Cyberoam Console Guide
Cyberoam Console Guide
Version 9
IMPORTANT NOTICE
Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Elitecore assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice.
USERS LICENSE
The Appliance described in this document is furnished under the terms of Elitecores End User license agreement. Please read these terms and conditions carefully before using the Appliance. By using this Appliance, you agree to be bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused Appliance and manual (with proof of payment) to the place of purchase for a full refund.
LIMITED WARRANTY
Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software substantially conforms to its published specifications except for the foregoing, the software is provided AS IS. This limited warranty extends only to the customer as the original licenses. Customers exclusive remedy and the entire liability of Elitecore and its suppliers under this warranty will be, at Elitecore or its service centers option, repair, replacement, or refund of the software if reported (or, upon, request, returned) to the party supplying the software to the customer. In no event does Elitecore warrant that the Software is error free, or that the customer will be able to operate the software without problems or interruptions. Elitecore hereby declares that the anti virus and anti spam modules are powered by Kaspersky Labs and by Commtouch respectively and the performance thereof is under warranty provided by Kaspersky Labs and by Commtouch. It is specified that Kaspersky Lab does not warrant that the Software identifies all known viruses, nor that the Software will not occasionally erroneously report a virus in a title not infected by that virus. Hardware: Elitecore warrants that the Hardware portion of the Elitecore Products excluding power supplies, fans and electrical components will be free from material defects in workmanship and materials for a period of One (1) year. Elitecore's sole obligation shall be to repair or replace the defective Hardware at no charge to the original owner. The replacement Hardware need not be new or of an identical make, model or part; Elitecore may, in its discretion, replace the defective Hardware (or any part thereof) with any reconditioned product that Elitecore reasonably determines is substantially equivalent (or superior) in all material respects to the defective Hardware.
DISCLAIMER OF WARRANTY
Except as specified in this warranty, all expressed or implied conditions, representations, and warranties including, without limitation, any implied warranty or merchantability, fitness for a particular purpose, non-infringement or arising from a course of dealing, usage, or trade practice, and hereby excluded to the extent allowed by applicable law. In no event will Elitecore or its supplier be liable for any lost revenue, profit, or data, or for special, indirect, consequential, incidental, or punitive damages however caused and regardless of the theory of liability arising out of the use of or inability to use the product even if Elitecore or its suppliers have been advised of the possibility of such damages. In the event shall Elitecores or its suppliers liability to the customer, whether in contract, tort (including negligence) or otherwise, exceed the price paid by the customer. The foregoing limitations shall apply even if the above stated warranty fails of its essential purpose. In no event shall Elitecore or its supplier be liable for any indirect, special, consequential, or incidental damages, including, without limitation, lost profits or loss or damage to data arising out of the use or inability to use this manual, even if Elitecore or its suppliers have been advised of the possibility of such damages.
RESTRICTED RIGHTS
Copyright 1999-2009 Elitecore Technologies Ltd. All rights reserved. Cyberoam, Cyberoam logo are trademark of Elitecore Technologies Ltd.
CORPORATE HEADQUARTERS
Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA Phone: +91-79-66065606 Fax: +91-79-26407640 Web site: www.elitecore.com , www.cyberoam.com
Contents
Preface ............................................................................................................................................................ 1 Guide Audience .............................................................................................................................................. 1 Technical Support........................................................................................................................................... 2 Typographic Conventions............................................................................................................................... 3
2.
System configuration............................................................................................................ 14
2.1 Set Console Password............................................................................................................................. 14 2.2 Set System Date...................................................................................................................................... 14 2.3 View Access logs.................................................................................................................................... 15 2.4 Set Cyberoam Administrator Email ID................................................................................................... 16 2.5 Traceroute Utility.................................................................................................................................... 17 2.6 Set Module Info ...................................................................................................................................... 17 2.7 Bandwidth Graph Setting........................................................................................................................ 17 2.7.1 Flush Gateway Graphs..................................................................................................................... 18 2.7.2 Flush System Health Graphs............................................................................................................ 18 2.7.3 Flush All Bandwidth Graphs ........................................................................................................... 18 2.7.0 Exit .................................................................................................................................................. 18 2.8 Enable/Disable LAN Bypass .................................................................................................................. 18 2.0 Exit ......................................................................................................................................................... 18
3.
Route configuration.............................................................................................................. 19
3.1 Configure Unicast Routing ..................................................................................................................... 19 3.1.1 Configure Static-routes/ACLs ......................................................................................................... 19 3.1.2 Configure RIP.................................................................................................................................. 21 3.1.3 Configure OSPF............................................................................................................................... 23 3.1.3 Configure Border Gateway Protocol (BGP) .................................................................................... 25 3.1.0 Exit .................................................................................................................................................. 26 3.2 Configure Multicast Routing .................................................................................................................. 27 3.2.1 Enable/Disable Multicast forwarding .............................................................................................. 28 3.2.2 Configure Static multicast routes..................................................................................................... 29 3.2.0 Exit .................................................................................................................................................. 30 3.0 Exit ......................................................................................................................................................... 30
4. 5.
5.4 Database Utilities.................................................................................................................................... 33 5.4.1 Database Quick Repair .................................................................................................................... 33 5.4.2 Database Full Repair........................................................................................................................ 34 5.4.3 Repair Web Surfing logs.................................................................................................................. 34 5.4.4 Repair User Session logs ................................................................................................................. 34 5.4.5 Repair Live User Data ..................................................................................................................... 34 5.4.6 Synchronize Live User Data ............................................................................................................ 34 5.4.7 Repair Summary table Data............................................................................................................. 34 5.4.0 Exit .................................................................................................................................................. 34 5.5 Download Backup .................................................................................................................................. 35 5.6 Restore Backup....................................................................................................................................... 35 5.7 DHCP Client Settings ............................................................................................................................. 35 5.8 View Audit Logs..................................................................................................................................... 36 5.9 Check and Upgrade New version ........................................................................................................... 36 5.10 Auto Upgrade status ............................................................................................................................. 36 5.11 Check and Update Webcat Latest Database ......................................................................................... 36 5.12 Webcat Auto Upgrade Status................................................................................................................ 37 5.13 Reset to Factory Defaults...................................................................................................................... 37 5.14 Custom Menu ....................................................................................................................................... 37 5.15 HA Configuration ................................................................................................................................. 37 5.15.1 Disable HA .................................................................................................................................... 37 5.15.2 Reset HA........................................................................................................................................ 38 5.15.3 Show details................................................................................................................................... 38 5.15.0 Exit................................................................................................................................................. 38 5.16 Rollback to previous version ................................................................................................................ 38 5.17 ReBuild New Firewall State ................................................................................................................. 39 5.0 Exit ......................................................................................................................................................... 39
6. 7. 8.
9.
Annexure I - Contents arp ............................................................................................................................................45 clear .........................................................................................................................................45 cyberoam..................................................................................................................................45 disableremote...........................................................................................................................46 dnslookup ................................................................................................................................46 enableremote ...........................................................................................................................47 httpclient ..................................................................................................................................47 ip ..............................................................................................................................................47 message....................................................................................................................................52 packet-capture .........................................................................................................................52 ping ..........................................................................................................................................53 route.........................................................................................................................................54 set .............................................................................................................................................55 show .........................................................................................................................................59 tcpdump ...................................................................................................................................61 telnet ........................................................................................................................................63 traceroute.................................................................................................................................64
Preface
Welcome to Cyberoams Console guide. Cyberoam is an Identity-based UTM Appliance. Cyberoams solution is purpose-built to meet the security needs of corporate, government organizations, and educational institutions. Cyberoams perfect blend of best-of-breed solutions includes user based Firewall, Content filtering, Anti Virus, Anti Spam, Intrusion Prevention System (IPS), and VPN. Cyberoam provides increased LAN security by providing separate port for connecting to the publicly accessible servers like Web server, Mail server, FTP server etc. hosted in DMZ which are visible the external world and still have firewall protection. Cyberoam Console guide helps you administer, monitor and manage Cyberoam with the help of Console. Note that by default, Cyberoam Console password is admin. It is recommended to change the default password immediately after Installation.
Guide Audience
Cyberoam Console Guide provides functional and technical information of the Cyberoam Software. This Guide is written to serve as a technical reference and describes features that are specific to the Console. Guide also provides the brief summary on using the Console commands. This guide is intended for the Network Administrators and Support personnel who perform the following tasks: Configure System & Network Manage and maintain Network Manage various services Troubleshooting
This guide is intended for reference purpose and readers are expected to possess basic-toadvanced knowledge of systems networking.
Note
The Corporate and individual names, data and images in this guide are for demonstration purposes only and does not reflect the real data.
If you are new to Cyberoam, use this guide along with the Cyberoam User Guide
Technical Support
You may direct all questions, comments, or requests concerning the software you purchased, your registration status, or similar issues to Customer care/service department at the following address: Corporate Office eLitecore Technologies Ltd. 904, Silicon Tower Off C.G. Road Ahmedabad 380015 Gujarat, India. Phone: +91-79-66065606 Fax: +91-79-26407640 Web site: www.elitecore.com Cyberoam contact: Technical support (Corporate Office): +91-79- 26400707 Email: [email protected] Web site: www.cyberoam.com Visit www.cyberoam.com for the regional and latest contact information.
Typographic Conventions
Material in this manual is presented in text, screen displays, or command-line notation.
Convention
Example Machine where Cyberoam Software - Server component is installed Machine where Cyberoam Software - Client component is installed The end user Username uniquely identifies the user of the system
Introduction
Notation conventions
Group Management Groups Create it means, to open the required page click on Group management then on Groups and finally click Create tab
Subtitles
Navigation link
Note
Introduction
Cyberoam CLI console provides a collection of tools to administer, monitor and control certain Cyberoam components.
To access any of the menu items, type the number corresponding to the menu item against Select Menu Number and press <Enter> key. Example To access System Configuration DNS services Exit Type 2 8 0 or Ctrl -C
1.
Network configuration
View & change network setting Set IP address Set Alias (only when Cyberoam is deployed in transparent mode) Add VLAN ID (only when Cyberoam is deployed in transparent mode)
Set IP Address Following screen allows setting or modifying the IP address for any port. Type y and press <Enter> to set IP address
Displays the IP address, Net mask and Zone and prompts for the new IP address and Net mask for each Port. Press <Enter> if you do not want to change any details.
Note
One can assign or bind more than one IP address to the same Ethernet or the Network card. These are Aliases. It is possible to define Aliases for both Internal as well as External network. Maximum eight IP addresses (Aliases) can be bound to a single Network card.
Displays message on successful completion of the operation and restarts management services. Press <Enter> to return to the Main menu.
10
11
Cyberoam Console Guide Error Invalid VLAN_id is displayed if VLAN ID is not between 2 and 4094
Error Entry VLAN_xx Does Not Exists if one specifies VLAN ID which is not added.
12
1.5.0 Exit
Type 0 to exit from VLAN configuration menu
1.0 Exit
Type 0 to exit from Transparent mode IP configuration menu
13
2.
System configuration
View & change various system properties
Displays message on successful completion of the operation. Press <Enter> to return to the System Setting Menu.
Select the appropriate zone by using Tab key and press OK followed by <Enter>
14
Type y to reset Date and press <Enter> Type Month, Day, Year, Hour, Minutes
15
16
Flushing deletes graph and along with the data with which the graph was generated. Graphs generated after flushing will be generated using the new data.
17
2.7.0 Exit
Type 0 to exit from the Bandwidth Graph Menu and return to the System Settings Menu
2.0 Exit
Type 0 to exit from System Setting menu and return to the Main Menu.
18
3.
Route configuration
Use to this menu to configure static routes, RIP, OSPF and enable or disable multicast forwarding. Cyberoam adheres to Cisco terminology for routing configuration and provides Cisco-compliant CLI to configure static routes and dynamic routing protocols. Traditionally, IP packets are transmitted in one of either two ways Unicast (1 sender 1 receiver) or Broadcast (1 sender everybody on the network). Multicast delivers IP packets simultaneously to a group of hosts on the network and not everybody and not just 1.
Options Configure RIP, Configure OSPF and Configure BGP are not available when Cyberoam is deployed in transparent mode.
A route provides the Cyberoam with the information it needs to forward a packet to a particular destination. A static route causes packets to be forwarded to a destination other than the configured default gateway. By specifying through which interface the packet will leave and to which device the packet should be routed, static routes to control the traffic exiting the Cyberoam. Configure static routes by defining the destination IP address and netmask of packets that the Cyberoam is intended to intercept, and specifying a (gateway or next hop) IP address for those packets. The gateway address specifies the next-hop router to which traffic will be routed. Creating static routes 1. Go to option 1 Configure Static-routes/ACLs
19
Cyberoam Console Guide 2. To enable the configuration mode, execute enable command from the command prompt as below: router> enable <cr> 3. To enter the global configuration mode, execute the configure terminal command from the command prompt as below: router# configure terminal <cr> 4. Specify destination IP address/network and gateway (next hop) using ip route command from the command prompt as below: router(config)# ip route <destination ip address/netmask> <gateway ip address>
Viewing static routes To view the static route configuration, use the show running-config command from the command prompt as below: router> show ip route <cr>
Removing static routes To remove the static route configuration, execute the no ip route command from the command prompt as below: router(config)# no ip route <destination ip address/netmask> <gateway ip address>
20
RIP configuration Task List Prerequisite Interface IP addresses configured from Network Configuration Wizard RIP must be enabled before carrying out any of the RIP commands. To configure RIP, use the following commands from CLI Console: 1. Go to Option 3 (Route Configuration) 2. Go to Option 1 (Configure Unicast Routing) 3. Go to Option 2 (Configure RIP) 4. To configure RIP, perform the tasks described in the following table. Steps Enable RIP Command rip> enable Purpose Enables a RIP routing process and places you in Global Configuration mode. Enables the RIP configuration mode which places you in the Router Configuration mode and allows you to configure from the terminal.
Specify a list of networks for the Routing Information Protocol (RIP) routing process
Allows to configure and start RIP routing process Enables RIP interfaces between specified network address. RIP routing updates will be sent and received only through interfaces on this network. Also, if the network of an interface is not specified, the interface will not be advertised in any RIP update. The interfaces which have addresses matching with network are enabled.
Specify ip-address with the subnet information For example, if the network for 10.0.0.0/24 is RIP enabled, this would result in all the addresses from 10.0.0.0 to 10.0.0.255 being enabled for RIP.
rip(configure-router)#end
Exits from the Router Configuration mode and places you into the Enable mode.
21
Configure Authentication
To set authentication mode as text and set the authentication string rip(configure)# interface ifname rip(configure-if)# ip rip authentication mode {text [string]} For example, rip(configure)# interface A rip(configure-if)# ip rip authentication mode text rip(configure-if)# ip rip authentication string teststring To set authentication mode as MD5 and set the authentication string rip(configure)# interface ifname rip(configure-if)# ip rip authentication mode {md5 [key-chain name of key chain]} For example, rip(configure)# interface A rip(configure-if)# ip rip authentication mode md5 key-chain testkeychain To disable authentication rip(configure)# interface ifname rip(configure-if)# no ip authentication mode
Enables the RIP configuration mode which places you in the Router Configuration mode and allows you to configure from the terminal. Defines authentication mode for the each interface. By, default, authentication is on for all the interfaces. If authentication is not required for any of the interface, it is to be explicitly disabled. RIP Version 1 does not support authentication. RIP Version 2 supports Clear Text (simple password) or Keyed Message Digest 5 (MD5) authentication. To enable authentication for RIP Version 2 packets and to specify the set of keys that can be used on an interface, use the ip rip authentication key-chain command in interface configuration mode. If authentication is not required for any of the interface, use the no form of this command.
rip
For example, disable authentication for interface A rip(configure)# interface A rip(configure-if)# no ip rip authentication mode rip(configure-if)# end
rip(configure-if)# exit
Exits from the Router Configuration mode and places you into the Enable mode. Exits to the Router Management Menu
To remove route configuration, execute the no network command from the command prompt as below: rip(config-router)# no network <ip address> Disabling RIP To disable OSPF routing configuration, execute the no router command from the command prompt as below: rip(config)# no router rip
22
How OSPF works OSPF keeps track of a complete topological database of all connections in the local network. It is typically divided into logical areas linked by area border routers. An area comprises a group of contiguous networks. An area border router links one or more areas to the OSPF network backbone. Cyberoam participates in OSPF communications, when it has an interface to an OSPF area. Cyberoam uses the OSPF Hello protocol to acquire neighbors in an area. A neighbor is any router that has an interface to the same area as the Cyberoam. After initial contact, the Cyberoam exchanges Hello packets with its OSPF neighbors at regular intervals to confirm that the neighbors can be reached. OSPF-enabled routers generate link-state advertisements and send them to their neighbors whenever the status of a neighbor changes or a new neighbor comes online. If OSPF network is stable, link-state advertisements between OSPF neighbors does not occur. A Link-State Advertisement (LSA) identifies the interfaces of all OSPF-enabled routers in an area, and provides information that enables OSPF-enabled routers to select the shortest path to a destination. All LSA exchanges between OSPF-enabled routers are authenticated. The Cyberoam maintains a database of link-state information based on the advertisements that it receives from OSPFenabled routers. To calculate the shortest path to a destination, the Cyberoam applies the Shortest Path First (SPF) algorithm to the accumulated link-state information. The Cyberoam updates its routing table dynamically based on the results of the SPF calculation to ensure that an OSPF packet will be routed using the shortest path to its destination. OSFP configuration Task List Prerequisite Interface IP addresses configured from Network Configuration Wizard OSPF must be enabled before carrying out any of the OSPF commands. To configure OSPF, use the following commands from CLI Console: 1. Go to Option 3 (Route Configuration) 2. Go to Option 1 (Configure Unicast Routing) 3. Go to Option 3 (Configure OSPF) 4. To configure OSPF, perform the tasks described in the following table:
23
Specify a list of networks for the Routing Information Protocol (OSPF) routing process
Purpose Enables OSPF routing process and places you in the Global Configuration mode. Enables the OSPF configuration mode which places you in the Router Configuration mode and allows you to configure from the terminal. Allows to configure and start OSPF routing process Assigns an interface to a area. The area-id is the area number we want the interface to be in. The area-id can be an integer between 0 and 4294967295 or can take a form similar to an IP address A.B.C.D. Interfaces that are part of the network are advertised in OSPF link-state advertisements. View configuration
ospf(config-router)# config
show
running-
ospf(configure-router)#end
ospf(configure-if)# exit
Exits from the Router Configuration mode and places you into the Enable mode. Exits to the Router Management Menu
To remove route configuration, execute the no network command from the command prompt as below: ospf(config-router)# no network <ip address> area <area-id> Disabling OSPF To disable OSPF routing configuration, execute the no router command from the command prompt as below: ospf(config)# no router ospf
24
Additionally, a firewall rule is to be configured for the zone for which the BGP traffic is to be allowed i.e. LAN to LOCAL or WAN to LOCAL. How BGP works When BGP is enabled, the Cyberoam advertises routing table updates to neighboring autonomous systems whenever any part of the Cyberoam routing table changes. Each AS, including the local AS of which the Cyberoam unit is a member, is associated with an AS number. The AS number references a particular destination network. BGP updates advertise the best path to a destination network. When the Cyberoam unit receives a BGP update, the Cyberoam examines potential routes to determine the best path to a destination network before recording the path in the Cyberoam routing table. BGP configuration Task List Prerequisite Interface IP addresses configured from Network Configuration Wizard BGP must be enabled before carrying out any of the BGP commands. To configure BGP, use the following commands from CLI Console: 1. Go to Option 3 (Route Configuration) 2. Go to Option 1 (Configure Unicast Routing) 3. Go to Option 4 (Configure BGP) 4. To configure BGP, perform the tasks described in the following table.
Purpose Enables BGP routing process and places you in the Global Configuration mode. Enables the BGP configuration mode which places you in the Router Configuration mode and allows you to configure from the
25
terminal. Allows to configure and start BGP routing process AS number the number of the local AS that the Cyberoam unit is a member of. The IP addresses and network masks of networks to advertise to BGP peers. The Cyberoam may have a physical or VLAN interface connected to those networks. View configuration By default, router ID is Cyberoam IP address. Router ID is used to identify the Cyberoam to other BGP routers. You can change the router ID using the following command: bgp(config-router)#bgp router-id IP address The router-id can be an integer or can take a form similar to an IP address A.B.C.D Exits from the Router Configuration mode. Exits to the Router Management Menu
bgp(configure-router)# address
network
ip-
Specify ip-address with the subnet information of the network to be advertised bgp(config-router)# show runningconfig
To remove route configuration, execute the no network command from the command prompt as below: bgp(config-router)# no network <ip address> Disabling BGP To disable BGP routing configuration, execute the no router command from the command prompt as below: bgp(config)# no router bgp AS number
3.1.0 Exit
Type 0 to exit from Unicast Routing configuration menu and return to Router Management.
26
IP Multicast Internet Protocol (IP) multicast is a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to thousands of recipients and homes. IP Multicast delivers source traffic to multiple receivers without adding any additional burden on the source or the receivers. Applications like videoconferencing, corporate communications, distance learning, and distribution of software, stock quotes, and news use IP multicasting. If IP multicast is not used, source is required to send more than one copy of a packet or individual copy to each receiver. In such case, high-bandwidth applications like Video or Stock where data is to be send more frequently and simultaneously, uses large portion of the available bandwidth. In these applications, the only efficient way of sending information to more than one receiver simultaneously is by using IP Multicast. Multicast Group Multicast is based on the concept of a group. An arbitrary group of receivers expresses an interest in receiving a particular data stream. This group does not have any physical or geographical boundariesthe hosts can be located anywhere on the Internet. Hosts that are interested in receiving data flowing to a particular group must join the group. Hosts must be a member of the group to receive the data stream. IP Multicast Addresses Multicast addresses specify an arbitrary group of IP hosts that have joined the group and want to receive traffic sent to this group. IP Class D Addresses The Internet Assigned Numbers Authority (IANA) controls the assignment of IP multicast addresses. Multicast addresses fall in Class D address space ranging from 224.0.0.0 to 239.255.255.255. This address range is only for the group address or destination address of IP multicast traffic. The source address for multicast datagrams is always the unicast source address.
27
Multicast forwarding In multicast routing, the source is sending traffic to a group of hosts represented by a multicast group address. The multicast router must determine which direction is upstream (toward the source) and which direction (or directions) is downstream. If there are multiple downstream paths, the router replicates the packet and forwards the traffic down the appropriate downstream paths which is not necessarily all paths.
IP multicasting applications that send multicast traffic must construct IP packets with the appropriate IP multicast address as the destination IP address. IP multicasting applications that receive multicast traffic must inform the TCP/IP protocol that they are listening for all traffic to a specified IP multicast address. Setting up IP Multicast forwarding Configuring multicast forwarding is two step process: Enable multicast forwarding (both the modes) Configure multicast routes (only in gateway mode)
To enable multicast forwarding, go to Option 3 (Route Configuration)> Option 2 (Configure Multicast Routing), Option 1 (Enable/Disable Multicast forwarding) and execute following command: mrouter>enable multicast-forwarding
28
29
Viewing routes Go to Option 3 (Route Configuration)> Option 2 (Configure Multicast Routing), Option 2 (Configure Static-routes) and execute following command: mrouter> mroute show
Removing route Go to Option 3 (Route Configuration)> Option 2 (Configure Multicast Routing), Option 2 (Configure Static-routes) and execute following command: mrouter> mroute del eth0 1.1.1.1 230.1.1.2 eth2
Please note Source and destination interfaces cannot be same for multicast route Multiple destination interfaces cannot be defined. Route manipulation per interface is required to add/delete such routes. Non-Ethernet interfaces like - ipsec0, etc. are not supported
3.2.0 Exit
Type 0 to exit from Multicast Routing Configuration menu and return to Router Management.
3.0 Exit
Type 0 to exit from Routing tables menu and return to Main Menu.
30
4.
Cyberoam Console
Use to perform various checks and view logs for troubleshooting Generally, when using command line help, one has to remember parameters/arguments of the command or has to go to the help and check for the parameters. Users using command line for the first time face difficulty in both the situation. To remove the above difficulty, Cyberoam has inbuilt help at the command prompt itself. Press Tab to view the list of commands supported.
Type command and then press tab to view the list of argument(s) supported or required. For example after typing ping press tab, it shows what all parameters are required or allowed
Type command and then press question mark to view the list of argument(s) supported with its description. For example after typing ping press question mark, it shows what all parameters are required or allowed with description
Note
Refer to Annexure A for the detailed help on various commands supported.
31
5.
Cyberoam Management
Restart management services Reset Web management password Restore Backup Remove Firewall rules Manage various Databases Setup/Configure DHCP client View Audit logs Reset to factory defaults Configure HA
32
Cyberoam Console Guide By default, Cyberoam does not allow outbound traffic to pass through. Removing all the firewall rules will allow all the inbound and outbound traffic to pass through Cyberoam. This option does not delete the firewall rules but allows bypassing firewall till the next RMS. In other word, it temporarily flushes all the rules to allow the traffic without any restriction. Restart management services to reapply the firewall rules. You will need to temporarily flush the firewall rules in case you have locked yourself outside Cyberoam i.e. are not able to access Cyberoam Web Console.
Note
Use Database full repair if you want to repair all databases along with log tables.
33
To repair only the log tables, use the respective repair log options
5.4.0 Exit
Type 0 to exit from the Database Utilities Menu and return to Cyberoam Management Menu
34
35
36
5.15 HA Configuration
Use to: Disable HA Reset HA View HA details
5.15.1 Disable HA
HA can be disabled from either of the Appliances. HA Administrator will be informed about the status via mail. If HA is disabled from primary appliance, both the appliances will be in stand-alone mode but primary appliance will process all the traffic. If HA is disabled from Auxiliary appliance, auxiliary appliance is simply removed from the cluster but primary appliance will still be in ACTIVE mode and process network traffic.
37
5.15.2 Reset HA
After disabling HA, to remove Auxiliary appliance from the cluster and use independently, reset HA from Auxiliary appliance and change IP schema through Network Configuration Wizard
5.15.0 Exit
Type 0 to exit from the HA Configuration Menu and return to previous Menu.
38
5.0 Exit
Type 0 to exit from Cyberoam Management menu and return to Main menu
39
6.
Upgrade version
Use to upgrade Cyberoam version. Before using this option, please check upgrade file is uploaded properly.
Some of the common errors: Error message: Upgrade File not found. Please upload version File Properly Reason/Solution: This error may occur if the upgrade file is not uploaded from Cyberoam Web Console. Go to Cyberoam Web Console and upload the file again Error message: System requires Restart of Cyberoam, Please reboot System before doing upgrade Reason/Solution: This error may occur if system is in inconsistent state, reboot the system from Cyberoam CLI Console and try again. If still not able to upgrade contact Cyberoam Support Error message/Solution: Could not extract upgrade file, Please upload upgrade file properly Reason/Solution: This error may occur if upgrade file is corrupted, download Upgrade file again and repeat the above steps to upgrade Error message: Could not find upgrade file, Please upload upgrade file properly Reason/Solution: This error may occur if upgrade file is corrupted, download Upgrade file again and repeat the above steps to upgrade
7.
Bandwidth Monitor
Use to monitor the bandwidth used by each Interface. Displays bandwidth used for receiving, transmitting and total bandwidth used by each interface.
40
8.
VPN Management
Below given menu will be displayed only when Cyberoam is deployed in Gateway mode.
41
42
8.0 Exit
Type 0 to exit from VPN menu and return to the Main menu
43
9.
Shutdown/Reboot Cyberoam
0. Exit
Type 0 to exit from Cyberoam Console Management
44
Annexure A
arp
Used for debugging purposes, to get a complete dump of the ARP cache Syntax arp [ping | proxy | show] Parameter list & description Keywords & Variables ping [count | duplicate | interface | silent | source | timeout] proxy [ add [interface (eth0 | lo) | dst_ip <ipaddress> | dst_iprange (from_ip <ipaddress>] | to_ip <ipaddress> ] | delete | [interface (eth0 | lo) | dst_ip <ipaddress> | dst_iprange (from_ip <ipaddress>] | to_ip <ipaddress> ] | show ] show [<ipaddress> | interface] Description Sends ICMP ECHO_REQUEST packets to network hosts. Refer to Ping command for details. Add and delete proxy ARP
clear
Clears the screen Syntax clear
cyberoam
Cyberoam Management Syntax cyberoam [autoupgrade | bandwidth | check_disk | cpu_burn_test | cta | dgd | idp-autoupgrade | repair_disk | restart | services | shutdown | system_monitor | view]
Parameter list & description Keywords & Variables autoupgrade [show | on | off] Description Set whether upgrade can be automatically applied or not. show - Displays current status of Autoupgrade mode on - Enables autoupgrade mode. Cyberoam will be automatically upgarded incase autoupgrade is available
45
without any notification or manual intervention. off - Disables autoupgrade mode. Bandwidth Management. Displays bandwidth consumed by all clients Displays data and system partition details
bandwidth [monitor] check_disk [data_partition | system_partition] cpu_burn_test <1-60> cta [collector { add ( collector-ip <ipaddress> | collector-port <port>) | { delete ( collector-ip <ipaddress> | collectorport <port>) } | disable | enable | show] dgd [restart | start | status | stop] idp_autoupgrade [show | on | off] repair_disk restart shutdown services [restart | status]
Used to test CPU Add and remove CTA collector IP address for clientless single sign on configuration
Start and stop dead gateway detection module Supported only when more than one gateway is configured Enable or disable IPS autoupgrade Repair data or system partition of hard disk Restart Cyberoam Shutdown Cyberoam restart Restarts management services status Generates systems current status file with the name cyberoam.debug file . File contains details like list of all the processes currently running on the system, resource usage etc. File is generated on appliance and can be downloaded from <cyberoam ipaddress>/documents. Enable or disable system monitor View Audit Log
disableremote
Disables the remote (SSH) connection, if enabled. By default, it is not allowed. Refer to enable remote to allow to establish the remote connection Syntax disableremote
dnslookup
Query Internet domain name servers for hostname resolving Syntax dnslookup {host [<ipaddress> (dot_notation_address | queryclass <string> | querytype <string> | time <number>) | <string> (queryclass <string> | time <number>) ] | server [- | <ipaddress> (host) | <string>] } Parameter list & description
46
Keywords & Variables host [<ipaddress> [dot_notation_address | queryclass <string> | querytype <string> | time <number>] | <string> | [queryclass <string> | time <number>]] server [- | <ipaddress> [host]| <string>]
enableremote
Allows to connect to the Cyberoam remotely i.e. allows to establish remote (SSH) connection. By default remote connection is not allowed Syntax enableremote [port <number> | serverip <ipaddress>] Parameter list & description Keywords & Parameters port <number> serverip <ipaddress> Description Port through which the remote SSH connection can be established IP address of the Cyberoam to which the remote connection can be established
httpclient
Client to query cache server using URL as argument
ip
Utility from iproute2 package Syntax ip [addr | link | maddr | monitor | mroute | neigh | route | rule | tunnel ] Parameter list & description Keywords & Parameters addr [add [ <ipaddress> | dev [ eth0 | lo ] | peer ] | del [ <ipaddress> | dev | peer ] | Description Protocol Address Management. Allows to add and delete protocol address dev name of the device peer <ipaddress> - For Point to Point Interfaces
47
flush | show]
anycast <ipaddress> - anycast destinations addresses broadcast <ipaddress> - Broadcast address on the interface label <string> - Each address may be tagged with a label string scope <number> - scope of the area where IP address will be valid global - Configured IP address will be valid globally host - Configured IP address will be valid only inside the host link - Link local IP address Flush Protocol addresses deprecated - (IPv6 only) flush deprecated addresses dynamic - flush only those addresses configured in stateless address configuration label - flush addresses with label matching the pattern permanent - flush only permanent addresses primary flush only primary addresses secondary - flush only secondary addresses tentative - flush IP address which did not pass duplicate address detection Display Protocol addresses deprecated - (IPv6 only) list deprecated addresses dynamic - List only those addresses configured in stateless address configuration label - List addresses with label matching the pattern permanent - List only permanent addresses primary - List only primary addresses secondary - List only secondary addresses tentative - List IP address which did not pass duplicate address detection Network device configuration address <string> Interface Change the Station address of the
flush
show
allmulti [off | on] - Device receives all Multicast packets on the link arp [off | on] - Change the NOARP flag on the Device
48
broadcast <string> - Change the link layer Broadcast address down - Change the State of Device to DOWN dynamic [off | on] - Flag indicating that Interface is dynamically created/destroyed mtu <number> - Change the MTU of the Device name <test> - Change device name multicast [off | on] - Flag indicating that the Interface is aware of Multicasting promisc [off | on] -Device listens to and feeds to the kernel all traffic on the link txqueuelen <number> - Transmit Queue Length up - Change the State of Device to UP Multicast Address Management
maddr [add <string> | dev ] | del <string> | dev ] | show [dev ] ] monitor [<string> | all] mroute [show [from <string>| interface [eth0 | lo]| to <string>]] neigh [add | change | del | flush | replace | show]
Neighbour/Arp Tables Management lladdr [<text> | dev | nud] - lladdr neighbour Link Layer Address of
nud [noarp | permanent | reachable | stale] [dev | lladdr] Neighbour Unreachability Detection change <ipaddress> - Change an Existing entry del <ipaddress> - Delete a Neighbour entry replace <ipaddress> - Add a new entry or Change an existing one Routing Table Management <string> - Prefix string blackhole - Unreachable destinations broadcast - Destinations are broadcast addresses local - Destinations are assigned to this host multicast Used for mutlicasting routing nat NAT route
49
prohibit Unreachable destinations throw - Route used with policy rules unicast Route entry describes real paths to the destinations unreachable - Unreachable destinations advmss - Advertise Maximal Segment Size cwnd - Clamp for congestion window dev - The Output Device name. equalize - Allow packet by packet randomization on multipath routes. metric - Preference value of the Route mtu - Maximal Transfer Unit nexthop -The nexthop of a multipath route onlink - Pretend that nexthop is directly attached to this link. pervasive - Pervasive hop realms - Route with this realm rtt - Round Trip Time rttvar - Initial RTT variance estimate ssthresh - Estimate for the initial slow start threshold. via - Address of the nexthop router. weight - Weight for this element of a multipath route reflecting its quality. window - Maximal window for TCP to advertise root - Selects routes with prefixes not shorter than PREFIX match - Selects routes with prefixes not longer than PREFIX exact - Selects routes with exact PREFIX table - Show the routes from this table(s) proto - Only list routes of this protocol type - Only list routes of this type scope - Only list routes with this scope table Show routes for the table Routing policy database management from <string> - Source prefix
50
fwmark <string> - fwmark value nat <ipaddress> - Base of the IP address block to translate pref <number> - Rule priority prohibit - Prohibit Communication administratively realms <text> - Select realm(s) reject - Bad Path table <number> - Rules for this table to <string> - Destination prefix tos <number> - TOS value (IP tunnel devices only.) Configure the physical source and destination address for IP tunnel interfaces csum <interface> - (only GRE tunnels) - generate/require checksums for tunneled packets dev [eth0 | lo ] - Network device icsum <interface> -Generate/require checksums for tunneled packets lkey [<ipaddress> | <number> ] -Use keyed GRE with this Input key lseq - Flag enables sequencing of incoming packets key [<ipaddress> | <number> ] -(only GRE tunnels) use keyed GRE with key local <ipaddress> - Set the fixed local address for tunneled packets mode [gre | ipip | sit] - Set the tunnel mode nopmtudisc - Disable Path MTU Discovery on this tunnel ocsum - Generate/require checksums for tunneled packets okey [<ipaddress> | <number>] -Use keyed GRE with this output key oseq - Flag enables sequencing of outgoing packets pmtudisc - Enable Path MTU Discovery on this tunnel remote <ipaddress> - Set the remote endpoint of the tunnel seq - Flag is equivalent to the combination `iseq oseq' tos <number> - Type of Service ttl <number> - Time to Live
51
message
Send Message to all the users Syntax Message all-users <text>
packet-capture
Packet capture displays dropped packets details on the specified interface. It will provide connection details and details on which module is dropping packets e.g. firewall, IPS along with information like firewall rule number, user, Internet Access policy number etc. This will help Cyberoam administrators to troubleshoot errant firewall rule. Syntax packet-capture [<text> | interface] Parameter list & description Keywords & Variables <text> Description BPF Compatible Packet filter expression related to IP layer and above. Based on the specified filter, dropped packets are dumped. If no expression is given, all the dropped packets are dumped else only packets for which expression is `true' are dumped. The expression consists of one or more primitives. Primitives usually consist of an id (name or number) proceeded by one or more qualifiers. Refer to the below given table on writing filtering expressions. Listen on <interface>
interface
BPF (Berkeley Packet Filter) sits between link-level driver and the user space. BPF is protocol independent and use a filter-before-buffering approach. It includes a machine abstraction to make the filtering efficient.
How to view traffic of the specific host specific source host specific destination host specific network specific source network specific destination network specific port
packet-capture command packet-capture host <ipaddress> packet-capture src host <ipaddress> packet-capture dst host <ipaddress> packet-capture net <network address> packet-capture src net <network address> packet-capture dst net <network address> packet-capture port <port-number>
Example packet-capture host 10.10.10.1 packet-capture src host 10.10.10.1 packet-capture dst host 10.10.10.1 packet-capture net 10.10.10.0 packet-capture src net 10.10.10.0 packet-capture dst net 10.10.10.0 packet-capture port 21
52
specific source port specific destination port specific host for the particular port the specific host for all the ports except SSH specific protocol
packet-capture src port <portnumber> packet-capture dst port <portnumber> packet-capture host <ipaddress> and port <port-number> packet-capture host <ipaddress> and port not <port-number> packet-capture proto ICMP packet-capture proto UDP packet-capture proto TCP packet-capture arp packet-capture interface <interface> packet-capture interface <interface> port <port-number>
packet-capture src port 21 packet-capture dst port 21 packet-capture host 10.10.10.1 and port 21 packet-capture host 10.10.10.1 and port not 22
Note: Expression can be combined using logical operators AND or OR and with NOT also. Make sure to use different combinations within single quotes.
ping
Sends ICMP ECHO_REQUEST packets to network hosts Syntax ping [<ipaddress> | <string> | count | interface | interval | numeric | quiet | record-route | size | timeout | tos | ttl] Parameter list & description Keywords & Variables ipaddress string count <number> interface [eth0 | lo] interval <number> numeric quiet record-route size <number> timeout <number> tos <number> ttl <count> Description IP address to be pinged Domain to be pinged Stop sending packets after count Set source address Wait time period in seconds between sending each packet Do not resolve IP address to hostname Display the summary at startup and end Displays the route from response Number of data bytes to be sent Stop sending packets and exit after specified time Set Quality of Service IP Time to Live
53
route
Use to view / manipulate the IP routing table. Route manipulates the kernels IP routing tables. Its primary use is to set up temporary routes to specific hosts or networks via an interface. When the add or del options are used, route modifies the routing tables. Without these options, route displays the current contents of the routing tables Syntax route [add | del | show] Parameter list & description Keywords & Variables add [<ipaddress> [<interface> | dev <interface> | gateway <ipaddress> | metric <count>] | default [gateway <ipaddress> ] | host <ipaddress> | mss <number> | net <ipaddress> <netmask> | window <number> ] del [<ipaddress> [<interface> | dev <interface> | gateway <ipaddress> | metric <count>] | default [gateway <ipaddress> ] | host <ipaddress> | net <ipaddress> <netmask> ] show Description add a new route for gateway and configure value
host, MSS
delete route
Routing table Destination The destination network or destination host Gateway The gateway address or '*' if not set
Genmask The netmask for the destination net; '255.255.255.255' for a host destination and '0.0.0.0' for the default route Flags Possible flags include
U (route is up) H (target is a host) G (use gateway) R (reinstate route for dynamic routing) D (dynamically installed by daemon or redirect) M (modified from routing daemon or redirect) A (installed by addrconf) C (cache entry) ! (reject route) Metric The distance to the target (usually counted in hops). It is not used by recent kernels, but may be needed by routing daemons.
54
Cyberoam Console Guide Ref Number of references to this route. (Not used in the Linux kernel.) Use Count of lookups for the route. Depending on the use of -F and -C this will be either route cache misses (-F) or hits (-C). Iface Interface to which packets for this route will be sent
set
Set entities Syntax set [ advanced-firewall | arp-flux | bandwidth | cache | ha | http_proxy | network | secure_scanning | sslvpn | usermac] Parameter list & description Keywords & Variables advanced-firewall [bypass-stateful-firewal-config [add <dest_host | dest_network | source_host | source_destination> | del <dest_host | dest_network | source_host | source_destination>] | fragmented-traffic (allow | deny) | ftpbounce-prevention (control | data) | midstream-connection-pickup (on | off) | strict-icmp-error-tracking (on | off) | strict-policy (on | off) | tcp-est-idle-timeout <2700 - 43200> | tcp-seq-checking (on | off)] Description Configure advanced firewall setting bypass-stateful-firewal-config Add host or network when the outbound and return traffic does not always traverse through Cyberoam fragmented-traffic - Allow or deny fragmented traffic ftpbounce-prevention - Prevent ftp-bounce attack on FTP control and data connection midstream-connection-pickup Configure midstream connection pickup settings strict-icmp-error-tracking Configure whether incase of ICMP error, existing connection should be deleted from its internal connection state or not. strict-policy on - Applies strict firewall policy. It drops UDP Dst Port 0, TCP Src Port 0 and/or Dst Port 0, Land Attack, Winnuke Attack, Data On TCP Sync, Zero IP Protocol, TTL Value 0 traffic strict-policy off - Disables strict firewall policy tcp-est-idle-timeout - Set Idle Timeout between 2700-432000 seconds for TCP connections in the established state tcp-seq-checking Every TCP packet contains a Sequence Number (SYN) and an Acknowledgement Number (ACK). Cyberoam monitors SYN and ACK numbers within a certain window to ensure that
55
the packet is indeed part of the session. But certain application and third party vendors use non-RFC methods to verify a packet's validity or for some other reason a server may send packets in invalid sequence numbers and expect an acknowledgement. For this reason, Cyberoam offers the ability to disable this feature. By default this option is ON. tcp-window-tracking on - Cyberoam will drop all the packets with invalid sequence number and reduces the window of opportunity for malicious packets to be passed through the Cyberoam. tcp-window-tracking off - Cyberoam will allow all the packets with invalid sequence number ARP flux occurs when multiple ethernet adaptors often on a single machine respond to an ARP query. Due to this, problem with the link layer address to IP address mapping can occur. Cyberoam may respond to ARP requests from both Ethernet interfaces. On the machine creating the ARP request, these multiple answers can cause confusion. ARP flux affects only when Cyberoam has multiple physical connections to the same medium or broadcast domain. on - Cyberoam may respond to ARP requests from both Ethernet interfaces when Cyberoam has multiple physical connections to the same medium or broadcast domain. off - Cyberoam responds to ARP requests from respective Ethernet interface when Cyberoam has multiple physical connections to the same medium or broadcast domain. bandwidth [ default-policy (guaranteed <number> burstable <number> priority <number> | graph | guarantee (enforced | lenient) | max-limit <number>] default-policy and guarantee allows to define the bandwidth restriction on the traffic on which the bandwidth policy is not applied while maxlimit allows to define the link bandwidth. To set the link bandwidth i.e. bandwidth provided by Service Provider and can be used as set bandwidth max-limit <number> and to view the configured limit, use the command show bandwidth maxlimit. Default=100mbps To enforce bandwidth restriction on the traffic on which the bandwidth policy is not applied so that guaranteed bandwidth is available to the users to whom the guaranteed bandwidth policy is applied, configure set bandwidth guarantee enforced. If guarantee is enforced, default bandwidth
arp-flux [ on | off ]
56
policy will be applicable to the traffic on which bandwidth policy is not applied. You can set the guaranteed and burstable bandwidth and priority on this traffic. This bandwidth is applicable on Internal (LAN and DMZ) to External zone (WAN and VPN) traffic and External to Internal zone traffic. Default Guaranteed bandwidth = 0 kbps, Burstable bandwidth = max-limit, priority = 7 (lowest). Guaranteed and burstable bandwidth can be defined as set bandwidth default-policy guaranteed <number> burstable <number> priority <number> If you do not want to enforce the bandwidth restriction on the traffic on which the bandwidth policy is not applied, configure set bandwidth guarantee lenient.
(on | off) |
graph - Opens the Bandwidth Graph Management menu and allows to flush the generated graphs Set Cache Properties Removes all Cached files appliance-model-check Checks both the appliance models before configuring. HA will be configured only if both the models are same. Default - on load-balancing - Enable balancing for HA cluster Set proxy parameters or disable load
http_proxy [av_sessions <integer> | client_sessions <integer> | core_dump (on | off) | debug (on | off)| deny_unknown_proto (yes | no) | host-entries (add <host-name> | delete <host-name>) relay_http_invalid_traffic | rw_buffer_size <integer>| x_forwarded_for (on | off)]
av_sessions no. of files to be scanned simultaneously. Default 20, Range 1- 64 client_session no. of simultaneous client session. Default 1024, Range 1024 8192 One may need to increase when DNS server is responding slowly or number of simultaneous requests are high. core_dump generate dump. Default - OFF debug - Generate http proxy debug log. As it is resource consuming process, ON only when required. Execute show http log debug to view log deny_unknown_proto allow or deny traffic not following HTTPS protocol i.e. invalid traffic through HTTPS port. Default - Yes host-entries add or remove the static DNS entry for http proxy traffic. If the entry is found, DNS request will not be forwarded to root server or configured DNS server.
57
relay_invalid_http_traffic - allow or deny traffic not following HTTP protocol i.e. invalid traffic through HTTP port. Default No rw_buffer_size size of read/write buffer. Default - 4 Kbytes, Range: 1 to 16 Kbytes One can increase in-case of high speed WAN link. x_forwarded_for Include/Exclude XForwarded-For header information from outbound HTTP requests. Default - OFF Applicable only in when Cyberoam is deployed transparent mode. Configure network interface parameters interface speed - Speed mismatch between Cyberoam and 3rd party routers and switches can result into errors or collisions on interface, no connection or traffic latency, slow performance. mss Maximum Segment Size It defines the amount of data that can be transmitted in a single TCP packet Range 576 1460 bytes mtu - Maximum Transmission Unit - It specifies the largest physical packet size, in bytes, that a network can transmit. This parameter becomes an issue when networks are interconnected and the networks have different MTU sizes. Any packets larger than the MTU value are divided (fragmented) into smaller packets before being sent. Default 1500 bytes MTU size is based on addressing mode of the interface. Range 576 1500 bytes for static mode Range 576 1500 bytes for DHCP mode Range 576 1492 bytes for PPPoE mode Enable or disable HTTPS scanning globally i.e. entire HTTPS traffic is scanned if enabled. By default, it is enabled (on). HTTPS scanning is enabled only the specific policy when enabled through Internet Access Policy (IAP) from Web Admin Console. Cyberoam will not scan HTTPS traffic if enabled from IAP but is disabled (off) globally.
network [interface-speed [port <1000fd | 1000hd | 100fd | 100hd | 10fd | 10hd | auto >] | mss [port <number | default>] | mtu [port <number>]]
58
sslvpn [gateway-mode (on | off) | max-clients <number> | max-connections <number> | owa-basic-mode (on | off) | web-access(on | off)]
gateway-mode Control Cyberoam being as a default routing gateway Default on Set to OFF when appliance is not used as a default routing gateway for the internal resources (hosts/networks). max-clients - Control maximum simultaneous requests handled by the web access mode max-connections - Control concurrent number of users that can access via SSL VPN owa-basic-mode - Control enforcement Outlook Web Access basic mode Default off Set to ON to enforce Outlook Web Access Basic mode web-access - Start/stop web access service. Default - on Enable or disable MAC binding If enabled, user will be able to logon and use the Internet from configured computer only and not from any other machine. After enabling, configure MAC addresses for user from Web Admin Console. Default - off One needs to restart management services after enabling or disabling the binding. of
show
Shows various system modules information Syntax show [ access-log | advanced-firewall | antispam | antivirus | bandwidth | date | firewall-rule-log | ftp | ha | http_proxy | login | mail | monitor | network | pppoe | reboot | secure_scanning | sslvpn | system | vpn ] Parameter list & description Keywords & Variables access-log advanced-firewall Description Displays IP addresses of machines from where Cyberoam was (attempt-)accessed Displays advanced firewall configuration: strict Policy, ftpbounce prevention, tcp connection establishment Idle timeout, fragmented traffic policy, midstream connection pickup, TCP seq checking, strict ICMP error tracking
59
configuration, bypass stateful firewall If strict policy is ON, Cyberoam drops UDP packets with destination port 0, TCP packets with source and destination port 0, land attack, winnuke attack, TCP Syn Packets containing data, IP Packet with Protocol Number 0 and IP Packet with TTL Value 0 traffic. Displays antispam log Displays antivirus log Displays default policy configuration, whether guaranteed bandwidth is enforced or lenient and maximum bandwidth limit. In the total-guaranteed-bw, the sum of the applied guaranteed bandwidth is displayed which should be less than max-limit. Displays system Time & Date Displays firewall rule log rules which are not applied successfully Displays ftp log Displays HA log if high availability is enabled Displays http proxy version. IP address wise logs can also be viewed.
