CLI Jump Start
The following table provides quick start information for configuring the features of Palo Alto Networks devices from the CLI. Where applicable for firewalls with multiple virtual systems (vsys), the table also shows the location to configure shared settings and vsys-specific settings.
To configure...
|
Start here...
|
MGT interface
|
|
# set deviceconfig system ip-address
|
|
# set mgt-config users admin password
|
|
DNS
|
|
# set deviceconfig system dns-setting servers
|
|
NTP
|
|
# set deviceconfig system ntp-servers
|
|
Interfaces
|
|
# set network interface
|
|
System settings
|
|
# set deviceconfig system
|
|
Zones
|
|
# set zone <name>
# set vsys <name> zone <name>
|
|
Security Profiles
HIP Objects/Profiles URL Filtering Profiles
WildFire Analysis Profiles
|
|
# set profiles
# set vsys <name> profiles
# set shared profiles
|
|
Server Profiles
|
|
# set server-profile
# set vsys <name> server-profile
# set shared server-profile
|
|
Authentication Profiles
|
|
# set authentication-profile
# set vsys <name> authentication-profile
# set shared authentication-profile
|
|
PAN-OS CLI QUICK START | Use the CLI 39
© 2017 Palo Alto Networks, Inc.
To configure...
|
Start here...
|
Certificate Profiles
|
|
# set certificate-profile
# set vsys <name> certificate-profile
# set shared certificate-profile
|
|
Policy
|
|
# set rulebase
# set vsys vsys1 rulebase
|
|
Log Quotas
|
|
# set deviceconfig setting management
|
|
User-ID
|
|
# set user-id-agent
# set vsys <name> user-id-agent
# set user-id-collector
# set vsys <name> user-id-collector
|
|
HA
|
|
# set deviceconfig high-availability
|
|
AutoFocus Settings
|
|
# set deviceconfig setting autofocus
|
|
WildFire Settings
|
|
# set deviceconfig setting wildfire
|
|
Panorama
|
|
# set deviceconfig system panorama-server
|
|
Restart
|
|
> request restart system
|
|
CLI Cheat Sheet: Device Management
Use the following table to quickly locate commands for common device management tasks:
If you want to...
|
Use...
|
• Show general system health information.
|
|
> show system info
|
|
• Show percent usage of disk partitions. Include the optional files
parameter to show information about inodes, which track file storage.
|
|
> show system disk-space files
|
|
• Show the maximum log file size.
|
|
> show system logdb-quota
|
|
• Show running processes.
|
|
> show system software status
|
|
• Show processes running in the management plane.
|
|
> show system resources
|
|
• Show resource utilization in the dataplane.
|
|
> show running resource-monitor
|
|
• Show the licenses installed on the device.
|
|
> request license info
|
|
• Show when commits, downloads, and/or upgrades are completed.
|
|
> show jobs processed
|
|
• Show session information.
|
|
> show session info
|
|
• Show information about a specific session.
|
|
> show session id <session-id>
|
|
If you want to...
|
Use...
|
• Show the running security policy.
|
|
> show running security-policy
|
|
• Show the authentication logs.
|
|
> less mp-log authd.log
|
|
• Restart the device.
|
|
> request restart system
|
|
• Show the administrators who are currently logged in to the web interface, CLI, or API.
|
|
> show admins
|
|
• Show the administrators who can access the web interface, CLI, or API, regardless of whether those administrators are currently logged in.
When you run this command on the firewall, the output includes both local administrators and those pushed from a Panorama template.
|
|
> show admins all
|
|
• Configure the management interface as a DHCP client.
For a successful commit, you must include each of the parameters: accept- dhcp-domain, accept-dhcp-hostname, send-client-id, and send- hostname.
|
|
# set deviceconfig system type dhcp-client accept-dhcp-
domain <yes|no> accept-dhcp-
hostname <yes|no> send-client-id
<yes|no> send- hostname <yes|no>
|
|
CLI Cheat Sheet: User-ID
Use the following commands to perform common User-ID configuration and monitoring tasks.
To see more comprehensive logging information enable debug mode on the agent using the debug user-id log-ip-user-mapping yes command. When you are done troubleshooting, disable debug mode using debug user-id log-ip-user-mapping no.
