Cli 72 PDF
Cli 72 PDF
Cli 72 PDF
Interface Reference
ProxySG Command Line Interface Reference
Legal Notice
Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term
“Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com.
Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability,
function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not
assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit
described herein, neither does it convey any license under its patent rights nor the rights of others.
2 of 604
ProxySG Command Line Interface Reference
Document Conventions
The following table lists the typographical and CLI syntax conventions used in this reference.
Convention Definition
fixed-width font, Command line variable that is to be substituted with a literal name or value pertaining to the appropriate
italics facet of your network system.
| Either the parameter before or after the pipe character can or must be entered.
n Case sensitivity. CLI command literals and parameters are not case-sensitive.
n Command abbreviations. You can abbreviate CLI commands, provided you supply enough command characters to be
unambiguous. For example:
# configure terminal
3 of 604
ProxySG Command Line Interface Reference
# conf t
The help command displays how to use CLI help. For example:
> help
Help may be requested at any point in a command by typing a question mark '?'.
1. For a list of available commands, enter '?' at the prompt.
2. For a list of arguments applicable to a command, precede the '?' with a space (e.g. 'show ?')
3. For help completing a command, do not precede the '?' with a space (e.g. 'sh?')
> ?
display Display a text based url
enable Turn on privileged commands
exit Exit command line interface
help Information on help
inline Install configurations from console input
ping Send echo messages
ping6 Send IPv6 echo messages
show Show running system information
test Test subsystems
traceroute Trace route to destination
traceroute6 Trace route to IPv6 destination
To access a command-specific parameter list, type the command name, followed by a space, followed by a question mark.
4 of 604
ProxySG Command Line Interface Reference
You must be in the correct mode—standard or privileged—to access the appropriate help information. For example, to get
command completion help for pcap:
# pcap ?
filter Setup the current capture filter
info Display current capture information
start Start the capture
stop Stop the capture
transfer Transfer captured data to ftp site
To access the correct spelling and syntax, given a partial command, type the first letter, or more, of the command, followed by
a question mark (no spaces).
You must be in the correct mode—standard or privileged—to access the appropriate help information. For example:
>p?
ping ping6
# p?
# pcap ping ping6 policy
Issuing this command causes the CLI to prompt you to enter a password again.
To prevent this from occurring, do one of the following to enter a password starting with “!”:
Press ENTER after specifying the username to display the password prompt. At the prompt, you can type the password
without having to escape it:
5 of 604
ProxySG Command Line Interface Reference
6 of 604
ProxySG Command Line Interface Reference
Document Overview
SGOS Upgrade/Downgrade Guide Steps for upgrading or downgrading SGOS. Also covers behavior changes and
policy deprecations.
https://www.symantec.com/docs/DOC9794
SGOS Administration Guide Detailed information for configuring and managing the ProxySG appliance.
https://www.symantec.com/docs/DOC11607
ProxySG Web Visual Policy Manager How to create and implement policy in the ProxySG appliance's web-based Visual
WebGuide Policy Manager, including layer interactions, object descriptions, and advanced
tasks.
https://www.symantec.com/docs/DOC11610
Legacy Visual Policy Manager Reference How to create and implement policy in the ProxySG appliance's legacy Visual Policy
Manager.
https://www.symantec.com/docs/DOC11611
Content Policy Language Reference CPL gestures available for writing the policy by which the ProxySG appliance
evaluates web requests.
https://www.symantec.com/docs/DOC11608
Required ports, protocols, and services for Basic configurations, and some commonly used options, for ports and protocols.
the ProxySG appliance
https://www.symantec.com/docs/INFO5294
ProxySG Security Best Practices Best-effort security considerations for your ProxySG deployment.
https://www.symantec.com/docs/DOC11613
First Steps Deployment Guide How to get a ProxySG up and running in a Secure Web Gateway (SWG)
deployment.
http://www.symantec.com/docs/DOC10940
SSL Proxy Deployment Guide Best practices for deploying the SSL proxy. The SSL proxy improves visibility into
SSL traffic, allowing security policies and logging to be applied to encrypted
http://www.symantec.com/docs/DOC10325 requests and responses, and can enhance performance by caching encrypted data.
Reverse Proxy WebGuide How to deploy a ProxySG appliance as a front-end for Internet-based users to
access secure application, content, and web servers.
http://www.symantec.com/docs/DOC9782
Web Application Firewall Solutions Guide How to configure Symantec WAF solution to protect your web servers, accelerate
web content, and simplify operation.
http://www.symantec.com/docs/DOC10451
7 of 604
ProxySG Command Line Interface Reference
Document Overview
Secure Web Gateway - Content Analysis Provides a secure and customizable policy model for bypassing content scanning to
Policy Best Practices Improvement improve the user experience where needed or save resources by excluding low-
risk/high-volume traffic. This document identifies weak policy conditions and is
http://www.symantec.com/docs/DOC10920 intended to reduce risk by using different sets of policy conditions.
SGOS 7.2.x Documentation Full list of documentation published for SGOS 7.2.x.
https://www.symantec.com/docs/DOC11612
SGOS Release Notes Changes, issues, fixes, and limitations pertaining to SGOS releases. Also includes
any related security advisory (SA) fixes.
SGOS Release Notes are available on the
Downloads page. Log in to MySymantec
with your MySymantec credentials to access
the release image and release notes.
8 of 604
ProxySG Command Line Interface Reference
Tip: The CLI command mode structure is hierarchical. From privileged mode, you can issue
privileged and standard mode commands. From privileged configure mode, you can issue
standard, privileged, and privileged mode commands.
From standard mode, you can view but not change configuration settings. This mode can be password protected, but it is not
required.
9 of 604
ProxySG Command Line Interface Reference
> display
Synopsis
Display the content (such as HTML or Javascript) for the specified fully-qualified URL. This content is displayed one screen at
a time. —More— at the bottom of the terminal screen indicates that there is additional content. Press the spacebar to display the
next batch of content; press Enter to display one additional line of content.
Syntax
> display url
Example
> display https://www.symantec.com
<!DOCTYPE html>
<html lang="en">
<head>
<!--[if gt IE 8]><!-->
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<!--<![endif]-->
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<meta name="keywords">
<meta name="description" content="Symantec provides security products and solutions to protect
small, medium, and enterprise businesses from advanced threats, malware, and other cyber attacks.">
...
10 of 604
ProxySG Command Line Interface Reference
> enable
Synopsis
Enter privileged mode. Privileged mode commands enable you to view and change your configuration settings. A password is
always required. This command has no parameters or subcommands.
Syntax
> enable
Example
> enable
Enable Password:******
# conf t
# (config)
See Also
n "Privileged Mode Commands" on page 56
11 of 604
ProxySG Command Line Interface Reference
> exit
Synopsis
Exits the CLI. This command has no parameters or subcommands.
Syntax
> exit
Example
> exit
12 of 604
ProxySG Command Line Interface Reference
> help
See "Accessing Quick Command Line Help" on page 4 for details on this command.
13 of 604
ProxySG Command Line Interface Reference
> ping
Synopsis
Verify whether an Internet Protocol version 4 (IPv4) host is reachable across a network.
Syntax
> ping {IPv4_address | hostname} [routing_domain_name]
Example
> ping 10.25.36.47
PING 10.25.36.47 (10.25.36.47): 56 data bytes
64 bytes from 10.25.36.47: icmp_seq=0 ttl=64 time=0.126 ms
64 bytes from 10.25.36.47: icmp_seq=1 ttl=64 time=0.143 ms
64 bytes from 10.25.36.47: icmp_seq=2 ttl=64 time=0.102 ms
64 bytes from 10.25.36.47: icmp_seq=3 ttl=64 time=0.096 ms
64 bytes from 10.25.36.47: icmp_seq=4 ttl=64 time=0.123 ms
--- 10.25.36.47 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.096/0.118/0.143/0.017 ms
14 of 604
ProxySG Command Line Interface Reference
> ping6
Synopsis
Verify whether an Internet Protocol version 6 (IPv6) host is reachable across a network.
Syntax
> ping {IPv6_address | hostname} [routing_domain_name]
Example
> ping6 fe80::2d0:83ff:fe05:780%0:0
PING6(56=40+8+8 bytes) fe80::2d0:83ff:fe05:780 --> fe80::2d0:83ff:fe05:780%0:0
16 bytes from fe80::2d0:83ff:fe05:780%0:0, icmp_seq=0 hlim=64 time=0.799 ms
16 bytes from fe80::2d0:83ff:fe05:780%0:0, icmp_seq=1 hlim=64 time=0.761 ms
16 bytes from fe80::2d0:83ff:fe05:780%0:0, icmp_seq=2 hlim=64 time=1.630 ms
16 bytes from fe80::2d0:83ff:fe05:780%0:0, icmp_seq=3 hlim=64 time=1.703 ms
16 bytes from fe80::2d0:83ff:fe05:780%0:0, icmp_seq=4 hlim=64 time=3.745 ms
--- fe80::2d0:83ff:fe05:780%0:0 ping6 statistics ---
5 packets transmitted, 5 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.761/1.728/3.745/1.084 ms
15 of 604
ProxySG Command Line Interface Reference
> show
Synopsis
Displays system information. You must be in privileged mode to show all available commands.
Syntax
> show {subcommand}
Subcommands
> show accelerated-pac
Displays the identifier of the appliance. The appliance identifier is the same as the value returned in the access log and policy
substitution x-bluecoat-appliance-identifier. Refer to theProxySG Log Fields and CPL Substitutions Reference.
Displays Application Attributes settings. See "> show application-attributes" on page 27. You must have an Application
Attributes database and a valid subscription in order to use this feature. This command produces the same output as # (config
application-attributes) view.
Displays Application Classification settings. See "> show application-classification" on page 28. You must have an
Application Classification database and a valid subscription in order to use this feature. This command produces the same
output as # (config application-classification) view.
Application protection settings. You must have an Application Protection database and a valid subscription in order to use this
feature. This command produces the same output as # (config application-protection) view.
16 of 604
ProxySG Command Line Interface Reference
Displays bandwidth gain status, mode, and the "substitute get for get-if-modified-since," "substitute get for HTTP 1.1
conditional get," and "never refresh before specified object expiry" settings.
Displays CachePulse statistics, such as license information, registration status, the download URL for the CachePulse
database, results of the last download, and the last successful download. This command produces the same output as #
(config cachepulse) view.
Displays data regarding cache refresh rates and settings and caching policies.
17 of 604
ProxySG Command Line Interface Reference
> show content-filter {bluecoat | categories | iwf | local | optenet | proventia | status | youtube}
Displays settings for Symantec Web Filter or the specified third-party content-filtering vendors. Display current content-
filtering status using the status subcommand.
Displays disk information, including slot number, vendor, product ID, revision and serial number, capacity, and status, about
all disks or a specified disk.
Displays downloaded configuration path information, including the policy list, accelerated PAC file, HTTP error page, RIP
settings, static route table, upgrade image, and WCCP settings.
Shows all of the entitlements for Intelligence Services bundles. If the appliance is not entitled for Intelligence Services
bundles, the CLI indicates No entitlements. Otherwise, the CLI displays the name of each Intelligence Services bundle to
which you are entitled and the expiration date.
18 of 604
ProxySG Command Line Interface Reference
Displays advanced forwarding settings, including download-via-forwarding, health check, and load balancing status, and the
definition of forwarding hosts/groups and advanced forwarding rules.
Displays geolocation settings. See "> show geolocation" on page 40. You must have a Geolocation database and a valid
subscription in order to use this feature.
Displays HTTP and HTTP/2 statistics, including HTTP statistics version number, number of connections accepted by HTTP,
number of persistent connections that were reused, and the number of active client connections.
19 of 604
ProxySG Command Line Interface Reference
Displays ProxySG appliance system information, listing version release numbers, boot and lock status, and timestamp
information. Specifying verbose displays more details such as the signature for each system image, the signature of the boot
chain, and the boot chain version. You can compare the signature to known values to confirm hat the installed images are
valid. For instructions, refer to http://www.symantec.com/docs/TECH245154.
Displays current settings for IPv6-related options (bypass IPv6 traffic, auto-linklocal, forwarding).
Displays information about the management services enabled or disabled on the system.
Shows TCP/IP Neighbor Discovery Protocol (NDP) table. NDP performs functions for IPv6 similar to ARP for IPv4.
20 of 604
ProxySG Command Line Interface Reference
> show policy {config | executable | listing | order | proxy-default | source | tenant}
Displays information about proxy services. See "> show proxy-services" on page 43.
Displays system restart settings, including core image information and compression status.
Displays information on RIP settings, including parameters and configuration, RIP routes, and RIP statistics.
21 of 604
ProxySG Command Line Interface Reference
Displays the settings for the shell, including the maximum connections, the prompt, and the realm- and welcome-banners.
Displays SMTP configuration, including the server domain name or IP address, port number, and sender’s email address.
Displays SNMP statistics, including status and MIB variable and trap information
Displays source listings for installable lists, such as the license key, policy files, RIP settings, static route table, and WCCP
settings files.
# show statistics-export
Displays information for exporting statistics. This command displays the same information as the # (config statistics-export)
view command.
22 of 604
ProxySG Command Line Interface Reference
Displays current system status information, including configuration information and general status information.
Displays information about configured streaming services, and client and total bandwidth configurations and usage.
Displays ProxySG appliance hardware and software version and release information and backplane PIC status.
Displays WCCP configuration and statistics information. You can also view WCCP service-group information.
Example
> show caching
Refresh:
Estimated access freshness is 100.0%
23 of 604
ProxySG Command Line Interface Reference
24 of 604
ProxySG Command Line Interface Reference
Syntax
> show access-log {subcommand}
Subcommands
> show access-log default-logging
Example
> show access-log format brief
Formats:
25 of 604
ProxySG Command Line Interface Reference
main
streaming
ssl
squid
ncsa
bcreportermain_v1
bcreporterssl_v1
bcreporterstreaming_v1
bcreporterwarp_v1
dns
collaboration
mapi-http
clientagent_v1
im
p2p
cifs
mapi
bcreportercifs_v1
bcsecurityanalytics_v1
26 of 604
ProxySG Command Line Interface Reference
Syntax
> show application-attributes [subcommand]
Subcommands
> show application-attributes
Displays the download URL for the Application Attributes database, and results of the last download and the last successful
download.
Displays possible values for a specified application attribute. If an attribute name contains spaces, enclose it in double
quotation marks ("). When writing policy that includes the request.application.attribute_name= condition, you can use
this subcommand to ensure that the CPL parameters are valid.
Example
> show application-att possible-values cobit
True/False
27 of 604
ProxySG Command Line Interface Reference
Syntax
> show application-classification [subcommand]
Subcommands
> show application-classification
Displays the download URL for the Application Classification database, and results of the last download and the last
successful download.
Displays all applications in the specified group or that support the specified operation. If no parameter is specified, displays all
applications.
Example
> show application-classification operations applications webex
Host Meeting
Join Meeting
Login
Share Application
Upload Files
28 of 604
ProxySG Command Line Interface Reference
Syntax
> show bandwidth-management [subcommand]
Subcommands
> show bandwidth-management
Displays the bandwidth-management configuration for the specified bandwidth class . If you do not specify a bandwidth class,
displays the bandwidth-management configuration for the system.
Displays the bandwidth-management statistics for the specified bandwidth class. If you do not specify a bandwidth class,
displays the bandwidth-management statistics for the system.
Example
> show bandwidth-management configuration
Bandwidth Management Enabled
See Also
n "Managing Bandwidth" in SGOS Administration Guide
29 of 604
ProxySG Command Line Interface Reference
Syntax
> show bridge {subcommand}
Subcommands
> show bridge configuration [bridge_name]
Displays the bridge configuration for the specified bridge_name or for all interfaces on the system.
Displays the bridge forwarding table for the specified bridge_name or for all interfaces on the system.
Displays the bridge statistics for the specified bridge_name or for all interfaces on the system.
Example
> show bridge configuration
Bridge passthru-0 configuration:
Interface 0:0
Internet address: 10.9.59.246
Internet subnet: 255.255.255.0
MTU size: 1500
Spanning tree: disabled
Allow intercept: enabled
Reject inbound: disabled
Status: autosensed full duplex, 100 megabits/sec network
Interface 0:1
MTU size: 1500
Spanning tree: disabled
Allow intercept: enabled
Reject inbound: disabled
Status: autosensed no link
30 of 604
ProxySG Command Line Interface Reference
Syntax
> show cifs {subcommand}
Subcommands
> show cifs configuration
Displays the CIFS configuration settings, such as whether read-ahead is enabled/disabled and write-back is full or none. For
more information on these settings, see"# (config cifs)" on page 206 .
Displays contents of the specified directory located in the appliance cache, where url is in the format:
cifs://server/share/path-to-file
To enter file or directory names that contain spaces, substitute each space with the following escape code: %20. If the path-to-
file contains a percent sign, substitute the % with %25.
The output lists each file or directory name, the date and time the file/directory was last updated, and the file size.
Note: You must be in enable mode to use the > show cifs directory command.
Displays information about a specific CIFS file or directory located in the appliance cache, where url is in the format:
cifs://server/share/path-to-file
To enter file or directory names that contain spaces, substitute each space with the following escape code: %20. If the path-to-
file contains a percent sign, substitute the % with %25.
The output lists the object size, and when the file/directory was created, last accessed, and last modified.
Note: You must be in enable mode to use the > show cifs file command.
31 of 604
ProxySG Command Line Interface Reference
Example
> enable
Enable Password:
# show cifs file cifs://atlas/public/prepop/a/a1.txt
Type: file
Cached object size: 409,121
Data bytes in cache: 409,121
Creation Time: Thu, 09 Jul 2009 03:36:15 UTC
Last Access Time: Wed, 14 Oct 2009 17:36:25 UTC
Last Write Time: Thu, 09 Jul 2009 03:36:24 UTC
Change Time: Thu, 09 Jul 2009 03:36:24 UTC
32 of 604
ProxySG Command Line Interface Reference
Syntax
> show clients [subcommand]
Subcommands
> show clients
Example
> show clients web-filtering
Client Manager Web-filter configuration
Activation : enabled
Safe Search : enabled
HTTPS Filtering : enabled
33 of 604
ProxySG Command Line Interface Reference
34 of 604
ProxySG Command Line Interface Reference
Syntax
> show commands [subcommand]
Subcommands
> show commands
35 of 604
ProxySG Command Line Interface Reference
Example
>show commands
-----------------------------------------------------------
Root non-privileged commands
-----------------------------------------------------------
1:display Display a text based url
<url>
36 of 604
ProxySG Command Line Interface Reference
Syntax
> show diagnostics {subcommand}
Subcommands
> show diagnostics configuration
Example
> show diagnostics snapshot
Snapshot sysinfo
Target: /sysinfo
Status: Enabled
Interval: 1440 minutes
To keep: 100
To take: Infinite
Next snapshot: 2019-07-12 00:00:00 UTC
Snapshot sysinfo_stats
Target: /sysinfo-stats
Status: Enabled
Interval: 60 minutes
To keep: 168
To take: Infinite
Next snapshot: 2019-07-11 17:00:00 UTC
37 of 604
ProxySG Command Line Interface Reference
The Status line in output displays information based on the current status of the selected hard disk drive:
n Present: Hard disk drive is mounted correctly and available for access by the appliance.
n Initializing: Hard disk drive is in the process of being mounted for use by the appliance.
n Offline: Hard disk drive is offline and no longer usable by the appliance.
n Present (partition offline): Drive partition is down but the disk drive is active.
Syntax
> show disk {subcommand}
Subcommands
> show disk disk_number
Example
> show disk 1
Vendor: SEAGATE
Product: ST9250410AS
Revision: 0002SDM1
Disk serial number: 5VGCEJJQ
Capacity: 250059350016 bytes
Pre 6.2 compatible: no
Status: present
38 of 604
ProxySG Command Line Interface Reference
Syntax
Subcommands
> show exceptions
Example
Display the exception called 'refresh'.
$(exception.summary):
Authorized
$(exception.details):
Click <a href="$(redirect.location)">here</a> if you are not automatically redirected.
HTTP $(exception.code):
200
See Also
n "# (config exceptions)" on page 293
39 of 604
ProxySG Command Line Interface Reference
Syntax
> show geolocation [subcommand]
Subcommands
> show geolocation
Displays the download URL for the geolocation database, and results of the last download and the last successful download.
Displays a list of countries defined in the geolocation database (if one has been downloaded). In addition, this subcommand
also displays system-defined conditions for country names when geolocation is not enabled or licensed, or if the database is
otherwise unavailable.
Example
> show geolocation
License Type: Demo
Licensed Until: Wed, 02 Oct 2019 00:00:00 UTC
Service: Enabled
Download method: Direct
Last successful download:
Time: Tue, 16 Jul 2019 15:45:06 UTC
Downloaded from: https://subscription.es.bluecoat.com/geoip/database
Version: 20190716
See Also
n "Geolocation" in SGOS Administration Guide
40 of 604
ProxySG Command Line Interface Reference
Syntax
> show ip-stats {subcommand}
Subcommands
> show ip-stats all
Displays TCP/IP statistics for all interfaces or for the specified number (0 to 7).
