561
Troubleshooting and problem solving
Troubleshooting utilities
Using the FTP client
The FTP client lets you FTP from the security gateway to other machines. Because the security
gateway blocks all incoming traffic by default, you must use passive-mode FTP to retrieve files (so that
the FTP data connection is initiated by the security gateway machine, not the FTP server). Since
Microsoft's FTP client on Microsoft Windows XP does not do passive-mode FTP, the FTP client
provides that capability.
To use the FTP client
1
Ensure you are in the \bin directory when you FTP.
2
Use script files to FTP log files off the security gateway at regular intervals. For instance, the type
the following command:
ftp -v -n < script.ftp
This would make FTP read the script, where script.ftp contains:
open <IP address> user <user name> <password>
put or send command with filename
About listlicense
The listlicense utility displays the names or addresses of systems that are holding user licenses and are
being counted for licensing purposes. Each system listed (one per line) has either client
or server after
it.
If a system has client listed after it, it initiated a connection. If a system has server listed after it, it was
the destination of a connection.
Every connection through the security gateway involves a computer holding a license. The initiator of
the connections needs this license if it is connected to an inside interface of the security gateway.
Otherwise, the recipient needs the license.
Note:
You cannot use this tool on security gateway with unlimited licenses.
Listlicense can be found on the security gateway in the usr/raptor/bin/ directory.
-b
For binary files, translate into text without any further parsing.
-i
Ignored unless -b is used. Print out sequence number, class and tag ID for each message.
-f
Follow output. (Binary files, default interval 2s).
-u
Follow update interval in seconds. (Implies -f).
-t
Tail the last n log messages.
-o
Start at the nth log message. Meaningless if used with a text file, and ignored if -t is used.
-a
Displays International Domain Names (IDNs) as ASCII Compatible Encoding (ACE).
-O
Start at the first message of the given time (format =hh:mm:ss). Meaningless if used with a text file, and
ignored if -t is used.
If sequence numbers are printed out, the nth log message has sequence number n - 1.
-x
Next argument specifies path to XML dictionary files. (Case sensitive)
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...