background image

CLI EAGLE 20

Release 5.0 08/2010

Technical Support

[email protected]

Reference Manual

Command Line Interface (CLI)
Industrial Ethernet Firewall

 

EAGLE

1

P

2

1

FAULT

LS/DA

2

1

k

STATUS

V.24

IP

-ADDRESS

V.24

R

EAGLE 20

USB

+24V (P1)

FA

UL

T

+24V (P2)

0V 0V

g

2

Aufkleber MAC-Adresse

1

P

2

1

FAULT

LS/DA

2

1

k

STATUS

V.24

IP

-ADDRESS

V.24

R

EAGLE 20

USB

+24V (P1)

FA

UL

T

+24V (P2)

0V 0V

g

2

Aufkleber MAC-Adresse

1

P

2

1

FAULT

LS/DA

2

1

k

STATUS

V.24

IP

-ADDRESS

V.24

R

EAGLE 20

USB

+24V (P1)

FA

UL

T

+24V (P2)

0V 0V

g

2

Aufkleber MAC-Adresse

1

P

2

1

FAULT

LS/DA

2

1

k

STATUS

V.24

IP

-ADDRESS

V.24

R

EAGLE 20

USB

+24V (P1)

FA

UL

T

+24V (P2)

0V 0V

g

2

Aufkleber MAC-Adresse

         Copyright (c) 2007-2010 Hirschmann Automation and Control GmbH

                             All rights reserved

                           EAGLE Release SDV-05.0.00

                         (Build date 2010-08-08 08:08)

                       System Name:  EAGLE20 Name

                       Netw. Mode :  transparent

                       Mgmt-IP    :  a.b.c.d

                       Base-MAC   :  00:11:22:33:44:55

                       System Time:  SUN AUG 08 08:08:08 2010

EXAMPLE

        EXAMPLE

                EXAMPLE

                EXAMPLE

NOTE: Enter '?' for Command Help.  Command help displays all options

      that are valid for the particular mode.

      For the syntax of a particular command form, please

      consult the documentation.

*(Hirschmann Eagle) >

Summary of Contents for EAGLE 20 Series

Page 1: ...24V P1 FAULT 24V P2 0V 0V g 2 Aufkleber MAC Adresse 1 P 2 1 FAULT LS DA 2 1 k STATUS V 24 IP ADDRESS V 24 R EAGLE 20 USB 24V P1 FAULT 24V P2 0V 0V g 2 Aufkleber MAC Adresse Copyright c 2007 2010 Hirs...

Page 2: ...tures described here are binding only if they have been expressly agreed when the contract was made This document was produced by Hirschmann Automation and Control GmbH according to the best of the co...

Page 3: ...e connection 10 2 2 CLI via SSH Secure Shell 10 2 3 CLI via the V 24 port 14 3 Using the CLI 17 3 1 Mode based command hierarchy 17 3 2 Executing commands 21 3 2 1 Syntax analysis 21 3 2 2 Command tre...

Page 4: ...4 CLI EAGLE 20 Release 5 0 08 2010...

Page 5: ...reference manual contains detailed information on using the Web interface to operate the individual functions of the device The Installation user manual contains a device description safety instruc ti...

Page 6: ...used in this manual have the following meanings X List Work step Subheading Link Indicates a cross reference with a stored link Note A note emphasizes an important fact or draws your attention to a de...

Page 7: ...as well as interfering network events such as overloads State on delivery On delivery the device works in the Transparent Mode In this mode no network settings e g for subnetworks are required for op...

Page 8: ...monitor via the V 24 interface out of band X Command Line Interface CLI via the V 24 connection out of band or via SSH in band X Web based interface via Ethernet in band 1 3 Command Line Interface The...

Page 9: ...ivided into the following areas X Authentication X Delete X Copy X Denial of Service X Device Status X Interface X Logging X NAT Network Address Translation X Network X Packet Filter X Profiles X Sign...

Page 10: ...manual Connect your Firewall with the network The network parameters must be set correctly for the connection to be successful You can access the user interface of the Command Line Interface with the...

Page 11: ...onnection type click on SSH under Connection type After selecting and setting all the required parameters you can set up the connection via SSH Click Open to set up the connection to your device Depen...

Page 12: ...erface in the SSH access dialog Note The OpenSSH Suite offers experienced network administrators a further op tion to access your device via SSH To set up the connection enter the fol lowing command s...

Page 13: ...levant product For your own security change the password during the first startup procedure Figure 4 Start screen of CLI Your Firewall appears with the input prompt Hirschmann Eagle Copyright c 2007 2...

Page 14: ...the housing of the device Figure 5 Pin assignment of the V 24 interface and wiring to the DB9 connector You will find a description of the V 24 interface in the User Manual Installation Connect the d...