Displays IP statistics.
Example
> show ip-stats summary
; TCP/IP Statistics
41 of 604
ProxySG Command Line Interface Reference
42 of 604
ProxySG Command Line Interface Reference
Syntax
> show proxy-services [subcommand]
Subcommands
> show proxy-services
43 of 604
ProxySG Command Line Interface Reference
Example
> show proxy-services services intercept
Service Name: Explicit HTTP
Service Group: Standard
Proxy: HTTP
Attributes: use-adn, adn-byte-cache, adn-compress, byte-cache-priority normal, early-intercept
Source IP Destination IP Port Range Action
<All> <Explicit> 8080 Intercept
<All> <Explicit> 80 Intercept
44 of 604
ProxySG Command Line Interface Reference
Syntax
> show routing-domain [subcommand]
Subcommands
> show routing-domain
Example
> show routing-domain Marketing_144
Routing domain Marketing_144 configuration:
Associated interfaces: 1:0.144
See Also
n "Routing on the Appliance" in SGOS Administration Guide
45 of 604
ProxySG Command Line Interface Reference
Syntax
> show smbv2 {subcommand}
Subcommands
> show smbv2 configuration
Example
> show smbv2 configuration
SMBv2: Enabled
See Also
n "> show cifs" on page 31
46 of 604
ProxySG Command Line Interface Reference
Syntax
> show sources {subcommand}
Subcommands
> authentication-form form_name
47 of 604
ProxySG Command Line Interface Reference
Example
> show sources socks-gateways
# Current SOCKS Gateways Configuration
# No update
# Connection attempts to SOCKS gateways fail: closed
socks_fail closed
# 0 gateways defined, 64 maximum
# SOCKS gateway configuration
# gateway <gateway-alias> <gateway-domain> <SOCKS port>
# [version=(4|5 [user=<user-name> password=password]
# [request-compression=yes|no])]
# Default fail-over sequence.
# sequence <gateway-alias> <gateway-alias> ...
# The default sequence is empty.
# SOCKS Gateways Configuration Ends
48 of 604
ProxySG Command Line Interface Reference
Syntax
> show ssl {subcommand}
Subcommands
> show ssl ccl [list_name]
Displays all CA certificate lists configured on the appliance, or displays a summary of all CA certificates in the specified CCL.
Displays all external certificate lists configured on the appliance, or displays a summary of all external certificates in the
specified ECL.
Displays a summary of all SSL clients configured on the appliance, or displays a summary of the specified SSL client.
Example
> show ssl ssl-client
SSL-Client Name Keyring CCL Protocol
-------------------- -------------------- -------------------- -------------------------
default default browser-trusted tlsv1 tlsv1.1 tlsv1.2
49 of 604
ProxySG Command Line Interface Reference
Syntax
> show streaming {subcommand}
Subcommands
> show streaming adobe-hds configuration
50 of 604
ProxySG Command Line Interface Reference
Example
> show streaming configuration
; Streaming Configuration
max-client-bandwidth: unlimited
max-gateway-bandwidth: unlimited
multicast address: 224.2.128.0 - 224.2.255.255
multicast port: 32768 - 65535
multicast TTL: 16
See Also
n "Managing Streaming Media" in SGOS Administration Guide
51 of 604
ProxySG Command Line Interface Reference
> test
Synopsis
Tests subsystems. A test http get command to a particular origin server or URL, for example, can verify Layer 3
connectivity as well as upper-layer functionality.
Syntax
> test {subcommand}
Subcommands
> test adn IP_server_address port
Tests the ADN connection by connecting to a server. The IP server address can be either IPv4 or IPv6.
Displays values for the specified application and attribute. You must have an Application Attributes database and a valid
subscription in order to use this feature.
Displays the categories for the specified URL, as determined by the content filter data source and policy.
Performs a DNS lookup and displays debugging information that describes the lookup. If you specify DNS_server_IP,
bypass-cache is implied and is not required.
Displays the country associated with an IP address. You must have a Geolocation database and a valid subscription in order
to use this feature.
Perform a test of proxy services to determine how a specific request will be handled (bypass/intercept) by the ProxySG
appliance, based on client address and destination address and port.
52 of 604
ProxySG Command Line Interface Reference
Displays the Threat Risk Level of the specified URL. You must have a Threat Risk Levels database and a valid subscription in
order to use this feature.
Example
> test http get symantec.com
53 of 604
ProxySG Command Line Interface Reference
> traceroute
Synopsis
Traces the route to a destination. This command can be helpful in determining where a problem might lie between two points in
a network.
Use this command to trace the network path from a ProxySG appliance back to a client or to a specific origin Web server.
You can also use this command from your client station (if supported) to trace the network path between the client, an
ProxySG appliance, and a Web server. Microsoft operating systems generally support trace route from a command prompt.
The syntax from a Microsoft-based client is: tracert [ip | hostname].
Syntax
> traceroute {IP_address | hostname}
Example
> traceroute 10.25.36.47
Type escape sequence to abort.
1 10.169.0.1 1 1 0
2 155.64.2.108 0 * 1
See Also
n "> traceroute6" on the facing page
54 of 604
ProxySG Command Line Interface Reference
> traceroute6
Synopsis
Traces the route to an IPv6 destination. This command can be helpful in determining where a problem might lie between two
points in a network.
Use this command to trace the network path from a ProxySG appliance back to a client or to a specific origin Web server.
You can also use this command from your client station (if supported) to trace the network path between the client, an
ProxySG appliance, and a Web server. Microsoft operating systems generally support trace route from a command prompt.
The syntax from a Microsoft-based client is: tracert -6 [ip | hostname].
Syntax
> traceroute6 {IPv6_address | hostname}
Example
> traceroute6 0:0:0:0:0:FFFF:9B40:8A65
% traceroute6[22]: bind
See Also
n "> traceroute" on the previous page
55 of 604
ProxySG Command Line Interface Reference
Tip: The CLI command mode structure is hierarchical. From privileged mode, you can issue
privileged and standard mode commands. From privileged configure mode, you can issue
standard, privileged, and privileged mode commands.
Privileged mode provides a set of commands that enable you to view, manage, and change ProxySG appliance settings for
features such as log files, authentication, caching, DNS, HTTPS, packet capture filters, and security. You can cannot
configure functionality such as SSL Proxy, HTTP compression.
The prompt changes from a greater-than sign (>) to a pound sign (#) to indicate that you are in privileged mode.
Enter privileged mode from standard mode by using the enable command:
> enable
Enable Password:
#
56 of 604
ProxySG Command Line Interface Reference
# acquire-utc
Synopsis
Acquire the Universal Time Coordinates (UTC) from a Network Time Protocol (NTP) server. To manage objects, the appliance
must know the current UTC time. Your ProxySG appliance comes pre-populated with a list of NTP servers available on the
Internet, and attempts to connect to them in the order specified on the NTP tab. If the appliance cannot access any of the listed
NTP servers, the UTC time must be set manually. For instructions on how to set the UTC time manually, refer to “Accessing
the Appliance” in the SGOS Administration Guide. This command has no parameters or subcommands.
Syntax
# acquire-utc
Example
# acquire-utc
NTP update in progress, please check event log for further messages.
See Also
n "Accessing the Appliance" in SGOS Administration Guide
57 of 604
ProxySG Command Line Interface Reference
# bridge
Synopsis
Clears bridge data.
Syntax
# bridge {subcommand}
Subcommands
# bridge clear-statistics bridge_name
Example
# bridge clear-statistics bridge1
ok
See Also
n "Hardware and Software Bridges" in SGOS Administration Guide
58 of 604
ProxySG Command Line Interface Reference
# cancel-upload
Synopsis
Cancels a pending access log upload. This command allows you to stop repeated upload attempts if the Web server becomes
unreachable while an upload is in progress. Iif the log is waiting to retry the upload,the command sets log uploading back to
idle. If the log is in the process of uploading, a flag is set to the log. This flag sets the log back to idle if the upload fails.
Syntax
# cancel-upload {subcommand}
Subcommands
# cancel-upload all
Example
# cancel upload all
ok
See Also
n "Creating Custom Access Log Formats” in SGOS Administration Guide
59 of 604
ProxySG Command Line Interface Reference
# clear-arp
Synopsis
Clears the Address Resolution Protocol (ARP) table. ARP tables are used to correlate an IP address to a physical machine
address recognized only in a local area network. ARP provides the protocol rules for providing address conversion between a
physical machine address (also known as a Media Access Control or MAC address) and its corresponding IP address, and
vice versa. This command has no parameters or subcommands.
Syntax
# clear-arp
Example
# clear-arp
ok
60 of 604
ProxySG Command Line Interface Reference
# clear-cache
Synopsis
Clears the byte, dns, or object cache. This can be done at any time. When any cache is cleared, performance slows down until
the cache is repopulated.
Syntax
# clear-cache [subcommand]
Subcommands
# clear-cache
# clear-cache byte-cache
# clear-cache dns-cache
# clear-cache [object-cache]
Example
# clear-cache
ok
61 of 604
ProxySG Command Line Interface Reference
# clear-errored-connections
Synopsis
Clears historical errored proxied sessions, errored bypassed connections, and errored ADN inbound connections. To view
errored proxied sessions in the Management Console, select Statistics > Sessions > Errored Sessions > Proxied
Sessions. To view errored bypassed connections in the Management Console, select Statistics > Sessions > Errored
Sessions > Bypassed Connections. To view errored ADN inbound connections in the Management Console, select
Statistics > Active Sessions > ADN Inbound Connections.
Syntax
# clear-errored-connections {subcommand}
Subcommands
# clear-errored-connections proxied sessions
Example
# clear-errored-connections adn-inbound sessions
ok
62 of 604
ProxySG Command Line Interface Reference
# clear-statistics
Synopsis
This command clears the bandwidth-management, persistent, and Windows Media, Real Media, and QuickTime streaming
statistics collected by the ProxySG appliance. To view streaming statistics from the CLI, use either the > show streaming
{quicktime | real-media | windows-media} statistics or the > show bandwidth-management statistics [bandwidth_class]
commands.
Syntax
# clear-statistics {subcommand}
Subcommands
# clear-statistics authentication [error | realm realm_name]
Clears the authentication error statistics or clears statistics for the specified authentication realm.
Clears all bandwidth-management statistics or clears statistics for the specified bandwidth-management class.
# clear-statistics cifs
# clear-statistics default-services
# clear-statistics epmapper
# clear-statistics export
Clears export statistics. Once this command is run, the next export only includes the data accumulated since the clear-
statistics export command was run.
Clears statistics that persist after a reboot. You can clear all persistent statistics, or, since statistics are kept in a naming
convention of group:stat, you can limit the statistics cleared to a specific group. Common prefixes include HTTP, SSL, and
SOCKS.
# clear-statistics quicktime
63 of 604
ProxySG Command Line Interface Reference
# clear-statistics real-media
# clear-statistics windows-media
Example
# clear-statistics windows-media
ok
64 of 604
ProxySG Command Line Interface Reference
# configure
Synopsis
Manages ProxySG appliance features.
Syntax
# configure {subcommand}
Subcommands
# configure network url
Downloads a web-accessible script (such as a configuration file) from the specified HTTP network host, and implements the
changes in the script onto the system.
# configure terminal
Example
# configure network http://1.1.1.1/fconfigure.txt
ok
See Also
n "Configure Mode Commands" on page 120
65 of 604
ProxySG Command Line Interface Reference
# disable
Synopsis
Returns you to standard mode from privileged mode. This command has no parameters or subcommands.
Syntax
# disable
Example
# disable
>
See Also
n "> enable" on page 11
66 of 604
ProxySG Command Line Interface Reference
# disk
Synopsis
Use the disk command to take a disk offline or to re-initialize a disk.
On a multi-disk ProxySG appliance, after issuing the disk reinitialize disk_number command, complete the reinitialization by
setting it to empty and copying pre-boot programs, boot programs and starter programs, and system images from the master
disk to the re-initialized disk. The master disk is the leftmost valid disk. Valid indicates that the disk is online, has been
properly initialized, and is not marked as invalid or unusable.
Note: If the current master disk is taken offline, reinitialized or declared invalid or unusable, the
leftmost valid disk that has not been reinitialized since restart becomes the master disk. Thus
as disks are reinitialized in sequence, a point is reached where no disk can be chosen as the
master. At this point, the current master disk is the last disk. If this disk is taken offline,
reinitialized, or declared invalid or unusable, the ProxySG appliance is restarted.
Reinitialization is done without rebooting the system, although the system should not proxy traffic during reinitialization. The
ProxySG appliance operations, in turn, are not affected, although during the time the disk is being reinitialized, that disk is not
available for caching. Note that only the master disk reinitialization might restart the ProxySG appliance.
Syntax
# disk {subcommand}
Subcommands
# disk offline disk_number
Decreases the object capacity on all disks so that they will be compatible with releases prior to SGOS 6.2.
On systems that have had their object store capacity increased with the # disk increase-object-limit command, you will
want to decrease the object limit before downgrading to pre-6.2 releases. Note that this command preserves configuration,
registry settings, policy, licensing files, and the appliance birth certificate; it does not retain cache contents, access logs,
67 of 604
ProxySG Command Line Interface Reference
event log, or sysinfo snapshots. If the disk already has the decreased object capacity, the disk will not be modified; the
command will be aborted. The force option decreases the object limit without prompting or warning. This command will not
work on a single disk system.
Warning: If you do not decrease the object store capacity before downgrading to a pre-6.2
image, the disks will be re-initialized after the downgrade and all data and settings will be lost.
Increase disk object capacity on multi-disk, large-drive systems in order to store more objects on each disk. The increased
object capacity is the default for all multi-disk systems that are manufactured with SGOS 6.2; to get this extra capacity on
other systems, you have to initiate this command. Note that the disks will be re-initialized in a format that is not compatible
with SGOS releases prior to 6.2. After disk re-initialization, the configuration, registry settings, policy, licensing files, and the
appliance birth certificate are preserved; it does not retain cache contents, access logs, event log, and sysinfo snapshots. If
the disk already has the increased object capacity, the disk will not be modified; the command will be aborted. This command
will not work on a single disk system.
The force option increases the object limit without prompting or warning.
Warning: Before downgrading to a pre-6.2 release, you must use the # disk decrease-
object-limit command to decrease the object store capacity. If you fail to do this, all data
and settings will be lost after the downgrade.
Example
# disk offline 3
ok
# disk reinitialize 3
ok
68 of 604
ProxySG Command Line Interface Reference
# display
See > display for details on this command.
69 of 604
ProxySG Command Line Interface Reference
# enable
Synopsis
Enters privileged mode. Privileged mode commands enable you to view and change your configuration settings. A password is
always required. This command has no parameters or subcommands.
Syntax
# enable
Example
# enable
Enable Password:
#
See Also
n "# disable" on page 66
70 of 604
ProxySG Command Line Interface Reference
# entitlements
Synopsis
Executes commands related to entitlements.
Syntax
# entitlements {subcommand}
Subcommands
# entitlements refresh
Example
# entitlements refresh
This may take a few minutes. Please wait...
ok
71 of 604
ProxySG Command Line Interface Reference
# exit
See "> exit" on page 12 for details on this command.
See Also
n "# disable" on page 66
72 of 604
ProxySG Command Line Interface Reference
# fips-mode
Synopsis
Note: This release is not FIPS-capable; using this command results in an error. Refer to the
SGOS 7.2.x Release Notes and the SGOS Upgrade/Downgrade document for more
information.
Enables and disables FIPS mode. When you enter FIPS mode, all previous configurations are destroyed. When you exit FIPS
mode, all FIPS configurations are destroyed.
Syntax
# fips-mode {subcommand}
Subcommands
# fips-mode disable
# fips-mode enable
Example
# fips-mode enable
ok
73 of 604
ProxySG Command Line Interface Reference
# help
See "Accessing Quick Command Line Help" on page 4 for details on this command.
74 of 604
ProxySG Command Line Interface Reference
# hide-advanced
Synopsis
Disable advanced commands.
Syntax
# hide-advanced {subcommand}
Subcommands
# hide-advanced all
# hide-advanced expand
Example
# hide-advanced expand
ok
See Also
n "# reveal-advanced" on page 96
75 of 604
ProxySG Command Line Interface Reference
# inline
Synopsis
Installs lists based on your terminal input.
Discussion
The easiest way to create installable lists, such as forwarding hosts, PAC files, and policy files, among others, is to take an
existing file and modify it, or to create the text file on your local system, upload the file to a server, and download the file to the
ProxySG appliance. As an alternative, you can enter the list directly into the Proxy SG appliance through the inline command,
either by typing the list line by line or by pasting the contents of the file. If you choose to create a text file to contain the
configuration commands and settings, be sure to assign the file the extension .txt. Use a text editor to create this file, noting
the following ProxySG appliance configuration file rules:
n Only one command (and any associated parameters) permitted, per line
n Comments can begin in any column, however, all characters from the beginning
Tip: When entering input for the inline command, you can correct mistakes on the current line
using the backspace key. If you catch a mistake in a line that has already been terminated with
the ENTER key, you can abort the inline command by pressing CTRL+C. If the mistake is
caught after you terminate input to the inline command, you must re-enter the entire content.
The end-of-input marker (eof_marker) is a string you specify to mark the end of input for the
current inline command. The string can be composed of standard characters and numbers, but
cannot contain any spaces, punctuation marks, or other symbols.
Choose a unique end-of-input string that does not match any string of characters in the
configuration information. One recommended end-of-input string is ''' (three single quotes).
Syntax
# inline {subcommand eof_marker}
Subcommands
# inline accelerated-pac eof_marker
Updates the accelerated pac file with the settings you include between the beginning eof_marker and the ending eof_marker.
76 of 604
ProxySG Command Line Interface Reference
Updates the login banner for the telnet and SSH consoles with the settings you include between the beginning eof_marker and
the ending eof_marker.
Install VPM classification from console input, with the settings you include between the beginning eof_marker and the ending
eof_marker.
Install exceptions with the settings you include between the beginning eof_marker and the ending eof_marker.
Updates the forwarding configuration with the settings you include between the beginning eof_marker and the ending eof_
marker.
Updates the current license key settings with the settings you include between the beginning eof_marker and the ending eof_
marker.
Updates the current policy settings—central, local, forward, tenant (default | tenant_id), landlord, vpm-cpl, and vpm-xml—with
the settings you include between the beginning eof_marker and the ending eof_marker. Tenant and Landlord options are only
available when multi-tenant support is enabled. See # (config general) multi-tenant for more information.
Updates the current RIP settings with the settings you include between the beginning eof_marker and the ending eof_
marker.
Updates the current SOCKS gateway settings with the settings you include between the beginning eof_marker and the ending
eof_marker.
Updates the current static route table settings with the settings you include between the beginning eof_marker and the ending
eof_marker. IP addresses can be IPv4 or IPv6.
77 of 604
ProxySG Command Line Interface Reference
Updates the current WCCP settings with the settings you include between the beginning eof_marker and the ending eof_
marker.
Example
# inline accelerated-pac eof
settings
...
eof
78 of 604
ProxySG Command Line Interface Reference
# kill
Synopsis
Terminates the specified session. Use > show sessions to determine session information, including session numbers.
Syntax
# kill session_number
Example
> show sessions
Sessions:
# state type start elapsed
01 IDLE
02 PRIVL ssh 08 Aug 2006 21:27:51 UTC 23:08:04
03* NORML ssh 10 Aug 2006 20:35:40 UTC 00:00:15
...
> enable
Enable Password:
# kill 3
ok
See Also
n "> show" on page 16
79 of 604
ProxySG Command Line Interface Reference
# licensing
Synopsis
Request or update appliance licenses.
Syntax
# licensing {subcommand}
Subcommands
# licensing disable-trial
# licensing enable-trial
# licensing mark-registered
Requests the license key from Symantec using the specified user ID and password.
Example
# licensing request-key
User ID: admin
Password:
...
ok
See Also
n “Licensing” in SGOS Administration Guide
80 of 604
ProxySG Command Line Interface Reference
# load
Synopsis
Downloads installable lists or system upgrade images. These installable lists or settings also can be updated using "# inline"
on page 76.
Syntax
# load {subcommand}
Subcommands
# load accelerated-pac
# load authentication-forms
# load banner
Configure the login banner for the telnet and SSH consoles.
# load exceptions
# load forwarding
Loads the keyrings and keylists from the location specified with keydata-path.
# load license-key
# load policy {builtin | central | classification | forward | landlord | local | tenant | vpm-cpl |
vpm-xml | space_separated_list}
81 of 604
ProxySG Command Line Interface Reference
This command loads the latest version of the built-in policy source files, or downloads the specified file, from the URL
specified in the # (config) policy policy_file-path command. When multi-tenant mode is enabled, use the landlord option to load
landlord policy and the tenant option to load default tenant policy. To load policy for a tenant other than the default tenant, use
the #inline policy tenant tenant_id command.
You can specify a space-separated list of multiple policy files, excluding built-in policy.
# load proxy-client-software
Loads the ProxyClient software to the Client Manager. The CLI displays messages as the software loads.
# load rip-settings
# load socks-gateways
# load static-route-table
# load trust-package
Downloads and installs the trust package from the specified download path. For information on setting the download path and
other trust package download settings, see # (config) security trust-package. Note that any manual changes you have made to
the browser-trusted or image-validation CA Certificate Lists (CCLs) or their associated CA certificates will be preserved. The
trust package at the specified download path will only be downloaded and installed if signature validation succeeds and if the
timestamp on the trust package indicates that it is a newer version than the existing trust packages that have been
downloaded to the ProxySG appliance.
Downloads the latest system image. The ignore-warnings option allows you to force an upgrade even if you receive policy
deprecation or disk compatibility warning. Keep the following in mind when using the ignore-warnings option:
n If you use # load upgrade ignore-warnings to force an upgrade while the system emits deprecation warnings
results in a policy load failure; all traffic is allowed or denied according to default policy.
n If you use # load upgrade ignore-warnings to force an upgrade while the system emits disk layout incompatibility
warnings, the disks will be re-initialized after the downgrade and all data and settings will be lost.
# load wccp-settings
# load timezone-database
82 of 604
ProxySG Command Line Interface Reference
Example
> show download-paths
Policy
Local:
Forward:
VPM-CPL:
VPM-XML:
Central: https://download.bluecoat.com/release/SG3/files/CentralPolicy.txt
Update when changed: no
Notify when changed: no
Polling interval: 1 day
Accelerated PAC:
RIP settings:
Static route table:
Upgrade image:
bcserver1.bluecoat.com/builds/ca_make.26649/wdir/8xx.CHK_dbg
WCCP settings:
Forwarding settings:
SOCKS gateway settings:
License key:
Exceptions:
Authentication forms:
>en
Enable Password
# load upgrade
Downloading from
"bcserver1.bluecoat.com/builds/ca_make.26649/wdir/8xx.CHK_dbg"
Downloading new system software (block 2611)
The new system software has been successfully downloaded.
Use "restart upgrade" to install the new system software.
See Also
n "# inline" on page 76
83 of 604
ProxySG Command Line Interface Reference
# pcap
Synopsis
Enables you to capture packets of Ethernet frames entering or leaving a ProxySG appliance. Packet capturing allows filtering
on various attributes of the frame to limit the amount of data collected. The collected data can then be transferred to the
desktop for analysis.
Note: After a filter is set, it remains in effect until it is redefined; the filtering properties are
persistent across reboots; however, PCAP stops when a system is rebooted.
The # pcap start options are not persistent across reboots. You must reconfigure them if you
reboot the system. The capsize and coreimage subcommands are used to specify the size of
the PCAP file. When no capsize or coreimage value is specified, the default packet capture file
size is 100MB.
Note: Before using the PCAP utility, consider that packet capturing doubles the amount of
processor usage performed in TCP/IP.
To view the captured packets, you must have a tool that can read Packet Sniffer Pro 1.1 files
such as Wireshark or Ethereal.
Syntax
# pcap {subcommand}
Subcommands
# pcap filter
Specifies capture in the specified direction. If both is selected, both incoming and outgoing packets are captured. The default
setting is both.
Specifies capture on the specified interface or on all interfaces, such as 0:1. The interface number must be between 0 and 16.
The default setting is all.
84 of 604
ProxySG Command Line Interface Reference
# pcap info
# pcap start
n last: PCAP continues capturing even after the buffer limit has been exceeded. The oldest captured packets are
removed from buffer to make space for the newly captured packets: In this way, PCAP captures the last n (or n KB of)
packets. The saved packets in memory are written to disk when the capture is terminated. The packet capture file size
is limited to 1% of total RAM, which might be reached before n packets have been captured.
n count: Buffer limit is controlled by the number of packets stored in the buffer. The value of count must be between 1 and
1000000.
n capsize: Maximum number of bytes stored in the buffer. The capsize value is limited to 3% of the available system
memory at startup (not to exceed 4GB). This value will differ by appliance model.
Specifies kilobytes of packets kept in a core image. The coreimage value is limited to 3% of the available system memory at
startup (not to exceed 4 GB). This value will differ by appliance model.
Collects, at most, n bytes of packets from each frame when writing to disk. The range is 1 to 65535.
# pcap stop
85 of 604
ProxySG Command Line Interface Reference
Example 1
Capture transactions among a ProxySG appliance (10.1.1.1), a server (10.2.2.2), and a client (10.1.1.2).
Example 2
Transfer captured packets to the FTP site 10.25.36.47.
If the folders in the path do not exist, they are not created. An error message is generated.
Example 3
To start PCAP, enter # pcap start. Then run pcap info to view the results of the packet capture.
# pcap start
ok
# pcap info
Current state: Capturing
Filtering: On
Filter: direction both interface all expr "port 3035"
Packet capture information:
first count 4294967295 capsize 100000000 trunc 4294967295 coreimage 0
Packets captured: 2842
Bytes captured: 237403
Packets written: 2836
Bytes written: 316456
Coreimage ram used: 0B
Packets filtered through: 8147
After PCAP is stopped (using the # pcap stop command), enter pcap info to view the results of your PCAP session. You
should see results similar to the following:
# pcap info
Current state:
Filtering: On
Filter: direction both interface all expr "port 3035"
Packet capture information:
Packets captured: 5101
Bytes captured: 444634
Packets written: 5101
Bytes written: 587590
86 of 604
ProxySG Command Line Interface Reference
See Also
n "Diagnostics" in SGOS Administration Guide
87 of 604
ProxySG Command Line Interface Reference
# ping
See "> ping" on page 14 for details on this command.
88 of 604
ProxySG Command Line Interface Reference
# ping6
See "> ping6" on page 15 for details on this command.
89 of 604
ProxySG Command Line Interface Reference
# policy
Synopsis
Configures policy commands.
Note: Configuring the # policy command to trace all transactions by default can significantly
degrade performance and should only be used in situations where a problem is being
diagnosed.
Syntax
# policy {subcommand}
Subcommands
# policy trace {all | none | proxy-traffic}
Use all to trace all transactions by default, use none to specify no tracing except as specified in policy files, and proxy-
traffic to trace all proxy transactions by default.
Example
# policy trace all
ok
All requests will be traced by default;
Warning: this can significantly degrade performance.
Use 'policy trace none' to restore normal operation
# policy trace none
ok
90 of 604
ProxySG Command Line Interface Reference
# register-with-director
Synopsis
Automatically registers the ProxySG appliance with a Symantec Director appliance, thus enabling that Director to establish a
secure administrative session with the ProxySG appliance. During the registration process, Director can “lock out” all other
administrative access to the appliance so that all configuration changes are controlled and initiated by Director. If your
appliance does not have an appliance certificate, you must specify the registration password that is configured on Director.
Syntax
# register-with-director
Subcommands
# register-with-director dir_ip_address [appliance_name dir_serial_number]
Register with the Director appliance with the specified IP address. Optionally, specify the name and serial number of the
Director appliance.
Example
# register-with-director 192.0.2.0
Registration Successful
91 of 604
ProxySG Command Line Interface Reference
# register-with-management-center
Synopsis
Registers the ProxySG appliance with a Symantec Management Center appliance, thus enabling that Management Center to
establish a secure administrative session with the ProxySG appliance.
Syntax
# register-with-management-center
Subcommands
# register-with-management-center IP_address API_Key [group]
Register with the Management Center appliance with the specified IP address and API key. Optionally, specify an
existing Management Center device group for the appliance.
Example
# register-with-management-center 192.0.2.0 AKIAIUR5RVQA6RF4ZGSQ East-Group
Register with Management Center 192.0.2.0...
Registered Successfully
92 of 604
ProxySG Command Line Interface Reference
# remove-sgos8-config
Synopsis
Removes the SGOS 8.x configuration file so that when upgrading from SGOS 7.x to 8.x, the configuration settings for 8.x will
be based on the current 7.x configuration.
Syntax
# remove-sgos8-config [subcommand]
Subcommands
# remove-sgos8-config
# remove-sgos8-config [force]
Removes the SGOS 8.x configuration file without a confirmation prompt from the CLI.
Example
# remove-sgos8-config
Removing SGOS 8.x configuration will permanently delete existing 8.x configuration from disk.
Continue? (y/n)[n]: y
ok
# remove-sgos8-config
% No SGOS 8.x configuration is available on this system.
See Also
n "# restore-defaults" on page 95
93 of 604
ProxySG Command Line Interface Reference
# restart
Synopsis
Restarts the system. The restart options determine whether the ProxySG appliance should simply reboot (regular) or reboot
using the new image previously downloaded using the load upgrade command (upgrade).
Syntax
# restart {subcommand}
Subcommands
# restart abrupt
Reboots the system abruptly, according to the version of the ProxySG appliance that is currently installed. Restart abrupt
saves a core image. Note that the restart can take several minutes using this option.
# restart regular
# restart upgrade
Example
# restart upgrade
ok
See Also
n "# load" on page 81
94 of 604
ProxySG Command Line Interface Reference
# restore-defaults
Synopsis
Restores the ProxySG appliance to the default configuration. When you restore system defaults, the ProxySG appliance’s IP
address, default gateway, and the DNS server addresses are cleared. In addition, any lists (for example, forwarding or bypass)
are cleared. After restoring system defaults, you need to restore the ProxySG appliance’s basic network settings and reset any
customized configuration elements.
Syntax
# restore-defaults {subcommand}
Subcommands
# restore-defaults factory-defaults
Reinitializes the appliance to the original settings it had when it was shipped from the factory. This option resets all system
settings, including the setup console password.
# restore-defaults force
Restores the system defaults without confirmation. If you don’t use the force command, you are not prompted to enter y or n
before restoration can proceed.
Restores defaults except settings required for console access. Using the keep-console option retains the following settings:
n Settings for all consoles (Telnet-, SSH-, HTTP-, and HTTPS-consoles), whether they are enabled, disabled, or deleted.
If you use the force command, you are not prompted to enter y or n before restoration can proceed.
Example
# restore-defaults
Restoring defaults requires a restart to take effect.
The current configuration will be lost and the system will be restarted.
Continue with restoring? (y/n)[n]: n
Existing configuration preserved.
See Also
n "Maintaining the Appliance" in SGOS Administration Guide
95 of 604
ProxySG Command Line Interface Reference
# reveal-advanced
Synopsis
Enables all or a subset of the advanced commands available to you when using the CLI. You can also use "# hide-advanced"
on page 75 to reveal hidden commands.
Syntax
# reveal-advanced {subcommand}
Subcommands
# reveal-advanced all
# reveal-advanced expand
Example
# reveal-advanced all
ok
See Also
n "# hide-advanced" on page 75
96 of 604
ProxySG Command Line Interface Reference
# show
Synopsis
Displays all the show commands available in the standard mode in addition to commands available only in privileged mode and
configuration mode. This section discusses the show commands that are available only in privileged mode.
Syntax
> show {subcommand}
Subcommands
# show adn
# show archive-configuration
# show attack-detection
Displays client attack-detection settings and client and server statistics. See "# show attack-detection" on page 101.
# show cachepulse
Displays CachePulse statistics, such as license information, registration status, the download URL for the CachePulse
database, results of the last download, and the last successful download.
# show configuration
# show connection-forwarding
# show content
# show realms
# show security
# show session-monitor
97 of 604
ProxySG Command Line Interface Reference
Displays the session monitor, which monitors RADIUS accounting messages and maintains a session table based on the
information in these messages.
# show ssh-console
# show ssl
Also available in standard mode, this command offers more options in privileged mode. See "# show ssl" on page 111.
# show system-resource-metrics
Displays Threat Risk Levels service information or supported Threat Risk Levels. You must have a Threat Risk Levels
database and a valid subscription in order to use this feature.
# show tunnel-on-protocol-error
# show ui
Example
# show system-resource-metrics
Title Health Monitor Stats
Version 1.1
Overall Health
Current State : WARNING
Last Transition : Thu, 11 Jul 2019 17:34:43 UTC
Health Stats
Stat: CPU Utilization
Current State : OK
Last Transition : Thu, 11 Jul 2019 17:34:33 UTC
Current Value : 2
Unit of Measurement : percent
Warning Threshold : 80
Warning Interval : 120
Critical Threshold : 95
Critical Interval : 120
Notification Method : log
98 of 604
ProxySG Command Line Interface Reference
...
99 of 604
ProxySG Command Line Interface Reference
# show adn
Synopsis
Displays ADN settings and statistics.
Syntax
# show adn {subcommand}
Subcommands
# show adn byte-cache
Example
# show adn
Application Delivery Network Configuration:
ADN: disabled
Manager port: 3034
Tunnel port: 3035
Primary manager: none
Backup manager: none
External VIP: none
Byte-cache Configuration:
Max number of peers: 10347
Max peer memory: 30
Tunnel Configuration:
TCP window size: 65536
reflect-client-ip : use-local-ip
Routing Configuration:
Internet Gateway: disabled
Exempt Server subnet: 10.0.0.0/8
Exempt Server subnet: 172.16.0.0/16
Exempt Server subnet: 192.168.0.0/16
100 of 604
ProxySG Command Line Interface Reference
# show attack-detection
Synopsis
Displays client attack-detection settings and client and server statistics.
Syntax
# show attack-detection {subcommand}
Subcommands
# show attack-detection client [blocked | connections | statistics]
Example
# show attack-detection client blocked
Client blocking is disabled
101 of 604
ProxySG Command Line Interface Reference
# show configuration
Synopsis
Shows current configuration that differs from default configuration.
Syntax
# show configuration [subcommand]
Subcommands
# show configuration
Example
Assuming non-default settings of:
n IP address of 10.167.42.38
102 of 604
ProxySG Command Line Interface Reference
exit
# show configuration expanded
interface 0:0 ;mode
ip-address 10.167.42.38
exit
!
inline policy local "end-326998078-inline"
<Proxy>
DENY
end-326998078-inline
103 of 604
ProxySG Command Line Interface Reference
# show content
Synopsis
Displays content-management commands.
Syntax
# show content {subcommand}
Subcommands
# show content outstanding-requests
Displays the complete list of outstanding asynchronous content revalidation and distribute requests.
Displays the deletion priority value assigned to the specified regular expression or URL.
Displays statistics of the specified URL To enter file or directory names that contain spaces, substitute each space with the
following escape code: %20. If the url contains a percent sign, substitute the % with %25.
To show a CIFS file, the url should conform to the following format:
cifs://server/share/path-to-file
To show HTTP content, the url should use the following format:
http://host:port/path-to-file
To show FTP content, the url should use the following format:
ftp://host:port/path-to-file
104 of 604
ProxySG Command Line Interface Reference
To show streaming content, the url should use one of the following formats:
rtsp://host:port/path-to-file
mms://host:port/path-to-file
105 of 604
ProxySG Command Line Interface Reference
# show netflow
See # show netflow for details on this command.
106 of 604
ProxySG Command Line Interface Reference
# show security
Synopsis
Displays information about security parameters.
Syntax
# show security [subcommand]
Subcommands
# show security
Displays information about the trust package download settings and the status of the latest download.
Example
# show security
Account:
Username: "admin"
Hashed Password: $1$it$24YXwuAGbmvQl7zhaeG5u.
Hashed Enable Password: $1$U1JZbCl1$itmTNhAwhymF2BNwBnum1/
Hashed Front Panel PIN: "$1$50KI$KR0RtYxQl02Z26cLy.Pq5."
Management console display realm name: ""
Web interface session timeout: 15 minutes
CLI session timeout: 5 minutes
107 of 604
ProxySG Command Line Interface Reference
108 of 604
ProxySG Command Line Interface Reference
# show ssh-console
Synopsis
Displays the SSH console details.
Syntax
# ssh-console {subcommand}
Subcommands
# show ssh-console ciphers
Displays the currently selected SSH ciphers, the default set of ciphers, and the available choices of ciphers. Fewer ciphers are
available or selected if the appliance is in FIPS mode.
Displays all client key fingerprints or the client key fingerprint of the specified key ID.
Displays the SSH HMAC algorithms currently configured, the default set of HMAC algorithms, and the available choices of
HMAC algorithms. Fewer HMACs are selected or available if the appliance is in FIPS mode.
Displays the specified SSHV2 host public key. If you do not specify the type, the RSA key is shown if installed.
Displays all client key fingerprints or the client key fingerprint of the specified key ID.
Displays the content of the SSH welcome banner, if one is already configured through the #(config ssh-console) inline
welcome-banner command.
109 of 604
ProxySG Command Line Interface Reference
Example
# show ssh-console versions-enabled
SSHv2 is enabled.
110 of 604
ProxySG Command Line Interface Reference
# show ssl
Synopsis
Shows SSL certificates and keyrings information.
Syntax
# show ssl {subcommand}
Subcommands
# show ssl appliance-certificate-request
Displays currently configured CA certificate lists (CCLs) or configuration for the specified list. This option can also be viewed
from standard mode.
Displays the SSL certificate Revocation List (CRL) of the specified ID.
111 of 604
ProxySG Command Line Interface Reference
Displays the keypair. To view the keypair in an encrypted format, specify aes128-cbc or aes128-cbc before the keyringID. You
are then prompted for the challenge entered when the keyring was created.
Displays information about all SSL clients or the specified SSL client. This option can also be viewed from standard mode.
112 of 604
ProxySG Command Line Interface Reference
Displays a summary of all currently configured SSL device profiles or the specified SSL device profile.
Displays the SSL summary information for CA certificates, CRLs, or external certificates.
Example
# show ssl keyring
Keyring ID: appliance-key
Private key showability: no-show
Signing request: present
Certificate: present
Certificate subject: /C=US/ST=CA/O=Blue Coat Systems, Inc./OU=Blue Coat SG300
Series/CN=4410162148
Certificate issuer: /C=US/ST=California/L=Sunnyvale/O=Blue Coat Systems, Inc./OU=Blue Coat,
ABRCA/CN=abrca.bluecoat.com/emailAddress=sysadmin@bluecoat.com
Certificate valid from: Apr 29 14:10:29 2019 GMT
Certificate valid to: Apr 29 20:10:29 2024 GMT
Certificate thumbprint: 4F:DC:2A:93:5F:08:70:ED:A6:48:5A:57:CD:7F:95:82
Keylist membership:
...
113 of 604
ProxySG Command Line Interface Reference
# temporary-route
Synopsis
Manages temporary route entries. After a reboot these routes are lost.
Syntax
# temporary-route {subcommand}
Subcommands
# temporary-route add destination_address netmask gateway_address
Example
# temporary-route delete destination_address
ok
114 of 604
ProxySG Command Line Interface Reference
# test
See "> test" on page 52.
115 of 604
ProxySG Command Line Interface Reference
# traceroute
See "> traceroute" on page 54.
116 of 604
ProxySG Command Line Interface Reference
# traceroute6
See "> traceroute6" on page 55.
117 of 604
ProxySG Command Line Interface Reference
# unregister-with-management-center
Synopsis
Remove the appliance from Management Center.
Syntax
# unregister-with-management-center
Example
# register-with-management-center
ok
118 of 604
ProxySG Command Line Interface Reference
# upload
Synopsis
Uploads the current access log or running configuration to a configured host.
Syntax
# upload {subcommand}
Subcommands
# upload access-log {all | log log_name}
# upload configuration
Example
# upload configuration
ok
119 of 604
ProxySG Command Line Interface Reference
The configure command, available only in enable mode, allows you to configure the Symantec ProxySG settings from your
current terminal session (configure terminal), or by loading a text file of configuration settings from the network (configure
network).
The prompt changes from a pound sign (#) to a # (config) prompt, indicating that you are in configure mode.
Enter configure mode from privileged mode by using the configure command:
# conf t
Enter configuration commands, one per line. End with CTRL-Z.
# (config)
Tip: The CLI command mode structure is hierarchical. From privileged mode, you can issue
privileged and standard mode commands. From privileged configure mode, you can issue
standard, privileged, and privileged mode commands.
120 of 604
ProxySG Command Line Interface Reference
# (config) accelerated-pac
Synopsis
Configures PAC file settings.
Syntax
# (config) accelerated-pac {subcommand}
Subcommands
# (config) accelerated-pac no path
Specifies the location on a Web server from which the PAC file should be downloaded.
Example
# (config) accelerated-pac path http://www.comp.com/pac/accelerated_pac_base
ok
# (config) load accelerated-pac
ok
See Also
n "# inline" on page 76
121 of 604
ProxySG Command Line Interface Reference
# (config) access-log
Synopsis
The appliance can maintain an access log for each HTTP request made. The access log can be stored in one of three formats,
which can be read by a variety of reporting utilities.
Syntax
# (config) access-log
# (config access-log)
Subcommands
# (config access-log) create loglog_name
122 of 604
ProxySG Command Line Interface Reference
Displays the entire log format configuration, a brief version of the log format configuration, or the configuration for a specific log
format.
123 of 604
ProxySG Command Line Interface Reference
Displays the entire access log configuration, a brief version of the access log configuration, or the configuration for a specific
access log.
Displays access log statistics for all logs or for the specified log.
Example
# (config) access-log
# (config access-log) create log test
ok
# (config access-log) max-log-size 1028
ok
# (config access-log) overflow-policy delete
ok
See Also
n “Configuring Access Logging” in SGOS Administration Guide
124 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) access-log
Subcommands
# (config format format_name) exit
125 of 604
ProxySG Command Line Interface Reference
Example
# (config) access-log
# (config access-log) edit format testformat
# (config format testformat) multi-valued-header-policy log-all-headers
ok
# (config format testformat) exit
# (config access-log) exit
# (config)
See Also
n "# (config) access-log" on page 122
126 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) access-log
# (config access-log)
# (config access-log) edit loglog_name
Subcommands
# (config log log_name) bandwidth-classbwm_class_name
Specifies a bandwidth-management class for managing the bandwidth of this log.In order to bandwidth-manage this log,
bandwidth management must be enabled. Bandwidth management is enabled by default.
Note: You must also create a bandwidth class for this access log (in bandwidth-management
mode) before you can select it here. See "# (config) bandwidth-management" on page 190 for
more information
# (config log log_name) client-type { bluecoat | custom | ftp | http | kafka | none | scp }
Specifies the client to use for uploading the current access log, where:
127 of 604
ProxySG Command Line Interface Reference
Note: When changing a log’s upload type from Kafka client to another client, or from another
client to Kafka, and the kafka-client message-set-codec command is set, Symantec
recommends that you perform the following steps in the specified order to prevent upload
failures:
- Upload the access logs
- Change the upload client
- Delete all access logs with the command # (config log log_name)commands delete-
logs
For details, refer to the “Configuring the Access Log Upload Client” chapter in the SGOS
Administration Guide.
For details on configuring access log upload clients, refer to the appropriate subcommands for # (config log log_name) and
the SGOS Administration Guide.
128 of 604
ProxySG Command Line Interface Reference
Note: You can enable continuous upload to have the logs upload in near-real time. SCP client
does not support continuous upload.
Sets the maximum time between log packets (text upload only).
# (config log log_name) continuous-upload rotate-remote {daily rotation_hour (0-23) | hourly hours
[minutes]}
Configures the alternate custom server address. The hostIP_address must be defined as an IPv4 address.
Configures the primary custom server address. The hostIP_address must be defined as an IPv4 address.
Selects whether to use secure connections (SSL). The default is set to no; in other words, custom-client by default is in non-
FIPS mode;
129 of 604
ProxySG Command Line Interface Reference
Configures the alternate FTP host site. The hostname can be defined as an IPv4 or IPv6 address, or a domain name that
resolves to an IPv4 or IPv6 address.
Deletes the remote filename format or the alternate or primary host parameters.
Configures the primary FTP host site. The hostname can be defined as an IPv4 or IPv6 address, or a domain name that
resolves to an IPv4 or IPv6 address.
Selects whether to use secure connections (FTPS). The default is no. If yes, the hostname must match the hostname in the
certificate presented by the server.
Configures the alternate HTTP host site. The hostname can be defined as an IPv4 or IPv6 address, or a domain name that
resolves to an IPv4 or IPv6 address.
Deletes the remote filename format or the alternate or primary host parameters.
130 of 604
ProxySG Command Line Interface Reference
Configures the primary HTTP host site. The hostname can be defined as an IPv4 or IPv6 address, or a domain name that
resolves to an IPv4 or IPv6 address.
Selects whether to use secure connections (HTTPS). The default is no. If yes, the hostname must match the hostname in the
certificate presented by the server
Specify the hostname/IP address and port for the alternate Kafka broker. Configuring an alternate host is optional.
Specify an existing SSL device profile to use for mutual authentication between the alternate Kafka broker and the appliance.
Configuring an alternate host is optional.
Adds the Kafka MessageSet header to the start of compressed log entries (gzip file type). By default, this setting is disabled.
To determine whether this setting is enabled or disabled, issue the # (config log log_name) view command and look for
the Use Kafka gzip codec when upload as gzip file setting in the output. Specify the force parameter to enable the codec
without the CLI prompting you for confirmation.
Specifies that the Kafka MessageSet header is not added to the start of compressed log entries (gzip file type); this is the
default setting. To determine whether this setting is enabled or disabled, issue the # (config log_name) view command and
look for the Use Kafka gzip codec when upload as gzip file setting in the output. Specify the force parameter to disable the
codec without the CLI prompting you for confirmation.
131 of 604
ProxySG Command Line Interface Reference
Specify the hostname/IP address and port for the primary Kafka broker. Configuring a primary host is mandatory if you want to
use Kafka as an upload client.
Specify an existing SSL device profile to use for mutual authentication between the primary Kafka broker and the appliance.
Configuring a primary host is mandatory if you want to use Kafka as an upload client.
Enables secure connection between the appliance and the Kafka broker. The SSL device profile must be set up already.
Specifies the topic name for the log facility. You can use any string-format combination. If you do not specify a format, the
default is SG_%f, where %f is automatically replaced with the name of the log facility.
Disables access-log encryption, bandwidth management, or digital signing for this log.
# (config log log_name) periodic-upload upload-interval {daily upload_hour (0-23) | hourly hours
[minutes]}
Note: Before you can use the following SCP subcommands to configure SCP for uploads, you
must configure ciphers, HMACs, and known hosts for SSH connections; see "# (config) ssh-
console" on page 552.
132 of 604
ProxySG Command Line Interface Reference
Configures the alternate SCP host site. The hostname can be defined as an IPv4 or IPv6 address, or a domain name that
resolves to an IPv4 or IPv6 address.
n client-key means that only the SSH client key is used for authentication; see "# (config) ssh-console" on page 552.
n all means that client keys are attempted for authentication first; if that fails, password authentication is attempted.
Configures the primary SCP host site. The hostname can be defined as an IPv4 or IPv6 address, or a domain name that
resolves to an IPv4 or IPv6 address.
Example
# (config) access-log
# (config access-log) edit log testlog
# (config log testlog) upload-type gzip
ok
133 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config) access-log" on page 122
134 of 604
ProxySG Command Line Interface Reference
# (config) adn
Synopsis
ADN optimization allows you to reduce the amount of tunneled TCP traffic across a WAN by means of an overlay network
called an Application Delivery Network, or ADN. ProxySG devices that participate in the ADN utilize byte caching technology,
which replaces large chunks of repeated data with small tokens representing that data. ProxySG devices in the ADN also use
gzip compression to further reduce the amount of data flowing over the WAN.
Syntax
# (config) adn {subcommand}
# (config adn)
Subcommands
# (config adn) byte-cache
Configures byte caching parameters. Changes the prompt to "# (config adn byte-cache)" on page 137.
Configures load-balancing parameters. Changes the prompt to "# (config adn load-balancing)" on page 139.
Configures manager parameters. The prompt changes to "# (config adn manager)" on page 141.
Configures routing information. Changes the prompt to "# (config adn routing)" on page 145.
Configures authorization parameters. Changes the prompt to "# (config adn security)" on page 149.
Configures parameters for tunnel connections. Changes the prompt to "# (config adn tunnel)" on page 151.
135 of 604
ProxySG Command Line Interface Reference
Example
# (config adn)
# (config adn) enable
ok
See Also
n "Configuring an Application Delivery Network" in SGOS Administration Guide
136 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) adn
# (config adn)
Subcommands
# (config adn byte-cache) exit
Enables or disables adaptive compression. When adaptive compression is enabled, the appliance determines whether to
increase or decrease the compression level based on CPU usage. When extra CPU is available, it will adapt compression to
use these additional resources, resulting in higher CPU usage.
Deletes the specified ADN peer. If the peer has an established dictionary or a dictionary that is manually sized, you will be
prompted to confirm that you want to proceed with the deletion. The force argument allows you to delete a peer without
confirmation.
Sets the maximum percentage of disk space that can be used for byte caching. When this setting is changed, an immediate
resizing is done. If the statistics have changed since the last resizing, the recommended dictionary sizes and the rankings for
each peer might change. However, if there has been no traffic (and it is still the same day), or if the changes balance out, there
might be no change to either the recommended dictionary sizes or the rankings.
Manually sets the amount of memory used to keep track of the byte-cache hash table or disables compression to this peer.
Generally, the dynamic settings are acceptable; you do not need to change the dictionary size. Only if you determine that the
137 of 604
ProxySG Command Line Interface Reference
algorithm performance does not guarantee the right dictionary size for a specific peer should you manually set the dictionary
size.
Example
# (config adn) byte-cache
# (config adn byte-cache) max-peer-memory 40
ok
138 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) adn
# (config adn)
Subcommands
# (config adn load-balancing) {enable | disable}
Sets the external VIP. The IP_address can be either IPv4 or IPv6, but must be reachable by all branch peers. The same VIP
must be configured on each ProxySG appliance in the cluster, and the VIP must exist on an external load balancing device.
The external VIP is used in explicit external load balancing.
Sets the group name for an ADN group. Groups are used in transparent load balancing.
Specifies whether the node can take participate in load balancing (disable) or if it acts as a load balancer only (enable).
139 of 604
ProxySG Command Line Interface Reference
Example
# (config adn) load-balancing
# (config adn load-balancing) group EAST2
ok
140 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) adn
# (config adn)
Subcommands
# (config adn manager) approved-peers
Configures approved-peers. Changes the prompt to "# (config adn approved-peers)" on page 143.
Defines the backup ADN manager; the IP_address can be IPv4 or IPv6. While optional, defining a backup ADN manager is
highly recommended. If the primary ADN manager goes offline for any reason, routing updates are no longer available which
prevent nodes from learning when other nodes enter and leave the network. Existing route information is still retained by the
peers, however.
Exits the # (config adn manager) submode and returns to # (config adn) mode.
Configures pending peers. Changes the prompt to "# (config adn pending-peers)" on page 144.
Sets the port number for the primary and backup ADN managers. All ProxySG devices in the ADN must use the same
manager port number. The default is port 3034; it should not be changed.
141 of 604
ProxySG Command Line Interface Reference
Defines the primary ADN manager; the IP_address can be IPv4 or IPv6. The responsibility of the ADN manager is to keep up
to date the routing information from each ProxySG node on the WAN optimization network and to broadcast that information to
all the peers.
Example
# (config adn) manager
# (config adn manager) primary-manager 2001:418:9804:111::169
ok
# (config adn manager) backup-manager 10.25.36.48
ok
142 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) adn
# (config adn)
Subcommands
# (config adn approved-peers) add device_id
Exits the # (config adn approved-peers) submode and returns to "# (config adn manager)" on page 141 mode.
Removes the specified peer(s), or all peers, from the approved peers list. Specify the force parameter to remove peers
without a confirmation prompt.
Views the list of approved devices and connections, as well as the device ID of the ADN manager and backup manager.
143 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) adn
# (config adn)
Subcommands
# (config adn pending-peers) {accept | reject} {device_id | all}
Allows or denies a specific peer or all peers that want to join a network.
Exits the # (config adn pending-peers) submode and returns to "# (config adn manager)" on page 141 mode.
144 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) adn
# (config adn)
Subcommands
# (config adn routing) advertise-internet-gateway
Enables the ProxySG appliance as an Internet gateway. Changes the prompt to "# (config adn routing advertise-internet-
gateway)" on the next page.
Forces peers to always use advertised routes or to allows them to use transparent routes if they are available.
Configures server-subnets that will be advertised to other peers on the WAN optimization network. Changes the prompt to "#
(config adn routing server-subnets)" on page 147.
145 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) adn
# (config adn)
Subcommands
# (config adn routing advertise-internet-gateway) {disable | enable}
Enables or disables the ability for this peer to be used as an Internet gateway.
Manages subnets that must not be routed to Internet gateway(s). The subnets can be IPv4, IPv6, or a combination. The subnet
prefix can be in either IPv4 or IPv6 format.
Forces peers to always use advertised routes or to allows them to use transparent routes if they are available.
146 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) adn
# (config adn)
Subcommands
# (config adn routing server-subnets) add subnet_prefix[/prefix length]
Adds a subnet with the specified prefix and, optionally, the prefix length, to the ProxySG appliance routes that it sends to the
ADN manager. The subnet prefix can be in either IPv4 or IPv6 format.
Removes a subnet with the specified prefix and, optionally, the prefix length, to the ProxySG routes that it sends to the ADN
manager. The subnet prefix can be in either IPv4 or IPv6 format.
147 of 604
ProxySG Command Line Interface Reference
Example
# (config adn) routing
# (config adn routing) server-subnets
# (config adn routing server-subnets) clear-all
ok
# (config adn routing server-subnets) add 10.9.59.0/24
ok
# (config adn routing server-subnets) add 2001:418:9804:100::84/128
ok
148 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) adn
# (config adn)
Subcommands
# (config adn security) authorization {enable | disable}
Leaves the security submode. Returns to "# (config) adn" on page 135 mode.
Configures outbound connection encryption, where none indicates the encryption is disabled, secure-proxies enables
encryption on secure proxy (that is, HTTPS or SSL) traffic, and all indicates that encryption is enabled on all outbound
connections.
149 of 604
ProxySG Command Line Interface Reference
Example
Set the SSL device profile "default" for ADN.
150 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) adn
# (config adn)
Subcommands
# (config adn tunnel) connect-transparent {enable [fast | regular] | disable}
Allows traffic to be optimized across the entire data path of a transparent ADN deployment: from the branch office, through one
or more intermediate concentrators, all the way to the main data center.
Sets the port number for the client or data port used by ADN tunnel connections. Each ADN node has a TCP listener on this
port in order to receive tunnel connections. The default is port 3035; it should not be changed.
Configures a list of preferred tunnel or control IP addresses. Changes prompt to "# (config adn tunnel preferred-ip-addresses)"
on page 153.
151 of 604
ProxySG Command Line Interface Reference
Configures the Concentrator peer to follow (allow), reject (deny), or ignore (use-local-ip) the Branch peer reflect-client-ip
settings. When allow is specified, both ProxySG and ProxyClient branch peers will be set to allow. When deny is specified,
ProxySG branch peers will be set to deny, and ProxyClient peers will be set to use-local-ip. When use-local-ip is specified,
both ProxySG and ProxyClient Branch peers will be set to use-local-ip. The local IP is the IP address of the Concentrator
ProxySG.
Determines the behavior of the ADN Concentrator peer when a ProxySG Branch peer requests client IP reflection for an
inbound tunnel connection. The allow option allows the request and reflects the client IP. The deny option rejects the request
and the connection. The use-local-ip option allows the connection but uses the IP address of the Concentrator peer.
Determines the behavior of the ADN Concentrator peer when a ProxyClient peer requests client IP reflection for an inbound
tunnel connection. The allow option allows the request and reflects the client IP. The deny option rejects the request and the
connection. The use-local-ip option allows the connection but uses the IP address of the Concentrator peer.
Sets the TCP window size for ADN optimization tunnel connections based on current network conditions and on the receiving
host’s acknowledgement. Auto is the default; under most circumstances, this option should not be set manually.
Example
# (config adn) tunnel
# (config adn tunnel) tcp-window-size 200000
ok
152 of 604
ProxySG Command Line Interface Reference
n The concentrator’s first choice is to use a preferred IP address of the same address family as the source address on the
interface that the connection came on.
n If that’s not possible, it uses a preferred IP address of the same address family as the source address, on an interface
that is different from the interface that the connection came on.
n If the concentrator can’t use an IP from the same address family, the concentrator uses a preferred IP address of a
different address family on the interface that the connection came on.
n If the same interface isn’t possible, it uses a preferred IP address of a different address family, on an interface that is
different from the interface that the connection came on.
n If none of the above are applicable, the concentrator uses the first data IP address in the preferred IP list.
Note: If there isn’t a preferred list, the concentrator selects the first IP configured on the
incoming tunnel connection interface.
Syntax
# (config) adn
# (config adn)
153 of 604
ProxySG Command Line Interface Reference
Subcommands
# (config adn tunnel preferred-ip-addresses) add IP_address
Adds an IP address to the preferred list. The IP address can be IPv4 or IPv6. This list is communicated to
ADN peers so that they can form explicit tunnels and control connections.
Removes all IP addresses from the preferred list. When the list is empty, all IP addresses configured on the appliance are
available for tunnel and control connections.
Removes the specified IP address from the preferred list. This IP address will no longer be preferred for tunnel and control
connections. Existing control/tunnel connections using a deleted IP address will not be effected; only new connections will use
the new configuration.
154 of 604
ProxySG Command Line Interface Reference
# (config) alert
Synopsis
Configures the notification properties of hardware environmental metrics (called sensors) and the threshold and notification
properties of system resource health monitoring metrics. These health monitoring metrics allow you to assess the health of the
ProxySG appliance.
Setting Notifications
The following notification options are available:
n email: Notify using e-mail (set in the #(config event-log) mail command)
To set more than one type of notification, separate the notification method with spaces as follows:
Setting Thresholds
For the purposes of notification, thresholds are defined by two variables, the threshold level and the threshold interval:
n The threshold level describes the state of the metric: OK, Warning, or Critical.
n The threshold interval specifies the maximum period of time that metric can be in a state. When that period of time is
exceeded, an alert is sent
In this example, if CPU activity hovers between 80% and 89% for 20 seconds, the cpu-utilization metric is considered to be in
the Warning state. A notification is sent when a threshold state changes, for example, from OK to Warning.
155 of 604
ProxySG Command Line Interface Reference
Note: See "Sensor and System Metrics" on page 160 for details on thresholds for specific
metrics.
The threshold values for license expiration metrics are set in days until expiration. In this context, a Critical threshold indicates
that license expiration is imminent. This is the only metric in which the Critical threshold value should be smaller than the
Warning threshold value. For example, if you set the Warning threshold to 45, an alert is sent when there are 45 days remaining
in the license period. The Critical threshold would be less than 45 days.
For the license expiration metrics, the threshold interval is irrelevant and is set by default to 0. The Critical threshold is
configured to 0, which means that a trap is immediately sent upon license expiration. Set the Warning threshold to a value that
gives you ample time to renew your license.
Syntax
# (config) alert {subcommand}
Subcommands
#(config) alert notification adn {connection | manager} {email | log | none | trap}
156 of 604
ProxySG Command Line Interface Reference
Configures notification for Common Policy in Web Security Services communication status and entitlement.
#(config) alert notification license-expiration {base | ssl} {email | log | none | trap}
157 of 604
ProxySG Command Line Interface Reference
#(config) alert notification threat risk expiration {email | log | none | trap}
Configures critical and warning alert thresholds for CASB integration in Web Security Services entitlement.
Configures critical and warning alert thresholds for Common Policy in Web Security Services communication status and
entitlement.
Configures critical and warning alert thresholds for Symantec content filtering entitlement.
Configures critical and warning alert thresholds and intervals for CPU utilization.
158 of 604
ProxySG Command Line Interface Reference
Configures critical and warning alert thresholds for Geolocation license expiration.
Configures critical and warning alert thresholds for ICAP deferred connections and queued connections.
Configures critical and warning alert thresholds for base license and SSL license expiration.
Configures critical and warning alert thresholds and intervals for Concurrent User Limit utilization.
Configures critical and warning alert thresholds and intervals for memory utilization.
Configures critical and warning alert thresholds and intervals for the specified interface utilization.
Configures critical and warning alert thresholds for Policy Services license expiration.
Configures critical and warning alert thresholds for Threat Risk Levels license expiration.
Example
# (config) alert threshold cpu-utilization 80 20 90 20
ok
See Also
n "Sensor and System Metrics" on the next page
159 of 604
ProxySG Command Line Interface Reference
n CPU temperature OK
OK
n CPU voltage OK
Threshold and
Metric Units Notes
Interval Defaults
CPU Utilization Percentage Critical: 95/120 Measures the value of CPU 0 on multi-processor systems--not the
average of all CPU activity.
Warning: 80/120
160 of 604
ProxySG Command Line Interface Reference
Threshold and
Metric Units Notes
Interval Defaults
Memory Utilization Percentage Critical: 95/120 Memory pressure occurs when memory resources become limited,
causing new connections to be delayed.
Warning: 90/120
Network Utilization Percentage Critical: 90/120 Measures the traffic (in and out) on the interface to determine if it is
approaching the maximum allowable bandwidth.
Warning: 60/120
License Utilization Percentage Critical: 90/0 For licenses that have user limits, monitors the number of users.
Warning: 80/0
SGOS Base, SSL Proxy Days Critical: 0/0 Warns of impending license expiration. For license expiration
License Expiration metrics, intervals are ignored.
Warning: 15/0
Cloud Services: Common 0 days / 0 Critical: 0/0 Warns of impending entitlement expiration. For license expiration
Policy Entitlement metrics, intervals are ignored.
Warning: 30/0
161 of 604
ProxySG Command Line Interface Reference
# (config) appliance-name
Synopsis
Assign a name to an appliance. Use a descriptive name that helps identify the system.
Syntax
# (config) CLI {subcommand}
Subcommands
# (config) appliance-name name
Example
# (config) appliance-name ProxyDev1
ok
162 of 604
ProxySG Command Line Interface Reference
# (config application-attributes)
Synopsis
Configures the Application Attributes service and allows you to check values of specified application attributes.
Note: Make sure to type the application and attribute name correctly in commands; the CLI
does not indicate if an application or attribute name is incorrect or does not exist in the
database.
Syntax
# (config) application-attributes
# (config application-attributes)
Subcommands
# (config application-attributes) disable
Downloads the latest data. The CLI displays the download progress and status. If the database is already up-to-date, the
appliance does not download it again. To cancel the download in progress, press and hold CTRL+C.
Enables the Application Attributes service. Before enabling this service, enable Application Classification using the # (config
application-classification) enable command.
Clears the specified download parameter. Clearing the url parameter resets the database download option to the default
(direct download from Symantec).
163 of 604
ProxySG Command Line Interface Reference
Sets the encrypted form of the password used during a database download from an internal server.
Sets the password used during a database download from an internal server.
Specifes an existing SSL device profile to use for securing connections to the internal server.
Sets the URL to use when downloading the database from an internal server.
Sets the username to use when downloading the database from an internal server.
Displays the value(s) of the specified application attribute. If an application or attribute name contains spaces, enclose it in
double quotation marks (") ; see the following Examples for details.
Displays the current Application Attributes service settings, including download status.
Displays the possible values for the specified application attribute. If an attribute name contains spaces, enclose it in double
quotation marks ("). When writing policy that includes the request.application.attribute_name= condition, use this
subcommand to ensure that the CPL parameters are valid. Modifications to the database are automatically provided in updates
via the subscription feed.
Example 1
The CLI output indicates that YouTube is not vulnerable to FREAK.
164 of 604
ProxySG Command Line Interface Reference
Example 2
List the applications that support SAML authentication.
...
Example 3
List the attributes available for the Outbrain web application.
Example 4
List the possible values for the Type of Company attribute.
See Also
n "Filtering Web Content" in SGOS Administration Guide
165 of 604
ProxySG Command Line Interface Reference
# (config application-classification)
Synopsis
Configure Application Classification.
Note: Make sure to type the application and attribute name correctly; the CLI does not indicate
if an application or attribute name is incorrect or does not exist in the database.
Note: If you are running a new installation of 7.2.1.1 or had Intelligence Services as the data
source for application classification before upgrading to 7.2.1.1, then the #(config
application-classification) data-source {web-filter | intelligence-services}
command is removed. Support for Symantec WebFilter will be entirely removed in a future
release of SGOS 7.x. For more information, see the behavior changes for 7.2.1.1 in the SGOS
Upgrade/Downgrade WebGuide.
Syntax
# (config) application-classification
# (config application-classification)
Subcommands
# (config application-classification) data-source {intelligence-services | web-filter}
The data source you specify determines the download subcommands that are available; see "Download Options for
Intelligence Services" on the facing page and "Download Options for Symantec WebFilter" on page 168.
166 of 604
ProxySG Command Line Interface Reference
Displays supported application groups or the groups to which the specified application belongs.
Cancels a download in progress. The CLI displays a Cancelling download... message while the cancellation is in progress,
and returns to the command prompt when the download is canceled.
Sets the encrypted form of the password used when downloading from an internal server.
Downloads the Intelligence Services database immediately. The download occurs in the foreground and you cannot use the
CLI until the download is complete. The download process can take up to several minutes to complete. To cancel the
167 of 604
ProxySG Command Line Interface Reference
download in progress, press and hold CTRL+C. The CLI displays a Cancelling download... message while the
cancellation is in progress, and returns to the command prompt when the download is canceled. If the database is already up-
to-date, the appliance does not download it again.
Starts the download immediately in the background. You can continue to use the CLI while download is in progress. If the
database is already up-to-date, the appliance does not download it again.
Specifies an existing SSL device profile to use for securing connections to the internal server.
Sets the URL to use when downloading the database from an internal server.
Sets the username to use when downloading the database from an internal server.
Clears the specified download parameter. Clearing the url parameter resets the database download option to the default (direct
download from Symantec).
168 of 604
ProxySG Command Line Interface Reference
Downloads the Intelligence Services database immediately. The download occurs in the foreground and you cannot use the
CLI until the download is complete. The download process can take up to several minutes to complete. To cancel the
download in progress, press and hold CTRL+C. If the database is already up-to-date, the appliance does not download it again.
Starts the download immediately in the background. You can continue to use the CLI while download is in progress. If the
database is already up-to-date, the appliance does not download it again.
Example
Perform automatic database update checks between the hours of 2:00 AM and 4:00 AM.
See Also
n "Filtering Web Content" in SGOS Administration Guide
169 of 604
ProxySG Command Line Interface Reference
# (config application-protection)
Synopsis
Configure the Application Protection service.
Syntax
# (config) application-protection
# (config application-protection)
Subcommands
# (config application-protection) disable
Disables the Application Protection service. When you issue this command, it checks if application protection policy is
installed on the appliance. If it is installed, the CLI warns that disabling the Application Protection service also disables the
policy.
Set the encrypted form of the password to use for downloading from an internal server.
Downloads the latest data. The CLI displays the download progress and status. If the database is already up-to-date, the
appliance does not download it again. To cancel the download in progress, press and hold CTRL+C.
Ignores any existing data (even if the database is already up-to-date) and force a fresh download of the entire database. To
cancel the download in progress, press and hold CTRL+C.
When a new database version is available for download, a notification is sent to the administrator and also recorded in the
event log. You can use this setting only after the first successful database download. Use this setting in a test environment.
Set the password used to download the database from an internal server.
170 of 604
ProxySG Command Line Interface Reference
Specify an existing SSL device profile to use for securing database downloads from an internal server.
Set the URL of the internal server that hosts the database.
Set the username to use when downloading the database from an internal server.
Clear the specified download parameter. Clearing the url parameter resets the database download option to the default (direct
download from Symantec).
Displays the current Application Protection service settings, including download status.
Example
Enable the notify-only setting for use in a test environment.
See Also
n "Web Application Protection" in the SGOS Administration Guide
171 of 604
ProxySG Command Line Interface Reference
# (config) archive-configuration
Synopsis
Archiving a ProxySG system configuration on a regular basis is always a good idea. In the rare case of a complete system
failure, restoring an appliance to its previous state is simplified by loading an archived system configuration from a remote
server. The archive contains all system settings differing from system defaults, along with any forwarding and security lists
installed on the appliance. Unless you restore the SSL configuration-passwords-key keyring from the source device, archives
can only be restored onto the same device that was the source of the archive. This is because the encrypted passwords in the
configuration (login, enable, FTP, etc.) cannot be decrypted by a device other than that on which it was encrypted. For more
information on backing up the configuration, refer to the “Backing Up the Configuration” in the SGOS Administration Guide.
Syntax
# (config) archive-configuration {subcommand}
Subcommands
# #(config) archive-configuration archive-signing {enforce-signed {enable | disable} | signing-keyring
keyring_name | verify-ccl ccl_name}
Configures the archiving signing options. A signed archive is a configuration backup that is cryptographically signed with a key
known only to the signing entity—the digital signature guarantees the integrity of the content and the identity of the originating
device. You can then use a trusted CA Certificate List (CCL) to verify the authenticity of the archive.
The enforce-signed option enforces installation of only signed archives. The signing-keyring option specifies the keyring
that will be used to sign archives. The verify-ccl option specifies the CCL to use for verifying signed archives.
Specifies the prefix that should be applied to the archive configuration on upload, such as %H%A (hour in 24-hour format and
weekday). Refer to the “Backing Up the Configuration” in the SGOS Administration Guide for a complete list of file name
prefixes.
Specifies the host to which the archive configuration should be uploaded. The hostname can be an IPv4 or IPv6 address, or a
domain name that resolves to an IPv4 or IPv6 address. If an IPv6 address is specified for the hostname, it must be enclosed in
brackets, such as # (config) archive-configuration host [2001:db8:85a3::8a2e:370:7334]
If uploading over SCP, the host-key for the host must exist in the appliance’s known hosts list. See "# (config ssh-client
known-hosts)" on page 548 for details. Use the command # (config ssh-client known-hosts) fetch-host-key
hostname [port] [force].
172 of 604
ProxySG Command Line Interface Reference
Specifies the password for the host to which the archive configuration should be uploaded.
Specifies the path to the host to which the archive configuration should be uploaded. Not required for TFTP.
Specifies a daily upload time, where upload_hour is a value from 0 to 23. Alternatively, specify an interval at which to upload
archives, where minutes is the number of minutes.
Specifies AES128-CBC for encrypting private keys. Before using this command, define a password using # (config)
archive-configuration private-key-display passphrase. When both the cipher and a password are defined, the private
keys are displayed in the configuration.
Specifies AES256-CBC for encrypting private keys. Before using this command, define a password using # (config)
archive-configuration private-key-display passphrase. When both the cipher and a password are defined, the private
keys are displayed in the configuration.
Set the passphrase to use for encrypting private keys in the configuration archive. The CLI prompts you to enter the
passphrase twice.
173 of 604
ProxySG Command Line Interface Reference
n password: Only the remote host’s username and password are used for authentication.
n client-key: Only the appliance’s SSH client keys are used for authentication.
You can create RSA, ECDSA, or Ed25519 keys. For more information, see "# (config ssh-client client-keys)" on
page 545.
n all: Authentication is attempted first with the SSH client keys. If unsuccessful, authentication with username and
password is attempted. The event log shows which method was used successfully. Use the CLI specified above for
both the username/password configuration and the SSH client key creation.
Specifies the device profile used for SSL connections. An SSL device profile contains the information required for device
authentication, including the name of the keyring that contains the private key and certificate this device uses to authenticate
itself. The default keyring is appliance-key.
Specifies the username for the remote host to which the archive configuration should be uploaded. Not required for TFTP.
Example
# (config) archive-configuration private-key passphrase
Enter password: ********
Confirm password: ********
ok
See Also
n "# (config ssh-client client-keys)" on page 545
174 of 604
ProxySG Command Line Interface Reference
# (config) asymmetric-route-bypass
Synopsis
When reflect-client-ip is enabled, the ProxySG appliance is able to detect asymmetric routing for intercepted
connections. New connections from the same source and destination IP pair are dynamically bypassed after asymmetric
routing is detected (detection occurs on the first reset packet). The IP pairs are added to a table that contains the list of
dynamically bypassed asymmetric routes.
Syntax
# (config) asymmetric-route-bypass
# (config asymmetric-route-bypass)
Subcommands
# (config asymmetric-route-bypass) clear
Sets maximum number of entries allowed in the asymmetric route bypass list.
175 of 604
ProxySG Command Line Interface Reference
Example
# (config asymmetric-route-bypass) max-entries 25000
ok
176 of 604
ProxySG Command Line Interface Reference
# (config attack-detection)
Synopsis
Configure attack detection and prevention methods.
Syntax
# (config) attack-detection
# (config attack-detection)
Subcommands
# (config attack-detection) client
Configures client-side attack detection. Changes the prompt to "# (config client)" on page 179.
Configures server-side attack detection. Changes the prompt to "# (config server)" on page 184.
Example
# (config attack-detection) view configuration
Client limits enabled: false
Client interval: 20 minutes
177 of 604
ProxySG Command Line Interface Reference
See Also
n "Preventing Denial of Service Attacks" in SGOS Administration Guide
178 of 604
ProxySG Command Line Interface Reference
# (config client)
Synopsis
Configure a client for attack detection.
Syntax
# (config attack-detection) client
# (config client)
Subcommands
# (config client) block ip_address minutes
Blocks a specific IP address for the number of minutes listed. If the optional minutes argument is omitted, the client is blocked
until explicitly unblocked.
Values that are used if a client does not have specific limits set.
These settings can be overridden on a per-client basis. If they are modified on a per-client basis, the specified limits become
the default for new clients. To change the limits on a per-client basis, see # (config client) edit ip_address below.
n block-action: drop
n connection-limit: 100
n failure-limit: 50
n unblock-time: unlimited
n warning-limit: 10
179 of 604
ProxySG Command Line Interface Reference
Edits the specified attack detection client. Changes the prompt to "# (config client ip_address)" on page 182.
Indicates the amount of time, in multiples of 10 minutes, that client activity is monitored. The default is 20. That this is a global
limit that cannot be modified for individual clients.
Clears the specified limit settings. These settings are applied to all new clients.
Displays all limits for all clients, or displays clients blocked at the network level, the client connection table, or client request
failure statistics.
Example
# (config client) view
Client limits enabled: true
Client interval: 20 minutes
Default client limits:
Client connection limit: 700
Client failure limit: 50
Client warning limit: 10
Blocked client action: Drop
Client connection unblock time: unlimited
Client limits for 10.9.17.159:
Client connection limit: unlimited
Client failure limit: unlimited
Client warning limit: unlimited
180 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config attack-detection) " on page 177
181 of 604
ProxySG Command Line Interface Reference
Syntax
# (config attack-detection) client
# (config client)
Subcommands
# (config client ip_address) block-action {drop | send-tcp-rst}
When the client is at the maximum number of connections or exceeds the warning limit, drops connections that are over the
limit or sends TCP RST for connections over the limit. The default is drop.
Sets the maximum simultaneous connections between 1 and 65535. The default is 100.
Sets the maximum number of failed requests a client is allowed before the proxy starts issuing warnings. Default is 50. This
limit can be modified on a per-client basis.
Enables monitor-only mode, which logs the defined thresholds that have been exceeded, but does not enforce the rules. The
default value is disabled. This limit can be modified on a per-client basis.
182 of 604
ProxySG Command Line Interface Reference
Note: The monitor-only mode setting has a higher precedence level than the default enforce
mode. Enabling monitor-only mode disables rule enforcement.
Clears the specified limits on a per-client basis. If you edit an existing client’s limits to a smaller value, the new value only
applies to new connections to that client. For example, if the old value was 10 simultaneous connections and the new value is
5, existing connections above 5 are not dropped.
Sets the maximum number of HTTP requests that IP sources are allowed to make during a one-minute interval. The default
value is unlimited. This limit can be applied on a per-client basis.
Sets the maximum amount of time a client can be blocked at the network level before the client-warning-limit is exceeded.
Time must be a multiple of 10 minutes, up to a maximum of 1440. The default is unlimited.
Specifies the number of warnings sent to the client before the client is blocked at the network level and the administrator is
notified. The default is 10; the maximum is 100.
Example
#(config client ip_address) request-limit 3000000
ok
See Also
n "# (config client)" on page 179
183 of 604
ProxySG Command Line Interface Reference
# (config server)
Synopsis
Configure a server for attack detection.
Syntax
# (config attack-detection) server
# (config server)
Subcommands
# (config server) create hostname
Modifies the limits for the specified server. Changes prompt to "# (config server hostname)" on page 186.
Example
# (config server) create test1
ok
# (config server) edit test1
# (config server test1) add 10.9.17.134
ok
# (config server test1) view
Server configuration for test1:
Request limit: 1000
Host: 10.9.17.134
184 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config attack-detection) " on page 177
185 of 604
ProxySG Command Line Interface Reference
Syntax
# (config attack-detection) server
# (config server)
Subcommands
# (config server hostname) add I
Example
Show the concurrent request limit and servers belonging to the server group.
186 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config server)" on page 184
187 of 604
ProxySG Command Line Interface Reference
# (config) background-dns-updates
Synopsis
Background DNS updates allows configuration of background DNS updates used in forwarding systems.
Syntax
# (config) background-dns-updates {subcommand}
Subcommands
# (config) background-dns-updates failure-interval seconds
Sets the seconds between DNS resolution attempts when DNS failures.
Disables or sets the maximum seconds allowed before the next DNS resolution attempt.
Sets the minimum seconds allowed before the next DNS resolution attempt.
Example
# (config) background-dns-updates failure-interval 100
ok
188 of 604
ProxySG Command Line Interface Reference
# (config) bandwidth-gain
Synopsis
Bandwidth gain is a measure of the effective increase of server bandwidth resulting from the client’s use of a content
accelerator. For example, a bandwidth gain of 100% means that traffic volume from the ProxySG to its clients is twice as great
as the traffic volume being delivered to the ProxySG from the origin server(s). Using bandwidth gain mode can provide
substantial gains in apparent performance.
Keep in mind that bandwidth gain is a relative measure of the ProxySG’s ability to amplify traffic volume between an origin
server and the clients served by the device.
Syntax
# (config) bandwidth-gain {subcommand}
Subcommands
# (config) bandwidth-gain disable
Example
# (config) bandwidth-gain enable
ok
189 of 604
ProxySG Command Line Interface Reference
# (config) bandwidth-management
Synopsis
Bandwidth management allows you to classify, control, and, if required, limit the amount of bandwidth used by a class of
network traffic flowing into or out of the appliance.
Syntax
# (config) bandwidth-management
# (config bandwidth-management)
Subcommands
#(config bandwidth-management) create class_name
Deletes the specified bandwidth-management class. Note that if another class has a reference to the specified class, this
command fails.
Disables bandwidth-management.
Enables bandwidth-management.
Displays bandwidth-management configuration for all bandwidth-management classes or for the class specified.
Displays bandwidth-management statistics for all bandwidth-management classes or for the class specified.
190 of 604
ProxySG Command Line Interface Reference
Example
# (config) bandwidth-management
# (config bandwidth-management) enable
ok
# (config bandwidth-management) create Office_A
ok
See Also
n "# (config bw-class class_name)" on the next page
191 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) bandwidth-management
# (config bandwidth-management)
Subcommands
# (config bw-class class_name) exit
Resets the maximum bandwidth of this bandwidth-management class to the default (unlimited—no maximum)
Resets the minimum bandwidth of this bandwidth-management class to the default (no minimum).
Sets the priority for this bandwidth-management class. The lowest priority level is 0 and the highest is 7.
192 of 604
ProxySG Command Line Interface Reference
Displays the settings for this bandwidth-management class or displays the settings for the children of this bandwidth-
management class.
Example
# (config) bandwidth-management
# (config bandwidth-management) edit CEO_A
# (config bw-class CEO_A) min-bandwidth 500
ok
# (config bw-class CEO_A) priority 1
ok
# (config bw-class CEO_A) exit
# (config bandwidth-management) exit
# (config)
See Also
n "# (config) bandwidth-management" on page 190
193 of 604
ProxySG Command Line Interface Reference
# (config) banner
Synopsis
Define a login banner for your users.
Syntax
# (config) banner {subcommand}
Subcommands
# (config) banner login string
Example
# (config) banner login "Sales and Marketing Intranet Web"
ok
See Also
n Notice and Consent Banner Configuration WebGuide
194 of 604
ProxySG Command Line Interface Reference
# (config) bridge
Synopsis
Configure bridging.
Syntax
# (config) bridge
# (config bridge)
Subcommands
# (config bridge) bandwidth-class bridge_name
Creates a bridge. This bridge name is case insensitive. You cannot name one bridge “ABC” and another bridge “abc”.
Example
# (config) bridge
# (config bridge) create test
ok
# (config bridge) exit
195 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config bridge bridge_name)" on the facing page
196 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) bridge
# (config bridge)
Subcommands
# (config bridge bridge_name) attach-interface adapter#:interface#
Associates the bridge to a failover group or sets the bridge failover mode.
Sets the bridge mode on appliances equipped with a programmable adapter card. The following adapter card modes are
available:
n disable: Disables the bridge and allows the adapter interfaces to be reused as NICs or as part of another bridge.
n fail-open: If the ProxySG fails, all traffic passes through the bridge so clients can still receive data.
197 of 604
ProxySG Command Line Interface Reference
n fail-closed: If the ProxySG fails, all traffic is blocked and service is interrupted. This mode provides the same
functionality as a user-configured software bridge.
Specifies whether to mute the bridge interfaces upon detecting a bridge loop. By default, muting is enabled.
Enables/disables interface muting when a bridge loop is detected. Muting is enabled by default.
Example
# (config) bridge
# (config bridge) edit b_1
# (config bridge b_1) attach interface 0:1
ok
# (config bridge b_1) failover mode parallel
ok
# (config bridge b_1) exit
# (config bridge) exit
# (config)
198 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config) bridge" on page 195
199 of 604
ProxySG Command Line Interface Reference
# (config) cachepulse
Synopsis
Configure the CachePulse service.
Syntax
# (config) cachepulse
# (config cachepulse)
Subcommands
# (config cachepulse) disable
Downloads the latest data. The CLI displays the download progress and status. If the database is already up-to-date, the
appliance does not download it again. To cancel the download in progress, press and hold CTRL+C.
Ignores any existing data (even if the database is already up-to-date) and force a fresh download of the entire database. To
cancel the download in progress, press and hold CTRL+C.
Specifies the SSL device profile to use when downloading from an internal server.
Sets the encrypted form of the password to use when downloading from an internal server.
200 of 604
ProxySG Command Line Interface Reference
Displays license information, license expiration date, the download URL for the CachePulse database, results of the last
download, last successful download, and database version. This subcommand produces the same output as the # show
cachepulse command.
Example
# (config cachepulse) view
License Type: Subscription
Licensed Until: Wed, 02 Oct 2019 00:00:00 UTC
Service: Enabled
Download method: Direct
Last successful download:
Time: Wed, 01 May 2019 19:11:44 UTC
Downloaded from: https://subscription.es.bluecoat.com/cachepulse/policy
Version: 51266
See Also
n "Intercepting and Optimizing HTTP Traffic" in SGOS Administration Guide
201 of 604
ProxySG Command Line Interface Reference
# (config caching)
Synopsis
When a stored HTTP object expires, it is placed in a refresh list. The appliance processes the refresh list in the background,
when it is not serving requests. Refresh policies define how the device handles the refresh process.
n Negative responses
n Refresh parameters
In addition to HTTP objects, the appliance can store objects requested using FTP. When the device retrieves and stores an
FTP object, it uses two methods to determine how long the object should stay cached.
n If the object has a last-modified date, the appliance assigns a refresh date to the object that is a percentage of the last-
modified date.
n If the object does not have a last-modified date, the appliance assigns a refresh date to the object based on a fixed
period of time.
Syntax
# (config) caching
# (config caching)
Subcommands
# (config caching) always-verify-source
Specifies the ProxySG to always verify the freshness of an object with the object source.
Sets FTP caching options. Changes the prompt to "# (config caching ftp)" on page 204.
202 of 604
ProxySG Command Line Interface Reference
Specifies the maximum size of the cache to the value indicated by megabytes.
Specifies that negative responses should be cached for the time period identified by minutes
Specifies that the ProxySG appliance should never verify the freshness of an object with the object source
Disables the HTTP Disk Backoff feature. Enabled by default, this feature monitors disk activity and prevents cache reading or
writing during periods of peak activity. If disabled, this feature can be enabled by entering automatic-backoff at the (config
caching) prompt.
Automatically adjusts the amount of bandwidth necessary to refresh content, or specifies the amount of bandwidth (in kilobits
per second) that the appliance should use for asynchronous adaptive refresh activity. The range is 0-2097151 kbps; a value of
0 disables adaptive refresh.
Example
# (config) caching
# (config caching) always-verify-source
ok
See Also
n "# (config caching ftp)" on the next page
203 of 604
ProxySG Command Line Interface Reference
n Transparency
n Caching objects without a last-modified date. If an FTP object is served without a last modified date, the appliance
caches the object for a set period of time.
Syntax
# (config) caching
# (config caching)
# (config ftp)
Subcommands
# (config caching ftp) {disable | enable}
204 of 604
ProxySG Command Line Interface Reference
Example
# (config caching ftp) view
Caching FTP objects is enabled
FTP objects with last modified date, cached for 10% of last modified time
FTP objects without last modified date, initially cached for 24 hours
See Also
n "# (config caching)" on page 202
205 of 604
ProxySG Command Line Interface Reference
# (config cifs)
Synopsis
Configure the CIFS proxy for SMBv1 connections.
Syntax
# (config) cifs
# (config cifs)
Subcommands
# (config cifs) directory-cache-time seconds
Determines how long SMBv1 directory information is kept in cache. Changes made to a directory by clients not using the
ProxySG may not be visible to clients until at least this much time has elapsed. The default cache time is 60 seconds.
Disables protocol-based acceleration for SMBv1 connections. All SMBv1 connections are passed through, allowing the CIFS
proxy to accelerate them with byte caching and compression techniques (if enabled for the CIFS service). No object caching is
performed on SMBv1 connections.
Improves performance of SMBv1 connections by attempting to fetch and cache blocks of data that might be requested by a
client before the actual request occurs. This is enabled by default. Disabling this option causes the appliance to fetch and
cache only data actually requested by clients.
When this option is enabled, Windows Explorer modifies the icons of uncached folders on remote servers, indicating to users
that the contents of the folder have not yet been cached by the ProxySG. Applies to SMBv1 connections only.
Configures the domain name to which the username belongs; the appliance will use this domain to perform SMB signing.
Specifying the domain is optional. SMB signing is supported on SMBv1 connections only.
206 of 604
ProxySG Command Line Interface Reference
Specifies the encrypted password that the appliance sends to access the domain when performing SMB signing. Specifying
the encrypted password is optional. SMB signing is supported on SMBv1 connections only.
Note: Before enabling SMB signing on the ProxySG, you must create a user in the domain that
represents the ProxySG. When SMB signing is required by the OCS, the CIFS proxy uses this
virtual user’s credentials. This user cannot be a guest or anonymous. SMB signing is supported
on SMBv1 connections only.
Note: If the client is configured to require SMB signing, which is not a common configuration,
the ProxySG cannot provide CIFS optimization; the traffic passes through with only the
benefits provided by the general ADN configuration.
Specifies the user password that the appliance sends to access the domain when performing SMB signing. SMB signing is
supported on SMBv1 connections only.
Specifies the user in the domain that will be used to perform SMB signing. Ensure you enter the name exactly as created.
Specifying the user name is required. SMB signing is supported on SMBv1 connections only.
When this option is enabled and directory-cache-time is past its expiration, directories are refreshed synchronously instead of
in the background. This is needed when the set of visible objects in a directory returned by a server can vary between users.
This option is disabled by default.
To speed the display of remote folders, enables Suppress Folder Customization to skip extra transactions and always display
remote folders in the default view.
207 of 604
ProxySG Command Line Interface Reference
Improves performance by acknowledging client writes immediately and sending them to the server in the background, or forces
all writes to be sent to the server synchronously. This option is set to full by default.
Example
# (config) cifs
# (config cifs) directory-cache-time 240
ok
See Also
n "Accelerating File Sharing" in SGOS Administration Guide
208 of 604
ProxySG Command Line Interface Reference
# (config clients)
Synopsis
Configure the Client Manager and client configuration options for the ProxyClient.
Syntax
# (config) clients
# (config clients)
Subcommands
# (config clients) acceleration
Configures ProxyClient acceleration. Changes prompt to "# (config clients acceleration) " on page 212.
Clears (that is, sets to zero) the count of inactive ProxyClients or all ProxyClients. Clients are automatically cleared after 30
days of inactivity. After a software upgrade, clients appear twice for 30 days—one entry for the earlier version of client software
and one entry and one entry for the newer version of client software. You can optionally clear the inactive clients to avoid
seeing duplicate information. For a client to be reported as inactive, 10 minutes or more must elapse between heartbeat
packets it sends to the Client Manager.
Sets this appliance as the Client Manager. You can have only one Client Manager in your ADN network.
Identifies this appliance as the Client Manager in one of the following ways:
n from-client-address: (Recommended) Use this command if you want clients to download the ProxyClient software,
configuration, and updates from the host from which the clients originally obtained the software.
n ip_address or host: Use this command only if you want to change the host from which clients download the
ProxyClient software, configuration, and updates. Enter a fully-qualified host name or IP address only; do not preface
the with http:// or https://or downloads will fail.
209 of 604
ProxySG Command Line Interface Reference
In other words, this option enables you to change the host from which currently-installed clients obtain future software
and configuration updates. Use caution when selecting this option because if clients are unable to connect to the host
you enter in the adjacent field, new installations from the Client Manager and updates to existing installations will fail.
Note: Symantec recommends you enter the fully-qualified host name. If you enter either
an unqualified host name or IP address and change it later, connections to all currently-
connected clients are dropped.
Port on which the host you entered in the preceding option listens for requests from clients. The default is 8084.
Name of the keyring the Client Manager will use when clients connect to it.
Sets the URL used to upload updated ProxyClient software to the Client Manager so it can make the latest ProxyClient
software available to update or to install on client machines.
Note: After you update the Client Manager, whenever users connect using the ProxyClient,
they will be required to update the ProxyClient software.
https://host:port/path/ProxyClient.car
Example:
https://myapache.example.com:8088/images/ProxyClient.car
After you set the path from which to load the updates, see "# load" on page 81.
Enter a plain text password that is required if users want to uninstall the ProxyClient software.
210 of 604
ProxySG Command Line Interface Reference
n Enter no uninstall-password.
Enter the uninstall password hashed by the Blowfish algorithm. You can use the hashed password in scripts when you do not
want to expose the password in plain text. The only way to know the Blowfish-hashed password is to view it using the"# show
configuration" on page 102 command.
proxy-client ;mode
hashed-uninstall-password
"$2a$05$XyjVSFGvPkTmUi6zKDmyauSArzwka62evn7c13k6qUenR.KOEz4IC"
Frequency clients check with the Client Manager for updated ProxyClient software. Valid values are 10-432000 (that is, 300
days). Default is 120.
Configure ProxyClient web filtering settings. Changes the prompt to "# (config clients web-filtering) " on page 231.
Example
# (config clients) client-manager host enable
ok
# (config clients) client-manager host from-client-address
ok
# (config clients) software-upgrade-path https://myapache.example.com:8088/images/ProxyClient.car
See Also
n "# (config clients web-filtering) " on page 231
211 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
# (config clients)
Subcommands
# (config clients acceleration) adn
Configures ADN settings. Changes prompt to "# (config clients acceleration adn)" on page 214.
Configures CIFS settings. Changes prompt to "# (config clients acceleration cifs)" on page 218.
Disables all acceleration for ProxyClients; that is, gzip compression, CIFS protocol optimization, and byte caching.
Enables acceleration for ProxyClients; that is, gzip compression, CIFS protocol optimization, and byte caching.
Maximum percentage of client disk space to use for caching objects, such as CIFS objects. Valid values are 10—90; default is
10.
212 of 604
ProxySG Command Line Interface Reference
Example
# (config clients acceleration) max-cache-disk-percent 5
ok
See Also
n "# (config clients) " on page 209
213 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
# (config clients)
# (config clients) acceleration
Subcommands
# (config clients acceleration adn) backup-manager ip_address
The IP address of the backup ADN manager. Configuring a backup ADN manager is optional but recommended. If the ADN
manager becomes unavailable for any reason, the backup ADN manager takes over the task of advertising routes to all ADN
nodes, such as the ProxyClient.
Determines which TCP ports to exclude or include in ADN tunnels. Assuming clients using the ProxyClient software can
connect to an ADN peer that can optimize traffic to the destination IP address, this setting determine ports the clients can use
(or not use). Specify a comma-separated list of ports or a range of ports separated by a hyphen.
Configures the subnets excluded from ADN acceleration. Changes prompt to "# (config clients adn exclude-subnets)" on
page 216.
214 of 604
ProxySG Command Line Interface Reference
ADN manager and backup manager plain listen port. (To use the ProxyClient in your ADN network, the ADN manager’s
listening mode must be configured for plain-only, secure-only, or both. For more information, see "# (config) adn" on page 135.
Determines whether you will use the include ports list or exclude ports list.
The IP address of the primary ADN manager. The ADN manager keeps track of and advertises the routes of the appliances it
knows about. You must specify a primary manager. The ProxyClient obtains the routing table from the ADN manager.
Example
# (config clients acceleration adn) exclude-ports 22,443
ok
215 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
# (config clients)
# (config clients) acceleration
Subcommands
# (config proxy-client acceleration adn exclude-subnets) {add | remove} subnet_prefix[/prefix_length]
Adds or removes subnets from the excluded subnets list, which is the list of subnets not included in ADN tunnels. Use a
comma-separated list of IP addresses and subnets in CIDR notation.
Removes all subnets from the current excluded subnet list. In other words, traffic from all IP addresses and subnets will be
routed through the ADN tunnel.
216 of 604
ProxySG Command Line Interface Reference
Example
# (config proxy-client acceleration adn exclude-subnets) add 192.168.0.1/24
ok
See Also
n "# (config clients acceleration adn)" on page 214
217 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
# (config clients)
# (config clients) acceleration
Subcommands
#(config proxy-client acceleration cifs) directory-cache-time seconds
Number of seconds for directory listings to remain in the cache. Default is 30.
When enabled, Windows Explorer minimizes data transfer when users browse to remote accelerated file shares. The amount
of performance improvement from enabling ProxyClient remote storage optimization depends on how many files are in the
remote folder and how many subfolders are nested under the folder.
218 of 604
ProxySG Command Line Interface Reference
It takes time for a configuration change to take effect. For example, if a client has two tunnels
open to an accelerated file share at the time the client receives a configuration update from the
Client Manager, it might take several minutes before a change from enable to disable takes
effect for these open connections.
On the other hand, the first connection opened to an accelerated file share after a configuration
change is received by the client will use the current configuration setting.
When enabled, prevents Windows Explorer from displaying folder customizations when users browse to a remote accelerated
file share. (An example of folder customization is changing the folder’s icon.)
Note: It takes time for a configuration change to take effect. For example, if a client has two
tunnels open to an accelerated file share at the time the client receives a configuration update
from the Client Manager, it might take several minutes before a change from enable to disable
takes effect for these open connections.
On the other hand, the first connection opened to an accelerated file share after a configuration
change is received by the client will use the current configuration setting.
Determines whether or not users can continue sending data to the appliance while the appliance is writing data on the back
end.
n full enables write-back, which in turn makes the appliance appear to the user as a file server; in other words, the
appliance constantly sends approval to the client and allows the client to send data while the back end takes advantage
of the compressed TCP connection.
n none disables write-back. Disabling write-back can introduce substantial latency as clients send data to the appliance
and wait for acknowledgement before sending more data.
One reason to set this option to none is the risk of data loss if the link from the branch to the core server fails. There is no way
to recover queued data if such a link failure occurs.
219 of 604
ProxySG Command Line Interface Reference
Example
# (config proxy-client acceleration cifs) enable
ok
# (config proxy-client acceleration cifs) write-back full
ok
See Also
n "# (config clients acceleration) " on page 212
220 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
# (config clients)
Subcommands
# (config clients locations) acceleration {enable | disable}
Enables or disables acceleration as a default action if a client does not match any defined locations.
Edits the specified location. Changes to "# (config clients name) " on page 223.
Moves the specified location up or down in the location rulebase. When a ProxyClient connects to the Client Manager, the first
match is applied. You should order locations in the rulebase from most specific to least specific. For example, put a location
221 of 604
ProxySG Command Line Interface Reference
with a source address range from 10.3.0.0 to 10.3.255.255 before a location with the 10.3.0.0. to 10.3.255.255 source address
range first.
Enables or disables Web filtering as a default action if a client does not match any defined locations.
Example
# (config proxy-client locations) create Mobile
ok
# (config proxy-client locations) edit Mobile
# (config proxy-client Mobile) dns
# (config proxy-client Mobile dns) add 198.162.1.10
ok
# (config proxy-client Mobile dns) exit
# (config proxy-client Mobile) match-dns enable
See Also
n "# (config clients) " on page 209
222 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
# (config clients)
Subcommands
# (config clients name) acceleration {enable | disable}
Enables or disables acceleration for this location. This setting enables or disables all forms of acceleration (that is, gzip, CIFS
protocol optimization, and byte caching).
Defines DNS server IP addresses as a condition for this location. Changes prompt to "# (config clients name dns) " on
page 225.
Defines source IP addresses as a condition for this location. Changes prompt to "# (config clients name source) " on page 227.
223 of 604
ProxySG Command Line Interface Reference
Defines virtual NIC IP addresses as a condition for this location. Changes prompt to "# (config clients name vnic) " on
page 229.
Example
#(config clients name) webfilter disable
ok
See Also
n "# (config clients name) " on the previous page
224 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
# (config clients)
Subcommands
# (config clients name dns) add ip_address
Adds a DNS server IP address as a location condition. DNS servers are logically ANDed together so a user must match all
DNS servers defined to match this condition.
225 of 604
ProxySG Command Line Interface Reference
Example
See the example in "# (config clients locations) " on page 221.
See Also
n "# (config clients) " on page 209
226 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
# (config clients)
Subcommands
# (config clients name source) add ip_address_range
Adds a source IP address range as a location condition. Source IP address ranges servers are logically ORd together so a user
must log in from any source IP address in any range defined to match this condition. Source IP address range example:
10.0.0.0-10.255.255.255
Removes a source IP address range from the location condition. Source IP address range example: 10.0.0.0-10.255.255.255
227 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config clients) " on page 209
228 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
# (config clients)
Subcommands
# (config clients name vnic) add vnic_address_range
Add a VNIC IP address range as a location condition. VNIC IP address ranges servers are logically ORd together so a user
must log in from any VNIC IP address in any range defined to match this condition. VNIC IP address range example: 10.0.0.0-
10.255.255.255
Remove a VNIC IP address range from the location condition. VNIC IP address range example: 10.0.0.0-10.255.255.255
229 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config clients) " on page 209
230 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
Subcommands
# (config clients web-filtering) {enable | disable}
Sets the default action to allow, block, or warn users and groups if they try to access content in this category. Before you can
allow, block, or warn users or groups individually using the # (config clients web-filtering) user-group-rules
category_name command, you must use this command to set the default action for the category.
n Policy categories
Sets the default action to take in the event the user requests content that is not classified in any category you selected.
231 of 604
ProxySG Command Line Interface Reference
Specifies the action to take if the BCWF license expires (usually because the database has not been updated in a 30-day
period). closed means users are not allowed to browse to any Web page. A Service Unavailable exception displays in the
user’s Web browser. open means users are allowed to browse anywhere; in other words, content is not filtered. Select this
option if user Web access is more critical than filtering or security.
Set to enable to use Web filtering when the content request is sent over an SSL connection using the default port 443. For
exceptions to this behavior, see the ProxyClient Release Notes. Set to disable to not filter HTTPS traffic from unsupported
browsers.
#(config clients web-filtering) inline exception {block | warn | unavailable} data EOF_marker
Sets up exception pages to display to users when they attempt to access certain content. Set the exception page for a page
when users attempt to access content that might violate company policies. Set the exception page for unavailable to display a
page when users attempt to access content that cannot be categorized because the service point is not available.
Configures the ProxyClient log. Changes the prompt to "# (config clients log)" on page 234.
Moves the specified category (including all users and groups defined for this category) up or down one position in the Web
filtering rulebase. Policy actions (allow, block, warn) are applied to the first rule that matches the URL request. Because URLs
are typically classified in more than one category, the rulebase order is important. An error is displayed if you attempt to
promote a category that is already first in the rulebase or if you attempt to demote a category that is already last in the rulebase.
Moves category_name (including all users and groups defined for this category) to the top or bottom of the web filtering
rulebase. An error displays if you attempt to promote a category that is already first in the rulebase or if you attempt to demote a
category that is already last in the rulebase.
Sets up rules for users and user groups for the specified category. Changes the prompt to "# (config clients web-filtering
category)" on page 237. If you receive the message % Default action not set for category category_name,
you must set the default action for the category using # (config clients web-filtering) {allow | block | warn}
category_name first.
232 of 604
ProxySG Command Line Interface Reference
Example
# (config clients web-filtering) enable
ok
# (config clients web-filtering) allow News/Media
ok
See Also
n "# (config clients) " on page 209
233 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
Subcommands
# (config clients log) {disable | enable}
Enable or disable uploading of ProxyClient Web filtering user logs to an anonymous FTP server.
Enter the maximum log file size, in megabytes, to trigger a log file upload. This value takes precedence over the periodic-
upload parameter. In other words, if you specify periodic-upload 24 and early-upload 10, if the client log file size reaches 10
megabytes after only 10 hours, the ProxyClient attempts to upload its log files to the FTP server.
# (config clients log) ftp-client {{primary | alternate} {host host_or_IP_address [port port]} {path
path}}
Specifies the anonymous FTP server to which users upload ProxyClient Web filtering logs and the path to which to upload the
files. You can optionally precede the relative path with the / character; uploads will succeed whether or not the first character is
/.
Examples:
/path/to/log/directory
path/to/log/directory
To upload logs to the FTP server’s home directory, leave the field blank.
234 of 604
ProxySG Command Line Interface Reference
Note: Entering / in the field (with no path following the / character) causes uploads to fail.
Because log files are uploaded using anonymous FTP, Symantec strongly recommends you put your FTP server behind the
corporate firewall. In addition, you should configure the FTP server as follows:
n For security reasons, do not allow files on the FTP server’s upload directory to be browsed.
n If the FTP server is deployed behind a firewall, the firewall must be configured to allow FTP data connections over TCP
ports greater than 1024.
n Placing an FTP server outside the firewall has the advantage that even mobile users can upload log files to it; however,
it exposes the server and your company to potentially serious malicious activity.
Enter all-requests to upload the entire client log. Enter exceptions-only to upload only exceptions.
Enter the number of hours for clients to attempt to upload their logs to the anonymous FTP server. Optionally enter the number
of minutes, in addition to hours.
Note: If you enter a non-zero value for both hours and minutes, the total amount of time is
used. For xample, if you enter periodic-upload 24 10, the client waits 24 hours and 10 minutes
to upload log files.
A change to the upload period does not take effect immediately. In other words, if the upload period is 24 hours and you change
it to 20 hours, clients with the 24 hour configuration wait 24 hours to upload their current logs before the 20 hour upload period
takes effect.
Example
# (config clients log) mode all-requests
ok
235 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config clients) " on page 209
236 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) clients
Subcommands
# (config clients web-filtering category) {allow | block | warn} user_group_name
Allows, blocks, or warns users and groups accessing content in this category. Before you can use this command, you must
set the default action for the category. If the user_group_name you enter does not already exist, it is created. User and group
names can be in any of the following formats:
Fully qualified account names (for example, domain_name\\user_name). You should avoid using isolated names (for example,
user_name).
Moves user_group_name up or down one position in category the Web filtering rulebase. Policy actions (allow, block, warn) are
applied to the first rule that matches the URL request. An error displays if you attempt to promote a user-group rule that is
already first in the category or if you attempt to demote a user-group rule that is already last in the category.
237 of 604
ProxySG Command Line Interface Reference
Moves user_group_name to the top or bottom in category in the Web filtering rulebase. An error displays if you attempt to
promote a category that is already first in the rulebase or if you attempt to demote a category that is already last in the rulebase.
For the selected category, displays the default action and all user-group rules.
238 of 604
ProxySG Command Line Interface Reference
# (config) clock
Synopsis
To manage objects in the cache, a ProxySG must know the current Universal Time Coordinates (UTC) time. By default, the
device attempts to connect to a Network Time Protocol (NTP) server to acquire the UTC time. The ProxySG includes a list of
NTP servers available on the Internet, and attempts to connect to them in the order they appear in the NTP server list on the
NTP tab. If the ProxySG cannot access any of the listed NTP servers, you must manually set the UTC time using the clock
command.
Syntax
# (config) clock {subcommand}
Subcommands
# (config) clock day 1_to_31
Sets the Universal Time Code (UTC) day to the specified calendar day.
Example
# (config) clock year 2020
ok
See Also
n "# (config) timezone" on page 599
239 of 604
ProxySG Command Line Interface Reference
# (config cloud-service)
Synopsis
Use the cloud-service commands to configure options relating to the Symantec Cloud Service. The Symantec Cloud Service
enables all subscribed devices to share the same common policy, whether on-premise or off-premise. The policy can also be
modified on the appliance to conform to local conditions. In this way, you can create general policies that apply to all locations
while overriding rules that conflict with local requirements. To use this service, you must first obtain a Symantec Cloud Service
account (contact your Symantec sales representative).
The Advanced Lab Network (ALN) is a Symantec cloud service testing environment. It includes all current functionality plus
yet-to-be released new features. ALN access is limited to specific Symantec customers, and is not available with all cloud
service subscriptions. Contact your local Symantec Sales Engineer to inquire about accessing the ALN to preview and test
new features and provide feedback to Symantec.
Syntax
# (config) cloud-service
# (config cloud-service)
Subcommands
# (config cloud-service) common-policy {disable | enable}
Enables or disables subscription to the policy installed on the Symantec cloud service. To use this service, Symantec
WebFilter must be enabled and the appliance must be registered with the cloud service. Enabling the cloud common-policy
enables all subscribed devices to share the same policy configuration, whether on-premises or off-premises. The policy
synchronizes with the master file every 15 minutes from last boot time. This interval cannot be changed but you can force an
immediate update.
Removes the appliance from the Symantec cloud service. The force option forces deregistration even if there are errors (the
appliance removes all cloud-provisioned policy and returns the system to the pre-registration state).
Registers the appliance with the Symantec cloud service. Before registering the appliance, you must have obtained a
Symantec cloud service account.
240 of 604
ProxySG Command Line Interface Reference
Synchronizes the installed common policy with the master file in the cloud. You can use this command to re-download the
common policy even if the ProxySG appliance has the latest copy of policy as this may be useful when troubleshooting.
Selects the cloud service network to use, the Advanced Labs Network (ALN) or production. By default the appliance will
always use the production portal. To view this option, you must enter the reveal-advanced all command from the config or
enable prompt.
Tip: You must first use # reveal-advanced all to show this command. You require an ALN
account for this command to be useful; for details, contact your Symantec sales
representative.
Example
# (config cloud-service) register chicago2 admin@example.com Admin
ok
# (config cloud-service) common-policy enable
ok
# (config cloud-service) view
Location: chicago2
Last successful update time: 2012-07-11 14:42:04-07:00PDT
Last attempted update time: 2012-07-12 08:03:38-07:00PDT
Failed update attempts: 0
Entitlements:
Common Policy: enabled, expires on 2014-02-28
# (config cloud-service) update-now
241 of 604
ProxySG Command Line Interface Reference
# (config connection-forwarding)
Synopsis
Configure TCP connection forwarding for ADN transparent tunnel load balancing and asymmetric routing.
Syntax
# (config) connection-forwarding
# (config connection-forwarding)
Subcommands
# (config connection-forwarding) {add | remove} IP_address
Specifies the port used by all peers in the peer group to communicate connection information (each peer in the group must use
the same port number). The default is 3030.
Example
# (config) connection-forwarding
# (connection-forwarding) add 10.9.59.100
ok
# (config connection-forwarding) port 3030
ok
# (config connection-forwarding) enable
ok
242 of 604
ProxySG Command Line Interface Reference
See Also
n "TCP Connection Forwarding" in SGOS Administration Guide
243 of 604
ProxySG Command Line Interface Reference
# (config) content
Synopsis
Manage and manipulate content distribution requests and re-validate requests for HTTP, FTP, CIFS, and streaming content.
Syntax
# (config) content {subcommand}
Subcommands
# (config) content cancel outstanding-requests
Cancels outstanding content distribution requests and re-validates requests for the specified URL. See "URL Formats for File
Types" on the facing page for details.
Deletes content for the specified URL. See "URL Formats for File Types" on the facing page for details.
Content associated with the specified URL should be distributed from the OCS and put in the ProxySG cache. Specify the
[from from_URL] when users will be accessing content from a different location than what is specified when pre-populating
the cache. For example, the [from from_URL] is useful when you are pre-populating content in a lab environment using a
different host from the one that will be used once the appliance is deployed. See "URL Formats for File Types" on the facing
page for details.
Adds a content deletion policy for the specified URL. See "URL Formats for File Types" on the facing page for details.
244 of 604
ProxySG Command Line Interface Reference
Revalidates the content associated with the URL. See "URL Formats for File Types" below for details.
cifs://domain;username:password@server/share/path-to-file
http://username:password@host:port/path-to-file
ftp://username:password@host:port/path-to-file
n To pre-populate Flash video on demand (VOD) content, use one of the URL formats:
rtmp://hostip[:port]/path-to-file
rtmpt://hostip[:port]/path-to-file
rtmpe://hostip[:port]/path-to-file
rtmpte://hostip[:port]/path-to-file
Note: Conversion from encrypted content to unencrypted content, such as from RTMPE
to RTMP, is not supported.
n To pre-populate streaming content using RTSP or MMS, use one of the URL formats:
rtsp://username:password@host:port/path-to-file
mms://username:password@host:port/path-to-file
245 of 604
ProxySG Command Line Interface Reference
Note: Credentials (domain;username:password) must be supplied in the URL that is being sent to the server. The
credentials will be part of the url field unless the from_url is specified; in this case, the credentials are specified as part
of the from_url.
password Can contain any character except spaces and the following:
server/host Can contain the following characters only: a-z A-Z 0-9 ~!$%&*()-_=+;.’,
path-to-file Can reference a specific file or a directory. If you specify a directory (without a filename), all files and subdirectories in
that directory will be pre-populated. • Can contain any characters except the following:
If the path-to-file contains spaces, enclose the entire URL in quotation marks, or substitute each space with the
following escape code: %20. If the path-to-file contains a percent sign, substitute the % with %25.
Note for CIFS URLs: If you do not specify a path, all files and directories in the specified share will be pre-populated.
Example
# (config) content cancel outstanding-requests
ok
See Also
n "Managing Streaming Media" in SGOS Administration Guide
246 of 604
ProxySG Command Line Interface Reference
# (config content-analysis)
Synopsis
Configure Content Analysis.
Use the edit ICAP commands to configure the ICAP service used to integrate the ProxySG with a virus scanning server. The
configuration is specific to the virus scanning server and includes the server IP address, as well as the supported number of
connections. If you are using the appliance with multiple virus scanning servers or multiple scanning services on the same
server, add an ICAP service for each server or scanning service.
Note: When you define virus scanning policies, use the same service name. Make sure you
type the ICAP service name accurately when configuring the service on the ProxySG
appliance or defining policies. The name retrieves the other configuration settings for that
service.
Syntax
# (config) content-analysis
# (config content-analysis)
Subcommands
# (config content-analysis) create icap icap_service_name
Edits the specified ICAP service. Changes the prompt to "# (config icap service_name)" on page 249.
Edits the specified ICAP service group. Changes the prompt to "# (config service-group group_name)" on page 252.
247 of 604
ProxySG Command Line Interface Reference
For traffic associated with a Web browser, display a patience page after the specified duration.
For interactive traffic (associated with a Web browser) or non-traffic (originating from a client other than a Web browser),
employ a data trickling method so the user receives a small amount (trickle-start) or large amount (trickle-end) of object data
while waiting for the results of the content scan (ICAP). Begin trickling after the specified duration.
# (config content-analysis) inline http icap-patience {details eof | header eof | help eof | summary
eof}
Example
# (config) content-analysis
# (config content-analysis) create icap testicap
ok
See Also
n "# (config icap service_name)" on the facing page
248 of 604
ProxySG Command Line Interface Reference
Syntax
# (config content-analysis) edit ICAP_service_name
Subcommands
# (config icap service_name) defer-threshold threshold
Sets the threshold at which the appliance defers the oldest ICAP connection that has not yet received a full object. The
threshold can be from 0 to 100 percent.
If the ICAP scan detects a virus, the event is noted in the event log and a notification is emailed to the administrator and the
event log email list.
249 of 604
ProxySG Command Line Interface Reference
Sets the preview size for the RESPMOD service if one of the following applies to your deployment:
n If you use file scanning policies based on file extensions on the ProxyAV appliance, specify 0 bytes so that only
response headers are sent to the ICAP server. More object data is sent if the ICAP server requests it.
n If you have enabled the Kaspersky Apparent Data Types feature on the ProxyAV appliance, specify a non-zero value
(512 is recommended). The ICAP server reads the object up to the specified byte total. The ICAP server either
continues with the transaction (that is, receives the remainder of the object for scanning) or opts out of the transaction.
Specifies the secure ICAP port or use default port 11344. In addition, make sure that you specify an SSL device profile for
secure ICAP connections.
Automatically configures the ICAP service using the ICAP server parameters.
Identifies the ICAP service type as being DLP, Threat Protection, or other. Use this option if you are migrating appliance policy
to the Symantec Web Security Service.
Specifies the SSL device profile to use for secure ICAP connections. This is required for secure ICAP.
Specifies a value from 1 to 65535. This is the number of seconds that the appliance waits for replies from the ICAP server. The
default timeout is 70.
Specifies the ICAP server URL, which can be the URL schema, ICAP server hostname, or IP address. If you use third-party
ICAP, refer to the vendor for the appropriate URL format.
250 of 604
ProxySG Command Line Interface Reference
Example
# (config icap ICAP_1) ssl-device-profile ssl_1
ok
# (config icap ICAP_1) secure-port 90
ok
See Also
n "# (config content-analysis)" on page 247
251 of 604
ProxySG Command Line Interface Reference
Syntax
# (config content-analysis) edit service_group_name
Subcommands
# (config service-group group_name) add service_name
Edits the specified service. The service must be a member of the current group. Changes the prompt to "# (config service-
group group_name service_name)" on the facing page.
Example
# (config service-group serviceCA1) add ICAP_2
ok
See Also
n "# (config content-analysis)" on page 247
252 of 604
ProxySG Command Line Interface Reference
Syntax
# (config service-group group_name) edit service_name
Subcommands
# (config service-group group_name service_name) exit
Example
# (config service-group groupCA service2) view
service2
weight 1
See Also
n "# (config content-analysis)" on page 247
253 of 604
ProxySG Command Line Interface Reference
# (config content-filter)
Synopsis
The ProxySG appliance offers the option of using content filtering to control the type of retrieved content and to filter requests
made by clients. The appliance supports the following content filtering methods:
n Local database
This method allows you to create and maintain your own content-filtering list locally, through the ProxySG CLI or
Management Console.
BCWF is a highly effective content-filtering service that can quickly learn and adapt to the working set of its users.
Also, BCWF can use Dynamic Real Time Rating (DRTR) to analyze requested Web pages in real time, blocking new,
unrated content on the fly, while providing the database with instant updates that impact all users without service
interruption.
The IWF is a non-profit organization that provides enterprises with a list of known child pornography URLs. The IWF
database features a single category called IWF-Restricted, which is detectable and blockable using policy. IWF can be
enabled along with other content-filtering services.
This method allows you to block URLs using vendor-defined categories. For this method, use content-filtering solutions
from the following vendors:
o Optenet
o Proventia™
You can also combine this type of content filtering with the ProxySG policies, which use CPL.
n YouTube™
You can enable YouTube categories and then add policy that refers to these categories to control traffic. For example,
you could block videos that YouTube categorizes as Entertainment and Movies. You can enable and disable this
feature in the CLI.
This feature is provided on an "as-is" basis. Symantec has no control of, and is not responsible for, information and
content provided (or not) by YouTube. Customer is required to apply and use its own API key in order to activate this
feature, and therefore obligated to comply with all terms of use regarding the foregoing (for example, see
https://developers.google.com/youtube/terms), including quotas, restrictions and limits on use that may be imposed by
YouTube. Symantec shall not be liable for any change, discontinuance, availability or functionality of the features
described herein.
254 of 604
ProxySG Command Line Interface Reference
This method allows you to block by URL, including filtering by scheme, domain, or individual host or IP address. For
this method, you define ProxySG policies, which use CPL.
Syntax
# (config) content-filter
# (config content-filter)
Subcommands
# (config content-filter) bluecoat
Enters configuration mode for the Blue Coat provider. Changes prompt to "# (config bluecoat)" on page 259.
Specifies whether to limit CPU utilization to 25% for content filtering database updates. By default, this option is enabled
(meaning that CPU is limited for database downloads).
Enters configuration mode for IWF. Changes prompt to "# (config iwf)" on page 263.
Enters configuration mode for local databases. Changes prompt to "# (config local)" on page 266.
Sets the amount of RAM that the content filter service can use.
Note: The default memory allocation (normal) is ideal for most deployments. Changing the
memory allocation might have significant impacts on performance of the appliance. Be sure
that the setting you choose is appropriate for your deployment.
255 of 604
ProxySG Command Line Interface Reference
Content filtering databases are becoming larger and can cause CPU spikes, restarts and issues with the ProxySG appliance’s
performance. If you find this is the case, you can change the amount of RAM (the ceiling) that the content filtering service
(CFS) is allowed to use. The high option maximizes memory use for content-filtering, and the low option minimizes memory
use for content- filtering.
Adjust the amount of memory allocated to the database in the following situations:
n If you are not using ADN and have a high transaction rate for content filtering, you can increase the memory allocation
setting to high. This helps content filtering run more efficiently.
n If you are using both ADN and content filtering but the transaction rate for content filtering is not very high, you can
reduce the memory allocation setting to low. This makes more resources available for ADN, allowing it to support a
larger number of concurrent connections.
The command causes a reload of all enabled content filter providers, with the new effective ceiling in place.
If you downgrade the SGOS, memory allocation reverts to normal for the platform. When re-upgraded, the selected setting is
reinstated on the ProxySG appliance.
Enables or disables the Blue Coat provider. The lookup-mode option specifies whether every URL should be categorized by
the downloaded filter.
Enables or disables the default local database. The lookup-mode option specifies whether every URL should be categorized by
the downloaded filter.
Enables or disables the specified local database. The lookup-mode option specifies whether every URL should be categorized
by the downloaded filter.
Enables or disables IWF filtering. The lookup-mode option specifies whether every URL should be categorized by the
downloaded filter.
256 of 604
ProxySG Command Line Interface Reference
Disables or enables YouTube categories. It is disabled by default. See "# (config youtube)" on page 271 for requirements
before you can enable or disable the feature.
Used for categorization review for certain providers. The review-message setting enables two substitutions that can be used in
exceptions pages to allow users to review or dispute content categorization results.
Displays categories (defined by the system, policy, and enabled providers) and category groups (defined by the system,
policy, and the Blue Coat provider if enabled) for the specified URL.
Shows the current settings for the local database (if it is in use) and the selected provider (if one is selected).
Displays all categories defined by the system and policy. If the Blue Coat provider is enabled, displays all categories and
category groups.
(Requires enabled Blue Coat provider) Displays system, policy, and Blue Coat categories that belong to the specified category
group or subgroup. Enclose group names with spaces with double quotes, such as # (config content-filter) view
categories group "file transfer". If the Blue Coat provider is disabled, the CLI returns none for this command.
If the Blue Coat provider is enabled, displays all category groups and subgroups defined by the system, policy, and Blue Coat.
If the Blue Coat provider is disabled, the CLI returns only system-defined category groups for this command.
Example
# (config content-filter) test netflix.com
Testing URL 'http://netflix.com/'
categories:
257 of 604
ProxySG Command Line Interface Reference
Policy: none
Blue Coat: TV/Video Streams; Entertainment
groups:
Blue Coat: Multimedia; Non-Productive; Leisure
See Also
n "# (config bluecoat)" on the facing page
258 of 604
ProxySG Command Line Interface Reference
# (config bluecoat)
Synopsis
Configure Symantec WebFilter and Intelligence Services for content filtering. Commands for downloading the database from
an internal server are available only if Intelligence Services is selected as the data source.
Syntax
# (config) content-filter
# (config content-filter)
# (config bluecoat)
Subcommands
# (config bluecoat) data-source web-filter
Specifies the encrypted password for the database download server. If Intelligence Services is selected as the data source,
specifies the encrypted password when downloading from an internal server.
259 of 604
ProxySG Command Line Interface Reference
Downloads the latest data. The CLI displays the download progress and status. If the database is already up-to-date, the
appliance does not download it again. To cancel the download in progress, press and hold CTRL+C.
Downloads the latest data in the background. You can continue to use the CLI while the download is in progress. If the
database is already up-to-date, the appliance does not download it again.
Specifies the password for the database download server. If Intelligence Services is selected as the data source, specifies the
password to use when downloading from an internal server.
Specifies the SSL device profile to secure connections to the internal server.
Specifies using either the default URL or a specific URL for the database download server. If Intelligence Services is selected
as the data source, only url is available, and it specifies the URL for an internal server for database download.
Specifies the username for the database download server. If Intelligence Services is selected as the data source, specifies the
username for the internal server for database download.
(WebFilter only) Clears the password for the database download server.
Clears the URL for the database download server. If Intelligence Services is the data source and an internal server is
specified, clearing this parameter resets the database download option to the default (direct download from Symantec).
260 of 604
ProxySG Command Line Interface Reference
Clears the WebPulse cache, effective whether WebFilter or Intelligence Services is the data source. Use this command
instead of disabling and re-enabling the WebPulse service, for example, when a URL is categorized incorrectly.
Configures the forwarding host for use with dynamic categorization; stops forwarding of dynamic service requests.
Configures the HTTPS mode and level of information sent in dynamic categorization requests for HTTPS transactions sent to
WebPulse:
Configures the SOCKS gateway for use with dynamic categorization; stops the use of a SOCKS gateway with dynamic
service requests .
Configures the default dynamic categorization to run in the background, run in real time, or to not run.
Example
# (config) content-filter
# (config content-filter) bluecoat
# (config bluecoat) service mode background
ok
261 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config content-filter)" on page 254
262 of 604
ProxySG Command Line Interface Reference
# (config iwf)
Synopsis
Configure Internet Watch Foundation content filtering.
Syntax
# (config) content-filter
# (config content-filter)
# (config iwf)
Subcommands
# (config iwf) download all-day
Downloads the latest data. The CLI displays the download progress and status. If the database is already up-to-date, the
appliance does not download it again. To cancel the download in progress, press and hold CTRL+C.
Downloads the latest data in the background. You can continue to use the CLI while the download is in progress. If the
database is already up-to-date, the appliance does not download it again.
263 of 604
ProxySG Command Line Interface Reference
Specifies using either the default URL or a specific URL for the database download server.
(WebFilter only) Clears the password for the database download server.
Clears the URL for the database download server. If Intelligence Services is the data source and an internal server is
specified, clearing this parameter resets the database download option to the default (direct download from Symantec).
Example
# (config) content-filter
# (config content-filter) iwf
# (config iwf) download password password
ok
264 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config content-filter)" on page 254
265 of 604
ProxySG Command Line Interface Reference
# (config local)
Synopsis
Configure the default local content filtering database. You require access to a web server to host a local database.
Syntax
# (config) content-filter
# (config content-filter)
# (config local)
Subcommands
# (config local) clear
Creates an additional local database with the specified name. You can create up to seven named local databases in addition to
the default. See "# (config local database_name) " on page 268.
Edits settings for the specified non-default local database. Changes prompt to "# (config local database_name) " on page 268.
266 of 604
ProxySG Command Line Interface Reference
Example
# (config) content-filter
# (config content-filter) local
# (config local) view databases
default
local1
local2
...
See Also
n "# (config content-filter)" on page 254
267 of 604
ProxySG Command Line Interface Reference
To enable a custom local database after it is configured, you must use the # (config content-filter) provider local
enable database_name command.
