cc/td/doc/product/aggr/vpn5000/5000sw/conc52x
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Introduction

Introduction

The Command Line Manager features text-based configuration and allows you to configure and manage the device and perform various network diagnostic functions.

Sessions can be established by directly attaching a terminal or a computer running terminal emulation software to the system Console port. This connection is at 9600 Baud, 8 bits, and no parity.

Sessions can also be established by connecting via telnet to an IP address of the device. See the Installation Guide for your device for more information.

Both methods of establishing a session require that the system passwords be entered before any commands can be entered.

The default passwords as shipped from the factory are letmein. It is strongly recommended that the password be changed using the General section. Once the passwords are set, the same passwords are used by VPN 5000 Manager.

Modes of Operation

There are two modes of operation in the Command Line interface, enabled and normal modes.

All operations that do not modify the system configuration or display critical (security related) information are permitted in normal mode. This mode of operation is protected by the password. In normal mode, the command prompt ends in a ">".

enabled mode is protected with the enable password. If no enable password has been configured, then the regular password will be used. There are two ways to enter enabled mode. If a privileged command is entered, the user will be prompted for the enable password, and if successful, the user will be in enabled mode. The other way is to use the enable command (see enable, disable). The command prompt for enabled mode ends with a "#". If there is no activity for 5 minutes, enabled mode will time out.

Types of Commands

There are two basic types of commands, configuration commands and management commands.


Note   Some of the commands described in this manual may not exist on every system. Some of the commands are hardware-specific; if the hardware platform has no WAN interfaces, commands that are WAN-specific will not exist. Other commands are related to software features such as bridging that may not be available with all releases.

Table 1 and Table 2 show how the commands and configuration sections are grouped within this manual.

The following table lists configuration comamnds. A text-based configuration is a collection of section headings followed by keywords or other data which define device settings. The configuration commands allow you to edit, create and manage these sections.


Table 1: Configuration Commands
Command Sections

configure

This command enters the configuration editor which allows you to add or modify configuration variables using keyword and value pairs and ensures that they are syntactically correct. As an added benefit, within the configuration editor, all of the management commands are still available. The following sections are configured using the configure command:

AppleTalk
Bridging
Bridging Global
Certificates
Command Line
Domain Name Server
DS3 Interface
Ethernet Interface
Frame Relay
General
HSSI Interface
IKE Policy
IP Protocol Precedence
IP Route Redistribution
IP

IPX
Link Config
Logging
NAT Global
OSPF Area
OSPF Virtual Link
PPP
Radius
SecurID
SMDS
SNMP
SNMP CommunityString
SNMP Trap
Time Server
Tunnel Partner
VPN Group Config

edit config

This two-word command allows you to create and manage complex lists such as filter rules. These special sections do not have keyword and value pairs. The edit config command can also be used as a line editor for the entire configuration. The list that follows includes sections which are configured using the edit config command. Some of these sections can also be configured using the edit command (see the edit section under Management Commands).

AppleTalk Filter
Auth
IP Filter
IP Route Filter
IP Static

IPX Filter
IPX Route Filter
IPX SAP Filter
NAT Mapping
VPN Users

The following table lists management commands, which allow you to perform a variety of diagnostic and management operations.


Table 2: Management Commands
Management Commands Description
Miscellaneous

Miscellaneous management commands.

  apply

Applies the configuration without restarting

  boot

Restarts the device

  edit filter

Creates and edit protocol filter sections

  enable, disable

Enables or disables privileged commands

  exit

Exits the command loop parser

  help

Displays context-sensitive online help info

  interface

Sets current interface

  ipxping

Pings a remote machine over ipx

  ospfenable

Enables OSPF

  ping

Pings a remote machine

  save

Saves the edited configuration

  sys

Various system related commands

  tftp

Allows TFTP connections

  traceroute

Route tracing to remote machine

  vpn tunnel

Establishes or tears down a LAN-to-LAN tunnel.

  write

Writes the configuration to Flash memory

add

Runtime commands to add IP entries.

  add ip arp

Adds a static IP ARP cache entry

  add ip route

Adds a static IP route

certificate

Commands to import and manage certificates.

  certificate generate

Creates a root or server certificate, or a certificate request

  certificate import

Imports a certificate

  certificate remove

Removes all certificates

  certificate request

Approves or deny a certificate request

  certificate verify

Checks that the server certificate is valid

reset

Commands to delete items from tables and simple lists, and commands to manage configurations and statistics kept by the system.

  reset appletalk

Resets AppleTalk statistics and tables

  reset arp

Deletes ARP table entries

  reset config

Restores flash configuration deleting any changes

  reset ip

Resets IP statistics and tables

  reset ipx

Delete sentries from IPX tables

  reset ospf nbr

Resets OSPF adjacency with a neighbor

  reset resevent

Clears restart event information

  reset securid

Resets SecurID secret

  reset statistics

Resets statistics

set

Commands to set certain runtime configuration parameters.

  set bridge

Sets bridge configuration parameters

  set ppp

Sets PPP protocol settings

  set smds

Enables or disables SMDS keepalive

  set system

Sets system parameters

  set terminal

Sets Terminal parameters

  set wan

Sets WAN and AUX port hardware parameters

show

Commands to display tables and configuration parameters.

