3
Performing the Initial Configuration
44
Check Point IP1280 Security Platform Installation Guide
Using the Command-Line Interface
You can also use the Check Point IPSO command-line interface (CLI) to manage and configure
Check Point IP security appliances from the command line. Nearly everything that you can
accomplish with Check Point Network Voyager you can also do with the CLI.
To access the command-line interface
1.
Log on to the appliance by using a command-line connection (SSH, console, or Telnet) over
a TCP/IP network as an admin, cadmin, or monitor user:
If you log in as a cadmin (cluster administrator) user, you can change and view
configuration settings on all the cluster nodes. For information about how to administer a
cluster, see the traffic management commands section in the
CLI Reference Guide
for the
version of Check Point IPSO you are using.
2.
If you log in as a monitor user, you can execute only the show form of commands. That is,
you can view configuration settings, but you cannot change them.
You can now execute CLI commands from the CLI shell and the Check Point IPSO shell. The
Check Point IPSO shell is what you see when you initially log on to the appliance.
For more information about how to access and use the CLI, see the
CLI Reference Guide
for the
version of Check Point IPSO you are using.
Using Check Point Horizon Manager
Check Point Horizon Manager is an extension of the Check Point Network Voyager
management functionality.
While Check Point Network Voyager provides the device administrator access to network
configuration tasks (such as interface configuration and routing configuration) and security
Execute from
To Implement
Purpose
Check Point
IPSO command
line
Enter the following command
to invoke the CLI shell:
clish
The prompt changes, and you
can then enter CLI commands.
Enter any CLI commands in an
interactive mode with help text
and other helpful CLI features.
Check Point
IPSO command
line
Enter
clish -c
“
cli-command
”
Execute a single CLI
command. You must place
double-quotation marks
around the CLI command.
Command files
From inside the CLI shell, enter
load commands
filename
Load commands from a text
file that contains commands.
The argument must be the
name of a regular file.
Содержание IP1280
Страница 6: ...6 Check Point IP1280 Security Platform Installation Guide ...
Страница 8: ...8 Check Point IP1280 Security Platform Installation Guide ...
Страница 10: ...10 Check Point IP1280 Security Platform Installation Guide ...
Страница 14: ...2 14 Check Point IP1280 Security Platform Installation Guide ...
Страница 36: ...2 Installing the Check Point IP1280 Appliance 36 Check Point IP1280 Security Platform Installation Guide ...
Страница 46: ...3 Performing the Initial Configuration 46 Check Point IP1280 Security Platform Installation Guide ...
Страница 81: ...Configuring Check Point IPSO for IP1280 ADP Interfaces IP1280 Security Platform Installation Guide 81 ...
Страница 130: ...A Technical Specifications 130 Check Point IP1280 Security Platform Installation Guide ...
Страница 134: ...B Compliance Information 134 Check Point IP1280 Security Platform Installation Guide ...
Страница 138: ...Index 138 IP1280 Security Platform Installation Guide ...