CLI Cheat Sheet: User-ID
|
|||
View all User-ID agents configured to send user mappings to the Palo Alto Networks device:
• To see all configured Windows-based agents:
|
|||
>
|
show
|
user
|
user-id-agent state all
|
• To see if the PAN-OS-integrated agent is configured:
|
|||
>
|
show
|
user
|
server-monitor state all
|
View how many log messages came in from syslog senders and how many entries the User-ID agent successfully mapped:
|
|||
>
|
show
|
user
|
server-monitor statistics
|
View the configuration of a User-ID agent from the Palo Alto Networks device:
|
|||
>
|
show
|
user
|
user-id-agent config name <agent-name>
|
View group mapping information:
|
|||
>
|
show
|
user
|
group-mapping statistics
|
>
|
show
|
user
|
group-mapping state all
|
>
|
show
|
user
|
group list
|
>
|
show
|
user
|
group name <group-name>
|
View all user mappings on the Palo Alto Networks device:
|
|||
>
|
show
|
user
|
ip-user-mapping all
|
Show user mappings filtered by a username string (if the string includes the domain name, use two backslashes before the username):
|
|||
>
|
show
|
user
|
ip-user-mapping all | match <domain>\\<username-string>
|
Show user mappings for a specific IP address:
|
PAN-OS CLI QUICK START | CLI Cheat Sheets 45
© 2017 Palo Alto Networks, Inc.
CLI Cheat Sheet: User-ID
|
> show user ip-user-mapping ip <ip-address>
|
Show usernames:
> show user user-ids
|
View the most recent addresses learned from a particular User-ID agent:
|
> show log userid datasourcename equal <agent-name> direction equal backward
|
View mappings from a particular type of authentication service:
|
> show log userid datasourcetype equal <authentication-service>
|
where <authentication-service> can be authenticate, client-cert, directory-server, exchange-server, globalprotect, kerberos, netbios-probing, ntlm, unknown, vpn- client, or wmi-probing.
For example, to view all user mappings from the Kerberos server, you would enter the following command:
|
> show log userid datasourcetype equal kerberos
|
View mappings learned using a particular type of user mapping:
|
> show log userid datasource equal <datasource>
|
where <datasource> can be agent, captive-portal, event-log, ha, probing, server- session-monitor, ts-agent, unknown, vpn-client, or xml-api.
For example, to view all user mappings from the XML API, you would enter the following command:
|
> show log userid datasourcetype equal xml-api
|
Find a user mapping based on an email address:
|
> show user email-lookup
+ base Default base distinguished name (DN) to use for searches
+ bind-dn bind distinguished name
+ bind-password bind password
+ domain Domain name to be used for username
+ group-object group object class(comma-separated)
+ name-attribute name attribute
+ proxy-agent agent ip or host name.
+ proxy-agent-port user-id agent listening port, default is 5007
+ use-ssl use-ssl
* email email address
> mail-attribute mail attribute
|
46 PAN-OS CLI QUICK START | CLI Cheat Sheets
© 2017 Palo Alto Networks, Inc.
CLI Cheat Sheet: User-ID
|
> server ldap server ip or host name.
> server-port ldap server listening port
|
For example:
> show user email-lookup base "DC=lab,DC=sg,DC=acme,DC=local" bind-dn "CN=Administrator,CN=Users,DC=lab,DC=sg,DC=acme,DC=local" bind-password acme use-ssl no email user1@lab.sg.acme.local mail-attribute mail server
10.1.1.1 server-port 389 labsg\user1
|
Clear the User-ID cache:
|
clear user-cache all
|
Clear a User-ID mapping for a specific IP address:
|
clear user-cache ip <ip-address/netmask>
|
CLI Cheat Sheet: Networking
Use the following table to quickly locate commands for common networking tasks:
If you want to . . .
|
Use . . .
|
General Routing Commands
|
|
• Display the routing table
|
|
> show routing route
|
|
• Look at routes for a specific destination
|
|
> show routing fib virtual-router <name> | match <x.x.x.x/Y>
|
|
NAT
|
|
• Show the NAT policy table
|
|
> show running nat-policy
|
|
• Test the NAT policy
|
|
> test nat-policy-match
|
|
• Show NAT pool utilization
|
|
> show running ippool
> show running global-ippool
|
|
IPSec
|
|
• Show IPSec counters
|
|
> show vpn flow
|
|
• Show a list of all IPSec gateways and their configurations
|
|
> show vpn gateway
|
|
• Show IKE phase 1 SAs
|
|
> show vpn ike-sa
|
|
• Show IKE phase 2 SAs
|
|
> show vpn ipsec-sa
|
|
• Show a list of auto-key IPSec tunnel configurations
|
|
> show vpn tunnel
|
|
BFD
|
If you want to . . .
|
Use . . .