date firewall-rule-log ftp [log lines<number> ] ha [log lines <number> ] http_proxy [ config | host-entries | log [access | all | debug | error ] | version ] login mail [ livelog | log | queue] monitor [log lines <number> ] network [ bandwidth | connections | interface-speed | interfaces [all] | mss | mtu] pppoe reboot sslvpn [gateway-mode (on | off) | max-clients <number> | max-connections <number> | owa-basic-mode (on | off) | web-access(on | off)] system [ cpu | devices | disk | dma | filesystems | interrupts | iomem | ioports | logs | memory | messages | modules | partitions | pci | processes | publickey | statistics | uptime ]
Displays who is/was logged on Information about mail subsystem Displays ftp log Show network connections from system, network interface information, interface speed, mtu and mss settings
Displays PPPoE connection status Show system reboot history Displays sslvpn settings
Information about system hardware, resources, and softwares cpu - Displays cpu information like processor, vendor, model, model name, speed, cache size devices - Displays list of System Devices disk - Displays the records of disk space used. Also displays distribution of disk space, used and unused disk space by the various file systems on a volume.
60
dma - Displays DMA information filesystems - Displays filesystem supported interrupts - Displays System Interrupts information iomem - Displays I/O and Memory information Ioports - Displays I/O Ports information logs - Displays PPPoE logs memory - Display system memory status messages - Use to examine or control the kernel ring buffer. Helps to print bootup messages used for debug modules - Displays list of loaded modules partitions - Displays Partition information pci - Displays Peripherals information processes - Displays Process Tree publickey - Displays public key of the appliance statistics - Displays reports about processes, memory, paging, block IO, traps, and cpu activity uptime - Tell how long the system has been running Displays VPN connection status
tcpdump
tcpdump prints out the headers of packets on a network interface that match the boolean expression. Only packets that match expression will be processed by tcpdump. Syntax tcpdump [<text> | count | filedump | hex | interface | llh | no_time | quite | verbose ] Parameter list & description Keywords & Variables <text> Description Packet filter expression. Based on the specified filter, packets are dumped. If no expression is given, all packets are dumped else only packets for which expression is `true' are dumped. The expression consists of one or more primitives. Primitives usually consist of an id (name or number) proceeded by one or more qualifiers. Refer to the below given table on writing filtering expressions. Exit after receiving count packets Tcpdump output can be generated based on criteria required.
count filedump
61
Save tcpdump output in a binary file and can be downloaded from http://<cyberooam_ip>/documents/tcpdump.out File contains the troubleshooting information useful to analyze the traffic with advanced tool like ethereal for Cyberoam Support team. Print each packet (minus its link level header) in hexadecimal notation Listen on <interface> View packet contents with Ethernet or other layer 2 header information Do not print a timestamp on each dump line Print less protocol information so output lines are shorter. Verbose output. For example, the time to live, identification, total length and options in an IP packet are printed. Also enables additional packet integrity checks such as verifying the IP and ICMP header checksum.
How to view traffic of the specific host specific source host specific destination host specific network specific source network specific destination network specific port specific source port specific destination port specific host for the particular port the specific host for all the ports except SSH specific protocol
tcpdump command tcpdump host <ipaddress> tcpdump src host <ipaddress> tcpdump dst host <ipaddress> tcpdump net <network address> tcpdump src net <network address> tcpdump dst net <network address> tcpdump port <port-number> tcpdump src port <port-number> tcpdump dst port <port-number> tcpdump host <ipaddress> and port <port-number> tcpdump host <ipaddress> and port not <port-number> tcpdump proto ICMP tcpdump proto UDP tcpdump proto TCP tcpdump arp tcpdump interface <interface> tcpdump interface <interface> port <port-number>
Example tcpdump host 10.10.10.1 tcpdump src host 10.10.10.1 tcpdump dst host 10.10.10.1 tcpdump net 10.10.10.0 tcpdump src net 10.10.10.0 tcpdump dst net 10.10.10.0 tcpdump port 21 tcpdump src port 21 tcpdump dst port 21 tcpdump host 10.10.10.1 and port 21 tcpdump host 10.10.10.1 and port not 22
Note: Expression can be combined using logical operators AND or OR and with NOT also. Make sure to use different combinations within single quotes.
62
telnet
Use telnet protocol to connect to another remote computer. Syntax telnet [<ipaddress> | source | tos] Parameter list & description Keywords & Variables ipaddress { <port> } Description official name, an alias, or the Internet address of a remote host Port - indicates a port number (address of an application). If a number is not specified, the default telnet port is used. Use given IP address as source address Port - indicates a port number (address of an application). If a number is not specified, the default telnet port is used. IP type-of-service option for the connection
63
traceroute
Use to trace the path taken by a packet from the source system to the destination system, over the Internet.
The Internet is a large and complex aggregation of network hardware, connected together by gateways. Tracking the route one's packets follow (or finding the miscreant gateway that is discarding your packets) can be difficult. Traceroute utilizes the IP protocol `time to live' field and attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along the path to some host. Syntax traceroute [ <ipaddress> | <string> | base-port <port> | first-ttl | icmp | max-ttl | no-frag | probes | source | timeout | tos]
Keywords & Variables <ipaddress> [size <number>] <string> [size <number>] base-port first-ttl icmp max-ttl no-frag probes source timeout tos
Set the base UDP port number used in probes -default 33434 Set the initial time-to-live used in the first outgoing probe packet Use ICMP ECHO instead of UDP datagrams Set the max time-to-live Set the 'don't fragment' bit Probes are sent at each ttl -default 3 Use given IP address as source address Set the timeout -in seconds for a response to a probe default 5 Set the type-of-service
64
Change Log
Revision 1.0 Topic Description Initial Release with following changes in the previous version guide Removed
Menu 5.15 Logging Management Menu 5.16 Restore Backup of Version 7.2 Console Command set Console Command cyberoam Console Command set Console Command show Console Command set Console Command show
Removed - set http_proxy dns_threads and set date as the Cyberoam no longer supports this feature Added cta, dgd Added ha, sslvpn and usermac Added - sslvpn Added host-entries in http_proxy command, bandwidth Added - host-entries in http_proxy command, bandwidth
2.0
65