Page 15: ...he Enter key You can change the user name and the password later in the Command Line Interface Please note that these entries are case sensitive The start screen appears Copyright c 2007 2010 Hirschma...

Page 16: ...to the CLI interface in modem mode you connect your terminal setting on terminal 9 600 baud to the V 24 interface Press any key on your terminal keyboard a number of times until the login screen indi...

Page 17: ...Hirschmann software commands The commands available to you as a user at a specific time depend on the mode in which you are currently working The commands of a specific mode are only available to you...

Page 18: ...oceed as a privileged user authenticated by the login From the Privileged Exec mode you can exe cute every Exec command Command prompt Hirschmann Eagle X Global Config mode This mode allows you to per...

Page 19: ...t Hirschmann Eagle exit Hirschmann Eagle Global Configura tion mode From the Privileged Exec mode you enter the command configure Hirschmann Eagle config ure Hirschmann Eagle con fig From the User Exe...

Page 20: ...exit Exit from current mode help Display help for various special keys history Show a list of previously run commands login Set login parameters logout Exit this session network Modify network parame...

Page 21: ...Exit from current mode flm Control the Firewall Learning Mode help Display help for various special keys history Show a list of previously run commands interface Configure the interface parameters ll...

Page 22: ...te the command with the Enter key After you have entered the command and all the required parameters all the other parameters entered are treated as optional parameters If one of the parameters is unk...

Page 23: ...another network You distinguish between IP addresses and MAC addresses The IP address is an address allocated by the network administrator Here it is important not to have duplicate addresses in one n...

Page 24: ...Hirschmann Eagle config signal contact monitor aca removal enable Enable the option disable default Disable the option signal contact monitor aca removal is the command name The parameter is required...

Page 25: ...chmann Eagle config Global Configuration mode Exclamation mark and asterisk Exclamation mark An exclamation mark in the first position of the input prompt shows you that the password for the user admi...

Page 26: ...er CTRL B Go backward one character CTRL D Delete current character CTRL U X Delete to beginning of line CTRL K Delete to end of line CTRL W Delete previous word CTRL P Go to previous line in history...

Page 27: ...rm any completion Only after one or more letters have been entered which uniquely identify the command or parameter does the system complete the command or parameter when Tab or Space is pressed again...

Page 28: ...ayed you get a list of the parameters available for the command show 3 3 4 Line length If you are using a terminal with a line length of 80 characters the help texts are split up as shown in the follo...

Page 29: ...b fa 0f df 3b 11 RSA Fingerprint for SSH 6d 40 06 c3 f8 2d cb 68 40 dc 09 7f b3 c2 d8 ee Access per Web HTTPS enabled Web Access port number HTTPS 443 SNMP version 1 disabled SNMP version 2 disabled S...

Page 30: ...db fa 0f df 3b 11 RSA Fingerprint for SSH 6d 40 06 c3 f8 2d cb 68 40 dc 09 7f b3 c2 d8 ee Access per Web HTTPS enabled Web Access port number HTTPS 443 SNMP version 1 disabled SNMP version 2 disabled...

Page 31: ...are in the User Exec mode see on page 17 Mode based command hierarchy Enter a question mark to get a list of the commands available in this mode see fig 9 The corresponding command is located in a dif...

Page 32: ...a question mark to display the additional branches of the command The login timeout ssh command is used to perform this task After login timeout ssh enter a question mark to display the possible param...

Page 33: ...erver Show DHCP Server parameters flm Show information about Firewall Learning Mode interfaces Show interface parameters lldp Show the LLDP information logging Display logging parameters login Show lo...

Page 34: ...racters Hirschmann Eagle show login Login parameters Access per SSH enabled SSH Access port number 22 DSA Fingerprint for SSH 0a 7f 06 05 27 35 53 dd f2 61 db fa 0f df 3b 11 RSA Fingerprint for SSH 6d...

Page 35: ...date 2010 08 08 08 08 System Name EAGLE 000000 Netw Mode transparent Mgmt IP a b c d Base MAC 00 11 22 33 44 55 System Time SUN AUG 08 08 08 08 2010 EXAMPLE EXAMPLE EXAMPLE EXAMPLE NOTE Enter for Comm...

Page 36: ...36 CLI EAGLE 20 Release 5 0 08 2010...

Page 37: ...N Network Management Software 5 O OpenSSH Suite 12 P Password 13 15 PPPoE Mode 8 Privileged Exec mode 18 PuTTY 10 R Router Mode 8 S Secure Shell 8 10 31 SSH 8 10 31 State on delivery 7 T Tab Completio...

Page 38: ...38 CLI EAGLE 20 Release 5 0 08 2010...

Page 39: ...In the long term excellent products alone do not guarantee a successful customer relationship Only comprehensive service makes a difference worldwide In the current global competition scenario the Hi...

Page 40: ......

Reviews: