used for the attack. A SYN The host caches these fragments, them. By flooding a server or host fer eventually fills. No further em can occur.

s field.

n fragmented IP packets overlap . The tear-drop option directs the y.

NetScreen CLI Reference Guide

• syn-fin Detects an illegal combination of flags attackers can use todevice, thus resulting in a denial of service.

• syn-flood Detects and prevents SYN flood attacks. Such attacks ocontinuously sends TCP SYN requests without replying to the corr

- alarm-threshold number Defines the number of half-completewhich the NetScreen device makes entries in the event alarm l

- attack_threshold number Defines the number of SYN packetsSYN proxy mechanism.

- destination-threshold number Specifies the number of SYN ssingle destination IP address before the NetScreen device begto that destination. If a protected host runs multiple services, yobased on destination IP address only-regardless of the destina

- drop-unknown-mac Drops packets when they contain unknow

- queue-size number Defines the number of proxy connection reconnection queue before the system starts rejecting new conne

- source-threshold number Specifies the number of SYN segmsingle source IP address (regardless of the destination IP addrNetScreen device begins dropping connection requests from th

- timeout number Defines the maximum length of time before a dropped from the queue. You can set it between 1 and 50 seco

• syn-frag Detects a SYN fragment attack, and drops any packet frafragment attack floods the target host with SYN packet fragments. waiting for the remaining fragments to arrive so it can reassemble with connections that cannot be completed, the host’s memory bufconnections are possible, and damage to the host’s operating syst

• tcp-no-flag Drops an illegal packet with missing or malformed flag

• tear-drop Blocks the Teardrop attack. Teardrop attacks occur wheand cause the host attempting to reassemble the packets to crashNetScreen device to drop any packets that have such a discrepanc

Page 710: netscreen_CLI

“pppoa” through “zone”

694

the trust zone:

one, and instructs the device to IP address:

he code-red Code Red worm

ffic received on interfaces

the Trust and Untrust zones to

0

er sends UDP packets to slow nnection requests. The threshold the same destination IP within any one-second period, the ets for the remainder of that

umbers greater than 135. Such

odifies the packet as necessary, y in the event alarm log.)

NetScreen CLI Reference Guide

Example 1: The following command enables the ip-spoofing firewall service for

set zone trust screen ip-spoofing

The following command enables the ip-spoofing firewall service for the untrust zdrop any packet that has no source IP address, or that has a non-routable source

set zone untrust screen ip-spoofing drop-no-rpf-route

Example 2: The following command sets up a filter that scans HTTP packets for tvirus and drops such packets.

set zone untrust screen mal-url code-red

Example 3: The following commands block ActiveX and Java applets in HTTP trabound to the Untrust zone:

set zone untrust block-component activexset zone untrust block-component java

Example 4: The following commands limit the number of sessions from any host inany single IP address to 80 sessions:

set zone trust screen limit-session destination-ip-based 80set zone trust screen limit-sessionset zone untrust screen limit-session destination-ip-based 8set zone untrust screen limit-session

• udp-flood threshold number UDP flooding occurs when an attackdown the system to the point that it can no longer process valid conumber parameter is the number of packets allowed per second toaddress/port pair. When the number of packets exceeds this valueNetScreen device generates an alarm and drops subsequent packsecond. The valid range is from 1 to 1,000,000.

• unknown-protocol Discards all received IP frames with protocol nprotocol numbers are undefined or reserved.

• winnuke Detects attacks on Windows NetBios communications, mand passes it on. (Each WinNuke attack triggers an attack log entr

Page 711: netscreen_CLI

“pppoa” through “zone”

695

en it receives non-sync packets.

NetScreen CLI Reference Guide

tcp-rstset zone zone tcp-rstunset zone zone tcp-rst

vrouterset zone zone vrouter

Creating Interfaces

Example: The following commands:

• Create a new Layer-2 zone named L2-Marketing with VLAN ID number 1

• Assign physical interface ethernet7 to the zone

• Retrieve zone information:

set zone name L2-Marketing L2 1set interface ethernet7 zone L2-Marketing

Example: The following commands:

• Create a new Layer-3 zone named Ext_Dept

• Bind the zone to the untrust-vr virtual router

• Enable ip-spoofing and tear-drop screening

• Bind interface ethernet4 to the zone:

set zone name Ext_Deptset zone Ext_Dept vrouter untrust-vrset zone Ext_Dept screen ip-spoofingset zone Ext_Dept screen tear-dropset interface ethernet4 zone Ext_Dept

tcp-rst Directs the NetScreen device to send back the TCP reset packet wh

vrouter Binds the zone to a virtual router.

Page 712: netscreen_CLI

“pppoa” through “zone”

696

NetScreen CLI Reference Guide
Page 713: netscreen_CLI

A

A-I

h physical interfaces or logical

ual circuit. You can configure ort additional virtual circuits.

physical interfaces. An ad sharing and failover.

e port n and no slots.

erface slot (n1) and a port (n2).

ile the NetScreen device is in

ce on the NetScreen device. A ice on which it resides is up.

ysical interfaces (each denoted

port (n1) with no slots. The .n2 erfaces using the set interface

ce slot (n1) and a port (n2). The l interfaces using the set

NetScreen CLI Reference Guide

Appendix A

Interface NamesMost security zones exchange traffic with other zones (or with other devices) througsub-interfaces. The interface names are as follows.

ADSL interface • adsl1 is the main ADSL interface on which you configure a virtsubinterfaces to adsl1, such as adsl1.1, adsl1.2, etc., to supp

Aggregate interfaces • aggregaten An aggregate interface, which is a grouping of twoaggregate interface provides interface redundancy, allowing lo

Ethernet interfaces • ethernetn A physical ethernet interface, denoted by an interfac

• ethernetn1/n2 A physical ethernet interface, denoted by an int

Function interfaces • mgt An interface bound to the MGT zone.

• ha | ha1 | ha2 The name of the dedicated HA port.

Layer-2 interface • vlan1 The interface used for VPNs and management traffic whTransparent mode.

Loopback interfaces • loopback.n A logical interface that emulates a physical interfaloopback interface is always in the up state as long as the dev

Redundant interfaces • redundantn1 A redundant interface, which is a grouping of phby n1). Redundant interfaces perform interface failover.

• redundantn1.n2 A logical redundant sub-interface.

Sub-interfaces • ethernetn1.n2 A logical sub-interface, denoted by an interfaceparameter identifies the logical interface. You create logical intcommand.

• ethernetn1/n2.n3 A logical sub-interface, denoted by an interfa.n3 parameter identifies the logical interface. You create logicainterface command.

Page 714: netscreen_CLI

Appendix A Interface Names

A-II

NetScreen CLI Reference Guide

Tunnel interfaces • tunnel.n A tunnel interface, used for VPN traffic.

Page 715: netscreen_CLI

B

B-I

s, tunnels, and special-purpose te new zones and configure ity zones are as follows.

een device operates in

that communicate with trusted

ces that communicate with

ce.

reate such zones using the set

een device operates in NAT

gical sub-interfaces) that

nd logical sub-interfaces) that

apped IP (MIP) and virtual IP mapped to other addresses, the

.

reate such zones using the set

NetScreen CLI Reference Guide

Appendix B

Zone NamesJuniper Networks NetScreen devices use zones to host physical and logical interfaceitems. Although ScreenOS has a number of default predefined zones, you can creathem to meet the requirements of your organization. The names of ScreenOS secur

Layer-2 security zones Use Layer-2 security zones when the Juniper Networks NetScrTransparent mode.

• v1-trust The V1-Trust zone, which hosts physical interfaces network space.

• v1-untrust The V1-Untrust zone, which hosts physical interfauntrusted network space.

• v1-dmz The DMZ zone, which hosts the DMZ physical interfa

• name name_str A user-defined Layer-2 security zone. (You czone name name_str L2 command.)

Layer-3 security zones Use Layer-3 security zones when the Juniper Networks NetScrmode or Router mode.

• trust The Trust zone, which hosts physical interfaces (and locommunicate with trusted network space.

• untrust The Untrust zone, which hosts physical interfaces (acommunicate with untrusted network space.

• global The Global zone, which serves as a storage area for m(VIP) addresses. Because traffic going to these addresses is Global zone does not require an interface.

• dmz The DMZ zone, which hosts the DMZ physical interface

• name name_str A user-defined Layer-2 security zone. (You czone name name_str command.)

Page 716: netscreen_CLI

Appendix B Zone Names

B-II

ecurity devices.

.

zones using the set zone name

y interfaces that are not

gement connections. For en device via HTTP, SCS, or

HA1 and HA2.

nt interface, MGT.

NetScreen CLI Reference Guide

Tunnel zones Use tunnel zones to set up VPN tunnels with other NetScreen s

• untrust-tun The Untrust-Tun zone, which hosts VPN tunnels

• name name_str A user-defined tunnel zone. You create such name_str tunnel command.

Function zones Use function zones as described below.

• null The Null zone, which serves as temporary storage for ancurrently bound to another zone.

• self The Self zone, which hosts the interface for remote manaexample, when you connect to the Juniper Networks NetScreTelnet, you connect to the Self zone.

• ha The HA zone, which hosts the high-availability interfaces,

• mgt The MGT zone, which hosts the out-of-band manageme

Page 717: netscreen_CLI

C

C-I

atforms. However, some nds described in this manual,

500 NS-2000 NS-5000

o No No

No

o No

o

NetScreen CLI Reference Guide

Appendix C

Command AvailabilityMost CLI commands are available across all Juniper Networks NetScreen device plplatforms do not support certain commands. The following table lists the CLI commaand shows which platforms do not support them.

Command NS-5XP NS-5XT NS-5GT NS-25 NS-50 NS-200 NS-

active-user No No No No No N

address

admin

alarm

alias

all

arp

attack No

attack-db No

audible-alarm No No No No No No

auth

auth-server

av No No N

bgp No

chassis No No No No No No N

clock

common-criteria

Page 718: netscreen_CLI

Appendix C Command Availability

C-II

o No

500 NS-2000 NS-5000

NetScreen CLI Reference Guide

config

console

counter

delete

di No

dip

dns

domain

downgrade No

envar

event

exit

failover No No No No N

file

firewall

flow

gate

group

group-expression

hostname

ike

ike-cookie

interface

Command NS-5XP NS-5XT NS-5GT NS-25 NS-50 NS-200 NS-

Page 719: netscreen_CLI

Appendix C Command Availability

C-III

No

o

o No

500 NS-2000 NS-5000

NetScreen CLI Reference Guide

ip

ip-classification No No No No No

ippool

l2tp

lcd No No No No No No

led No No No

license-key

log

mac

mac-learn

memory

mip

mirror No No No No No No N

modem No No No No N

nrtp

nsmgmt

nsrp No

ntp

os

ospf No

performance

ping

pki

Command NS-5XP NS-5XT NS-5GT NS-25 NS-50 NS-200 NS-

Page 720: netscreen_CLI

Appendix C Command Availability

C-IV

o No

No

o No

500 NS-2000 NS-5000

NetScreen CLI Reference Guide

policy

port-mode No No No No N

pppoe No

proxy-id

reset

rip

route

sa

sa-filter

sa-statistics

save

scheduler

scp

service

session

sip

snmp

socket

ssh

ssl

sys_clock No No No No No N

syslog

system

Command NS-5XP NS-5XT NS-5GT NS-25 NS-50 NS-200 NS-

Page 721: netscreen_CLI

Appendix C Command Availability

C-V

No

No

o No

500 NS-2000 NS-5000

NetScreen CLI Reference Guide

tech-support

temperature-threshold No No No No No No

tftp

timer

trace-route

traffic-shaping No

url

user

user-group

vip

vpn

vpn-group

vpnmonitor

vrouter

vsys No No No No No No

vwire No No No No No No N

webauth

webtrends

xauth

zone

Command NS-5XP NS-5XT NS-5GT NS-25 NS-50 NS-200 NS-

Page 722: netscreen_CLI

Appendix C Command Availability

C-VI

NetScreen CLI Reference Guide