  show all

Completes configuration

  show appletalk

Shows AppleTalk configuration, status and statistics

  show arp

Shows the ARP table

  show bridge

Shows bridge configuration, status and statistics

  show certificate

Shows certificate text or details

  show config

Shows device configuration

  show ethernet

Shows Ethernet information

  show frelay

Shows Frame Relay configuration and statistics

  show history

Shows command history

  show ip

Shows IP configuration and statistics

  show iprouting

Shows runtime IP route filters

  show ipx

Shows IPX configuration and routing

  show ipxrouting

Shows runtime IPX route filters

  show ipxsap

Shows runtime IPX SAP filters

  show nat

Shows NAT configuration and statistics

  show os

Shows operating system information

  show ospf

Shows OSPF configuration and statistics

  show ppp

Shows PPP information

  show radius

Shows RADIUS configuration and statistics

  show routing

Shows routing tables

  show securid

Shows SecurID statistics and servers

  show smds

Shows SMDS configuration and statistics

  show statistics

Shows statistics

  show system

Shows general system information

  show version

Shows general device information

  show vpn

Shows VPN configuration and statistics

  show wan

Shows WAN port information

Modifying Configurations

Configuration modification is a privileged operation that requires the user to be in enabled mode. After a command modifies a configuration, subsequent command prompts will be preceded by a star (*).

Most commands that modify configurations only modify a local configuration buffer which must be saved using the save command. The effects of the few commands which can modify a runtime system configuration will only be remembered until the system is restarted. There are some runtime commands which do not have equivalent permanent configurations.

Because there is only one configuration buffer for the system, only one person can modify a configuration at any time. The second person who tries will get a message letting them know this and they will not be able to edit. If a telnet session is disconnected, it is possible to attach to the modified configuration using the sys attach command.

Configuration Sections

All sections are uniquely identified by their section name. All section names begin with a fixed string. However, some section names also have variable portions.

The sections which expect names require a character string to uniquely identify the object being defined in that section. The name must be between one and 16 alphanumeric characters, including any spaces. If the name includes spaces or special characters, it must be enclosed in quotes (""). Section names are not case-specific.

Within the device's configuration, a complete section name, including the variable portion, must be unique. Duplicate section names are ignored by the device and only the first occurrence is used.

There are three types of sections: port-specific sections, general sections, and special sections.

Port-Specific Sections

Port-specific sections of the device's configuration are used to configure parameters for a specific interface (e.g., WAN 0, Ethernet 0, STEP 0, etc.) or type of interface if using the device's hierarchical parsing capabilities (e.g., WAN, Ethernet, STEP, AppleTalk, etc.). For more information on hierarchical parsing, see Appendix , "Default Sections and Default Values." If the device is a multislot product, both the slot number and the interface number must be given, separated by a colon (e.g., Ethernet 0:0 indicates Slot 0, Ethernet 0, while Ethernet 0:1 indicates Slot 0, Ethernet 1). If no slot number is indicated, then Slot 0 is assumed.

All port-specific sections require you to identify the port as part of the section name. The data in port-specific sections is made up of keyword and value pairs. The device uses hierarchical parsing.

General Sections

General sections of the device's configuration are also collections of keyword and value pairs, but they differ from port-specific sections in that they do not configure a port and there is no hierarchical parsing of sections. The settings in general sections are usually global to the device.

Special Sections

Special sections of the device's configuration are different from the other two types of sections in that they have no keyword and value pairs. These sections are configured using the edit config command instead of the configure command. The data portion of a special section is unique to each section type. The manual page for each of these sections describes the syntax of the data in the section and its usage. Special sections generally are filter lists or other databases that don't lend themselves to the constraints of the keyword and value pairs.

Keywords

Each manual page of a port-specific or general section contains a brief description of the section as a whole, followed by a list of all of the keywords that are valid in that section.

The keywords are paired up with a value, usually on a single line of the configuration. Some keywords want specific values (i.e., labels); others want arbitrary text strings as values. Keywords are separated from their values by an equal sign (=).

Keyword = Some Value
 

On each manual page describing keywords, the keyword is in bold and the type of value that it expects is listed. Arbitrary text strings are in italics.

IPAddress = IP_Address

The keyword and value pair is followed by a description of the keyword's function.

Saving a Configuration

Cisco Systems products use Flash ROM technology to store their operating software and configuration parameters. Flash ROMs can be rewritten tens of thousands of times and will maintain the information which has been written in them regardless of whether they are powered on or not.

Once a configuration is complete, the save command is needed to save the new or modified configuration from the configuration buffer to Flash ROM and restart the device to have the new configuration take effect.


Note   Turning off a device in the middle of a save/restart will cause it to lose its operating software. Please wait at least 5 minutes before deciding that the save command has failed.

Transferring Configurations to the Device

All devices support a secure TFTP mechanism to transfer configuration files to and from the device. TFTP is disabled on the device by default and must be enabled using the tftp command from a console or telnet session. Transfer configuration files to and from the device using an ASCII mode transfer.

It is also possible to create a text-based configuration file and use VPN 5000 Manager to transfer the file to and from the device. This method uses a secure transfer mechanism, preventing the configuration from being observed while it is in transit to the device. See the Cisco VPN 5000 Manager Software Reference Guide for more information.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Sep 27 10:23:38 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.