3
Performing the Initial Configuration
44
Check Point IP2450 Security Platform Installation Guide
Using the Command-Line Interface
You can also use the Check Point IPSO command-line interface (CLI) to manage and configure
Check Point IP security appliances from the command line. Nearly everything that you can
accomplish with Check Point Network Voyager you can also do with the CLI.
To access the command-line interface
1.
Log on to the appliance by using a command-line connection (SSH, console, or Telnet) over
a TCP/IP network as an admin, cadmin, or monitor user:
If you log in as a cadmin (cluster administrator) user, you can change and view
configuration settings on all the cluster nodes. For information about how to administer a
cluster, see the traffic management commands section in the
CLI Reference Guide
for the
version of Check Point IPSO you are using.
2.
If you log in as a monitor user, you can execute only the show form of commands. That is,
you can view configuration settings, but you cannot change them.
You can now execute CLI commands from the CLI shell and the Check Point IPSO shell. The
Check Point IPSO shell is what you see when you initially log on to the appliance.
For more information about how to access and use the CLI, see the
CLI Reference Guide
for the
version of Check Point IPSO you are using.
Using Check Point Horizon Manager
Check Point Horizon Manager is an extension of the Check Point Network Voyager
management functionality.
While Check Point Network Voyager provides the device administrator access to network
configuration tasks (such as interface configuration and routing configuration) and security
configuration tasks (such as user configuration and access configuration), Check Point Horizon
Execute from
To Implement
Purpose
Check Point IPSO
command line
Enter the following command to invoke
the CLI shell:
clish
The prompt changes, and you can then
enter CLI commands.
Enter any CLI commands in an
interactive mode with help text and
other helpful CLI features.
Check Point IPSO
command line
Enter
clish -c “
cli-command
”
Execute a single CLI command. You
must place double-quotation marks
around the CLI command.
Command files
From inside the CLI shell, enter
load
commands
filename
Load commands from a text file that
contains commands. The argument
must be the name of a regular file.
Summary of Contents for Check Point IP2450
Page 6: ...6 Check Point IP2450 Security Platform Installation Guide ...
Page 8: ...8 Check Point IP2450 Security Platform Installation Guide ...
Page 10: ...10 Check Point IP2450 Security Platform Installation Guide ...
Page 14: ...2 About this Guide 14 Check Point IP2450 Security Platform Installation Guide ...
Page 128: ...A Technical Specifications 128 Check Point IP2450 Security Platform Installation Guide ...
Page 132: ...B Compliance Information 132 Check Point IP2450 Security Platform Installation Guide ...
Page 136: ...Index 136 Check Point IP2450 Security Platform Installation Guide ...