|
• Show BFD profiles
|
|
> show routing bfd active-profile [<name>]
|
|
• Show BFD details
|
|
> show routing bfd details [interface <name>] [local-ip <ip>] [multihop][peer-ip <ip>] [session-id] [virtual-router <name>]
|
|
• Show BFD statistics on dropped sessions
|
|
> show routing bfd drop-counters session- id <session-id>
|
|
• Show counters of transmitted, received, and dropped BFD packets
|
|
> show counter global | match bfd
|
|
• Clear counters of transmitted, received, and dropped BFD packets
|
|
> clear routing bfd counters session-id all
| <1-1024>
|
|
• Clear BFD sessions for debugging purposes
|
|
> clear routing bfd session-state session-id all | <1-1024>
|
|
PVST+
|
|
• Set the native VLAN ID
|
|
> set session pvst-native-vlan-id <vid>
|
|
• Drop all STP BPDU packets
|
|
> set session drop-stp-packet
|
|
• Verify PVST+ BPDU rewrite configuration, native VLAN ID, and STP BPDU packet drop
|
|
> show vlan all
|
|
• Show counter of times the 802.1Q tag and PVID fields in a PVST+ BPDU packet do not match
|
|
> show counter global
|
|
Look at the flow_pvid_inconsistent counter.
|
|
Troubleshooting
|
|
• Ping from the management (MGT) interface to a destination IP address
|
|
> ping host <destination-ip-address>
|
|
PAN-OS CLI QUICK START | CLI Cheat Sheets 49
© 2017 Palo Alto Networks, Inc.
If you want to . . .
|
Use . . .
|
• Ping from a dataplane interface to a destination IP address
|
|
> ping source <ip-address-on-dataplane>
host <destination-ip-address>
|
|
• Show network statistics
|
|
> request netstat statistics yes
|
|
CLI Cheat Sheet: VSYS
Use the following commands to administer a Palo Alto Networks firewall with multiple virtual system (multi-vsys) capability. You must have superuser, superuser (read-only), device administrator, or device administrator (read-only) access to use these commands. These commands are not available for virtual system administrator or virtual system administrator (read-only) roles.
If you want to . . .
|
Use . . .
|
• Find out if the firewall is in multi-vsys mode
|
|
admin@PA> show system info | match vsys
multi-vsys: on
|
|
• View a list of virtual systems configured on the firewall
|
|
admin@PA> set system setting target-vsys ?
none none
vsys1 vsys1
vsys2 vsys2
<value> <value>
|
|
• Switch to a particular vsys so that you can issue commands and view data specific to that vsys
|
|
admin@PA> set system setting target- vsys <vsys-name>
|
|
For example, use the following command to switch to vsys2; note that the vsys name is case sensitive:
|
|
> set system setting target-vsys vsys2 Session target vsys changed to vsys2 admin@PA-vsys2>
|
|
Notice that the command prompt now shows the name of the vsys you are now administering.
|
|
• View the maximum number of sessions allowed, in use, and throttled
|
|
admin@PA> show session meter
|
|
Example output:
|
|
VSYS Maximum Current Throttled
|
|
1 10 30 1587
|
|
Maximum indicates the maximum number of sessions allowed per dataplane, Current indicates the number of sessions being used by the virtual system, and Throttled indicates the number of sessions denied for the virtual system because the sessions exceeded the Maximum number multiplied by the number of dataplanes in the system.
|
PAN-OS CLI QUICK START | CLI Cheat Sheets 51
© 2017 Palo Alto Networks, Inc.
If you want to . . .
|
Use . . .
|
As shown in this example, on a PA-5200
Series or PA-7000 Series firewall, the Current number of sessions being used can be greater than the Maximum configured for Sessions Limit (Device > Virtual Systems > Resource) because there are multiple dataplanes per virtual system. The Sessions Limit you configure on a PA-5200 or PA-7000 Series firewall is per dataplane, and will result in a higher maximum per virtual system.
|
|
• View the User-ID mappings in the vsys
|
|
admin@PA-vsys2> show user ip-user-mapping all
|
|
• Return to configuring the firewall globally
|
|
admin@PA-vsys2> set system setting target- vsys none
admin@PA>
|
|
CLI Cheat Sheet: Panorama
Use the following commands on Panorama to perform common configuration and monitoring tasks for the Panorama management server (M-Series appliance in Panorama mode), Dedicated Log Collectors (M-Series appliances in Log Collector mode), and managed firewalls.
To view system information about a Panorama virtual appliance or M-Series appliance (for example, job history, system resources, system health, or logged-in administrators), see CLI Cheat Sheet: Device Management.
A Dedicated Log Collector mode has no web interface for administrative access, only a command line interface (CLI).
If you want to . . .
|
Use . . .
|
M-Series Appliance Mode of Operation (Panorama, Log Collector, or PAN-DB Private Cloud Mode)
Switching the mode reboots the M-Series appliance, deletes any existing log data, and deletes all configurations except the management access settings.
|
|
• Display the current operational mode.
|
|
> show system info | match system-mode
|
|
• Switch from Panorama mode to Log Collector mode.
|
|
> request system system-mode logger
|
|
• Switch from Panorama mode to PAN-DB private cloud mode (M-500 appliance only).
|
|
> request system system-mode panurldb
|
|
• Switch an M-Series appliance from Log Collector mode or PAN-DB private cloud mode (M-500 appliance only) to Panorama mode.
|
|
> request system system-mode panorama
|
|
• Switch the Panorama virtual appliance from Legacy mode to Panorama mode.
|
|
> request system system-mode panorama
|
|
• Switch the Panorama virtual appliance from Panorama mode to Legacy mode.
|
|
> request system system-mode legacy
|
|
Panorama Management Server
|
|
• Change the output for show commands to a format that you can run as CLI commands.
|
|
> set cli config-output-mode set
|
PAN-OS CLI QUICK START | CLI Cheat Sheets 53
© 2017 Palo Alto Networks, Inc.
If you want to . . .
|
Use . . .
|
The following is an example of the
output for the show device-group command after setting the output format:
# show device-group branch- offices
set device-group branch- offices devices
set device-group branch- offices pre-rulebase
...
|
|
• Enable or disable the connection between a firewall and Panorama. You must enter this command from the firewall CLI.
|
|
> set panorama [off | on]
|
|
• Synchronize the configuration of M-Series appliance high availability (HA) peers.
|
|
> request high-availability sync-to-remote [running-
config | candidate-config]
|
|
• Reboot multiple firewalls or Dedicated Log Collectors.
|
|
> request batch reboot [devices | log-
collectors] <serial-number>
|
|
• Change the interval in seconds (default is 10; range is 5 to 60) at which Panorama polls devices (firewalls and
Log Collectors) to determine the progress of software or content updates. Panorama displays the progress when you deploy the updates to devices. Decreasing the interval makes the progress report more accurate but increases traffic between Panorama and the devices.
|
|
> set dlsrvr poll- interval <5-60>
|
|
Device Groups and Templates
|
|
• Show the history of device group commits, status of the connection to Panorama, and other information for the firewalls assigned to a device group.
|
|
> show devicegroups
name <device-group-name>
|
|
• Show the history of template commits, status of the connection to Panorama, and other information for the firewalls assigned to a template.
|
|
> show templates name <template-name>
|
|
• Show all the policy rules and objects pushed from Panorama to a firewall. You must enter this command from the firewall CLI.
|
|
> show config pushed-shared- policy
|
|
54 PAN-OS CLI QUICK START | CLI Cheat Sheets
© 2017 Palo Alto Networks, Inc.
If you want to . . .
|
Use . . .
|
• Show all the network and device settings pushed from Panorama to a firewall. You must enter this command from the firewall CLI.
|
|
> show config pushed-template
|
|
Log Collection
|
|
• Show the current rate at which the Panorama management server or a Dedicated Log Collector receives firewall logs.
|
|
> debug log-collector
log-collection-stats show incoming-logs
|
|
• Show the quantity and status of logs that Panorama or a Dedicated Log Collector forwarded to external servers (such as syslog servers) as well as the auto-tagging status of the logs. Tracking dropped logs helps you troubleshoot connectivity issues.
|
|
> debug log-collector log- collection-stats show log- forwarding-stats
|
|
• Show status information for log forwarding to the Panorama management server or a Dedicated Log Collector from a particular firewall (such as the last received and generated log of each type).
When you run this command at the firewall CLI (skip the device <firewall-serial-number> argument), the output also shows how many logs the firewall has forwarded.
|
|
> show logging-status device <firewall-serial-
number>
|
|
• Clear logs by type.
Running this command on the Panorama management server clears logs that Panorama and Dedicated Log Collectors generated, as well as any firewall logs that the Panorama management server collected. Running this command on a Dedicated Log Collector clears the logs that it collected from firewalls.
|
|
> clear log [acc | alarm | config | hipmatch | system | threat | traffic]
|
|
No comments:
Post a Comment