Syntax
# (config) content-filter
# (config content-filter)
# (config local)
# (config database_name)
Subcommands
# (config local database_name) clear
Checks for updates all day for the current local database.
Sets the interval for automatic update checks for the current local database.
268 of 604
ProxySG Command Line Interface Reference
Specifies the encrypted password for the current local database download server.
Specifies the password for the current local database download server.
Specifies the username for the current local database download server.
Clears the encrypted password for the current local database download server.
Clears the password for the current local database download server.
Clears the URL for the current local database download server.
Clears the username for the current local database download server.
269 of 604
ProxySG Command Line Interface Reference
Example
Configure a custom local database named BadUrls and then enable it. You must enable it to download the database and use
the categories in policy.
# (config) content-filter
# (config content-filter) local
# (config local) edit region3
# (config local region3) source
; Local Database source:
;
define category region_sites
list_of_URLs
end
...
See Also
n "# (config content-filter)" on page 254
270 of 604
ProxySG Command Line Interface Reference
# (config youtube)
Synopsis
Configure YouTube categories.
Syntax
# (config) content-filter
# (config content-filter)
# (config youtube)
Subcommands
# (config youtube) exit
Note: You must disable YouTube categories before using this command. You can disable the
feature in the Management Console or using the # (config content-filter) provider
youtube disable command.
Sets the server key for YouTube API v3. Refer to TECH245050:
http://www.symantec.com/docs/TECH245050
Example
# (config youtube) view
Status: Enabled
271 of 604
ProxySG Command Line Interface Reference
Server-key: xxxxxxxxxxxx-_xx_xxxxxxx-xxxxxxxxxxxxxx
See Also
n "# (config content-filter)" on page 254
272 of 604
ProxySG Command Line Interface Reference
# (config diagnostics)
Synopsis
Configure the remote diagnostic feature Heartbeat.
Syntax
# (config) diagnostics
# (config diagnostics)
Subcommands
# (config diagnostics) cpu-monitor {disable | enable}
Enables or disables the CPU monitor (the CPU monitor is enabled by default).
Sets the periodic interval of the CPU monitor from 1 to 59 seconds (the default setting is 5 seconds).
Configures the specified snapshot job. Changes the prompt to "# (config snapshot snapshot_name) " on page 278.
Clears the Syslog host that is configured for diagnostics upload via the diagnostics probe policy. Refer to define probe in the
Content Policy Language Reference.
Configures service info. Changes the prompt to "# (config service-info)" on page 282.
273 of 604
ProxySG Command Line Interface Reference
Create or delete a snapshot job. By default, the sysinfo snapshot job keeps the last 100 snapshots. The sysinfo_stats
snapshot job keeps the last 168 snapshots.
Adds a TCP Syslog host for diagnostics uploads when syslog is the delivery method for the diagnostics probe. Refer to
define probe in the Content Policy Language Reference.
Adds a TLS Syslog host for diagnostics uploads when syslog is the delivery method for the diagnostics probe. Refer to
define probe in the Content Policy Language Reference.
Displays diagnostics settings for Heartbeats, CPU monitor, automatic service-info, and snapshots.
Displays the snapshot settings (target, status, interval, to keep, to take, and next snapshot) for the snapshot name specified.
Displays the configuration settings for the Syslog of the diagnostics probe. Refer to define probe in the Content Policy
Language Reference.
Example
# (config) diagnostics
# (config diagnostics) heartbeat enable
ok
See Also
n "# (config service-info)" on page 282
274 of 604
ProxySG Command Line Interface Reference
# (config service-info)
Synopsis
Send service information reports to Symantec.
Syntax
# (config) diagnostics
# (config diagnostics)
# (config service-info)
Subcommands
# (config service-info) auto {disable | enable}
Clears the Support case number for the automatic service information feature.
Sets the Support case number for the automatic service information feature.
Sets a bandwidth class used to manage the bandwidth of service information uploads. In order to do bandwidth-manage
service information uploads, bandwidth management must be enabled. You must also create a bandwidth class for service
information uploads (in bandwidth-management mode) before you can select it here.
275 of 604
ProxySG Command Line Interface Reference
Sets the interval (in hours) for periodic upload. For example, type 12 to send reports every 12 hours.
Set the Support case number for periodic service information uploads.
Sends a specific Support case number along with a specific command or commands (chosen from the list provided by #
(config service-info) view available) to Symantec.
Example
# (config) diagnostics
# (config diagnostics) service-info
276 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config diagnostics)" on page 273
277 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) diagnostics
# (config diagnostics)
Subcommands
# (config snapshot snapshot_name) clear-reports
278 of 604
ProxySG Command Line Interface Reference
Example
# (config) diagnostics
# (config diagnostics) snapshot testshot
# (diagnostics snapshot testshot) enable
ok
See Also
n "# (config diagnostics)" on page 273
279 of 604
ProxySG Command Line Interface Reference
# (config disk-monitor)
Synopsis
The purpose of the disk monitor is to detect problematic drives on physical ProxySG appliances and to proactively stop using
the object store on a drive when disk issues are detected. Disk monitor failure detection is based on error codes received from
the drives in the system, SMART monitoring results, and disk response times.
Note: This command has no impact to appliances that have only a single disk installed.
The offline policies for disk-monitor set how the appliance will handle performance issues with each object store disk or
partition in the system. Performance is measured as a combination of Self-Monitoring Analysis and Reporting Technology
(SMART) error reports and disk response time. If a disk or partition is performing poorly, disk-monitor will enact the configured
offline policy.
n Conservative Policy: The least intensive policy, the Conservative Policy takes action only when performance issues
are the result of physical errors on disk.
n Moderate Policy: This policy builds on the Conservative policy, with activity based on additional hard disk error code
monitoring.
n Aggressive policy: This policy includes the monitoring activities of the above two policies, and includes SMART disk
errors and disk response time monitoring as well.
Syntax
# (config) disk-monitor
# (config disk-monitor)
Subcommands
# (config disk-monitor) no offline-policy
Sets the disk-monitor policy for taking poor-performing object store partitions offline.
280 of 604
ProxySG Command Line Interface Reference
Example
# (config) disk-monitor
# (config disk-monitor) offline-policy moderate
offline-policy: moderate
281 of 604
ProxySG Command Line Interface Reference
# (config service-info)
Synopsis
Send service information reports to Symantec.
Syntax
# (config) diagnostics
# (config diagnostics)
# (config service-info)
Subcommands
# (config service-info) auto {disable | enable}
Clears the Support case number for the automatic service information feature.
Sets the Support case number for the automatic service information feature.
Sets a bandwidth class used to manage the bandwidth of service information uploads. In order to do bandwidth-manage
service information uploads, bandwidth management must be enabled. You must also create a bandwidth class for service
information uploads (in bandwidth-management mode) before you can select it here.
282 of 604
ProxySG Command Line Interface Reference
Sets the interval (in hours) for periodic upload. For example, type 12 to send reports every 12 hours.
Set the Support case number for periodic service information uploads.
Sends a specific Support case number along with a specific command or commands (chosen from the list provided by #
(config service-info) view available) to Symantec.
Example
# (config) diagnostics
# (config diagnostics) service-info
283 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config diagnostics)" on page 273
284 of 604
ProxySG Command Line Interface Reference
# (config) dns
Synopsis
Modify the DNS settings for the ProxySG appliance. Alternate DNS servers are only checked if the servers in the standard
DNS list return “Name not found.”
Syntax
# (config) dns {subcommand}
Subcommands
# (config) dns clear imputing
Disables or enables client-affinity. When enabled, requests from the same client resolve the hostname in the same order.
www.google.com resolves to 66.102.7.99, 66.102.7.147, and 66.102.7.104. If client-affinity is enabled and the appliance
receives a request (http, streaming or other proxy request) for www.google.com, it uses the client’s IP address to determine
the order of the resolved addresses. If client-affinity is disabled, the order of the resolved addresses changed each time the
appliance receives a request.
Disables or enables extension mechanisms for DNS (EDNS), which allows DNS requesters to receive DNS UDP messages
longer than the default 512 bytes.
Sets the DNS negative cache time-to-live value for seconds. A DNS request to an unknown domain name is cached by the
ProxySG appliance. This type of caching is called a negative cache because it does not resolve to an actual IP address. The
TTL value for a negative cache entry can be overwritten by this command.
Removes the imputed name identified by imputed_name from the name imputing list.
285 of 604
ProxySG Command Line Interface Reference
Disables or enables DNS recursion. By default, recursion is disabled. When recursion is enabled, if a server returns
authoritative server information instead of an A record, the ProxySG follows the referrals until it receives an answer or detects
a recursion loop. If there are more than eight referrals, the ProxySG assumes that there is a loop and aborts the request.
Example
# (config) dns imputing symantec.com
ok
286 of 604
ProxySG Command Line Interface Reference
# (config dns-forwarding)
Synopsis
Create, delete, and edit DNS forwarding groups for the appliance.
Syntax
# (config) dns-forwarding
# (config dns-forwarding)
Subcommands
# (config dns forwarding) create group_alias [host_ip]
Edits the specified forwarding group. Changes the prompt to # (config dns forwarding group_name).
Example
# (config dns forwarding) create testgroup 1.1.1.1
ok
See Also
n "# (config) dns" on page 285
287 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) dns-forwarding
# (config dns-forwarding)
Subcommands
# (config dns fowarding group_name) add {domain domain | server server_ip}
Adds domains or DNS servers to this group. IP addresses can be IPv4 or IPv6.
Promotes the specified server IP address in the DNS server list the number of places indicated. Must be a positive number. If
the number is greater than the number of servers in the list, the server is promoted to the first entry in the list.
288 of 604
ProxySG Command Line Interface Reference
Example
# config dns forwarding primary) add server 192.0.2.0
ok
# (config dns forwarding primary) demote 192.0.2.0
% Server is already last in the list.
# (config dns forwarding primary) promote 192.0.2.0
# (config dns forwarding primary) view
Group: primary
Servers:
1.1.1.1
1.2.1.1
Domains:
See Also
n "# (config) dns" on page 285
289 of 604
ProxySG Command Line Interface Reference
# (config event-log)
Synopsis
Configure the ProxySG appliance to log system events as they occur. Event logging allows you to specify the types of system
events logged, the size of the event log, and to configure Syslog monitoring. The appliance can also notify you by e-mail if an
event is logged.
Note: When configuring Syslog monitoring, make sure that the transport protocol (UDP, TCP,
or TLS) is enabled on the Syslog loghost server. Symantec recommends that you use TLS for
best security instead of UDP or TCP. Before configuring a Syslog host using TLS, create client
and server certificates and import them to the respective systems. For details, refer to the
SGOS Administration Guide, “Monitoring the Appliance” chapter.
Syntax
# (config) event-log
# (config event-log)
Subcommands
# (config event-log) exit
Writes severe and configuration change error messages to the event log.
Writes severe, configuration change, policy event, and information error messages to the event log.
Writes severe, configuration change, and policy event error messages to the event log.
290 of 604
ProxySG Command Line Interface Reference
Removes all e-mail recipients from the event log e-mail output distribution list.
Removes the e-mail recipient indicated by email_address from the event log e-mail output distribution list.
Adds a Syslog loghost with UDP. Enter the IPv4 or IPv6 address of your loghost server, or specify a domain name that
resolves to an IPv4 or IPv6 address. If you do not specify a port number, port 514 is used by default.
Adds a Syslog loghost with TCP. Enter the IPv4 or IPv6 address of your loghost server, or specify a domain name that
resolves to an IPv4 or IPv6 address. If you do not specify a port number, port 6514 is used by default.
Adds a Syslog loghost with TLS. Enter the IPv4 or IPv6 address of your loghost server, or specify a domain name that
resolves to an IPv4 or IPv6 address. If you do not specify a port number, port 6514 is used by default. Specify an existing SSL
device profile to secure the appliance’s communication with the Syslog server.
# (config event-log) syslog facility {auth | daemon | kernel | local0 | local1 | local2 | local3 |
local4 | local5 | local6 | local7 | lpr | mail | news | syslog | user | uucp}
291 of 604
ProxySG Command Line Interface Reference
Displays the event-log configuration using the # (config event-log) configuration command, or displays the contents of
the event-log using the filters as needed.
Specifies what should happen to the event log when the maximum size has been reached. overwrite overwrites the oldest
information in a FIFO manner; stop disables event logging.
Example
# (config) event-log
# (config event-log) syslog enable
ok
See Also
n “Monitoring the Appliance" in SGOS Administration Guide
292 of 604
ProxySG Command Line Interface Reference
# (config exceptions)
Synopsis
Configure built-in and user-defined exception response objects.
Syntax
# (config) exceptions
# (config exceptions)
Subcommands
# (config exceptions) create exception_id
Sets the name used for the $(exception.company_name) substitution. For details, refer to the ProxySG Log Fields and CPL
Substitutions Reference.
Edits a built-in exception or a user-defined exception. Changes the prompt to "# (config exceptions [user-defined.]exception_
id)" on page 296.
Specifies the default HTTP response code for all built-in exceptions.
293 of 604
ProxySG Command Line Interface Reference
# (config exceptions) inline http {contact eof_marker | details eof_marker | format eof_marker | help
eof_marker | summary eof_marker} | summary eof_marker}
Configures the specified substitution fields for built-in HTTP exceptions only.
Sets the default HTTP response code for all user-defined exceptions.
# (config exceptions) user-defined inline http {contact eof_marker | details eof_marker | format eof_
marker | help eof_marker | summary eof_marker} | summary eof_marker}
Configures the specified substitution fields for user-defined HTTP exceptions only.
294 of 604
ProxySG Command Line Interface Reference
Example
# (config) exceptions
# (config exceptions) default contact
ok
See Also
n Content Policy Language Reference
295 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) exceptions
# (config exceptions)
Subcommands
# (config exceptions [user-defined.]exception_id) exit
Specifies the default HTTP response code for the specified exception.
Configures the specified substitution fields for the specified HTTP exception.
296 of 604
ProxySG Command Line Interface Reference
Example
# (config) exceptions
# (config exceptions) edit testname
# (config exceptions user-defined.testname) http-code 503
ok
See Also
n Content Policy Language Reference
297 of 604
ProxySG Command Line Interface Reference
# (config) exit
Synopsis
Exit configuration mode and return to privileged mode. From standard and privileged modes, the exit command closes the CLI
session.
Syntax
# (config) exit
Example
# (config) exit
#
298 of 604
ProxySG Command Line Interface Reference
# (config failover)
Synopsis
Configure redundancy in your network.
Syntax
# (config) failover
# (config failover)
Subcommands
# (config failover) create group_address
Edits the failover group specified by the group address. Changes the prompt to "# (config failover)" above.
Displays the configuration of all groups or a specified group, or displays all statistics.
Example
# (config) failover
# (config failover) create 10.9.17.135
ok
See Also
n "# (config failover group_address)" on the next page
299 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) failover
# (config failover)
Subcommands
# (config failover group_address) {disable | enable}
(Optional) Refers to the time between advertisements from the master to the multicast address. The default is 40 seconds.
Defines the current system as the master and all other systems as slaves.
Refers to a multicast address where the master sends the keepalives (advertisements) to the slave systems.
300 of 604
ProxySG Command Line Interface Reference
Specifies the rank of slave systems. The range is from 1 to 253. The master system, whose IP address matches the group
address, is ranked 254.
(Optional but recommended) Refers to a password shared only with the group. You can create a secret, which is then hashed.
Example
# (config) failover
# (config failover) edit 10.9.17.135
# (config failover 10.9.17.135) master
ok
See Also
n "# (config failover)" on page 299
301 of 604
ProxySG Command Line Interface Reference
# (config forwarding)
Synopsis
Configure forwarding of content requests to defined hosts and groups through policy.
Syntax
# (config) forwarding
# (config forwarding)
Subcommands
# (config forwarding) create host host_alias host_name [http[=port] [https[=port]] [ftp[=port]] [mms
[=port]] [rtsp[=port]] [tcp[=port]] [telnet[=port]] [ssl-verify-server[={yes | no}] [group=group_name]
[server | proxy]
Creates a forwarding host with the specified properties. The host name can be an IPv4 or IPv6 host or address. The port
number can be defined explicitly (such as http=8080), or it can take on the default port value of the protocol, if one exists (for
example, type http, and the default port value of 80 is used automatically).
To create a host group, you must also include the group=group_name command. If a group with the specified name does not
already exist, the group is automatically created with this host as its first member. Do not use this subcommand when creating
an independent host.
Demotes an alias one place toward the end of the default failover sequence.
Promotes an alias one place toward the start of the default failover sequence.
302 of 604
ProxySG Command Line Interface Reference
Edits the specified forwarding group. Changes the prompt to "# (config forwarding group_alias)" on page 306.
Edits the specified forwarding host. Changes the prompt to "# (config forwarding group_alias)" on page 306
Selects a host affinity method for HTTP. If a host or group alias is not specified for the accelerator-cookie, client-ip-address, or
none options, the global default is used. Use the default option to specify default configurations for all the settings for a
specified host or group.
Selects a host affinity method for SSL. If a host or group alias is not specified for the accelerator-cookie, client-ip-address,
none, or ssl-session-id options, the global default is used. Use the default option to specify default configurations for all the
settings for a specified host or group.
303 of 604
ProxySG Command Line Interface Reference
Selects a host affinity method (non-HTTP or non-SSL). If a host or group alias is not specified for the client-ip-address, or none
options, the global default is used. Use the default option to specify default configurations for all the settings for a specified
host or group.
Sets if and how load balancing hashes between group members. If a group alias is not specified for the domain-hash, least-
connections, round-robin, url-hash, or none options, the global default is used. Use the default option to specify default
configurations for all the settings for a specified group.
Sets the load balancing method for hosts. If a host alias is not specified for the least-connections, round-robin, or none options,
the global default is used. Use the default option to specify default configurations for all the settings for a specified host.
Example
# (config) forwarding
# (config forwarding) download-via-forwarding disable
ok
# (config forwarding) failure-mode closed
ok
# (config forwarding) host-affinity method client-ip-address
ok
# (config forwarding) load-balance hash domain group_name1
ok
304 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config forwarding group_alias)" on the next page
305 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) forwarding
# (config forwarding)
# (config forwarding) edit group_alias
Subcommands
# (config forwarding group_alias) add
306 of 604
ProxySG Command Line Interface Reference
Example
# (config) forwarding
# (config forwarding) edit test_group
# (config forwarding test_group) load-balance hash domain
ok
# (config forwarding test_group) exit
# (config forwarding) exit
See Also
n "# (config forwarding)" on page 302
307 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) forwarding
# (config forwarding)
# (config forwarding) edit host_alias
Subcommands
# (config forwarding host_alias) exit
Changes the FTP port. If a port number is not specified, the default port is used.
Changes the HTTP port. If a port number is not specified, the default port is used.
308 of 604
ProxySG Command Line Interface Reference
Changes the HTTPS port. If a port number is not specified, the default port is used.
Changes the MMS port. If a port number is not specified, the default port is used.
# (config forwarding host_alias) no {ftp | http | https | mms | rtsp | ssl-verify-server | tcp |
telnet}
Makes the host a proxy instead of a server; any HTTPS or TCP ports are deleted.
Changes the RTSP port to the default port or to a port that you specify.
Changes the TCP port to the default port or to a port that you specify.
Changes the Telnet port to the default port or to a port that you specify.
309 of 604
ProxySG Command Line Interface Reference
Example
# (config) forwarding
# (config forwarding) edit test_host
# (config forwarding test_host) server
ok
# (config forwarding test_host) exit
# (config forwarding) exit
See Also
n "# (config forwarding)" on page 302
310 of 604
ProxySG Command Line Interface Reference
# (config front-panel)
Synopsis
Configure the appliance's front panel.
Syntax
# (config) front-panel
# (config front-panel)
Subcommands
# (config front-panel) backlight flash
Configures the front-panel LCD to flash. For example, a flashing LCD can help you locate a particular appliance in a room full of
appliances.
Sets the front-panel LCD to be always turned on, always turned off, or to turn off after a specified length of time (use the
backlight timeout subcommand to configure the length of time).
Sets the length of time before the front-panel LCD turns off. You must also set the backlight state timeout subcommand
to configure timeout mode.
Example
# (config) front-panel
# (config front-panel) backlight state timeout
ok
# (config front-panel) backlight timeout 60
ok
311 of 604
ProxySG Command Line Interface Reference
# (config) ftp
Synopsis
Configure FTP parameters.
Syntax
# (config) ftp {subcommand}
Subcommands
# (config) ftp login-syntax {raptor | checkpoint}
Toggles between Raptor and Checkpoint login syntax. The default is Raptor.
Note: Neither proxy authentication for transparent FTP nor proxy chaining are supported with
the Checkpoint syntax. When native FTP traffic from an FTP client (such as WSFtp) is being
authenticated by the ProxySG appliance using the Raptor syntax, the recommended
authentication mode is auto or proxy.
Enables or disables support for passive mode to clients. This applies to allowing PASV method when IPv4 is in use, and
applies to allowing EPSV method when IPv6 is in use.
Example
# (config) ftp login-syntax checkpoint
ok
See Also
n "# (config caching ftp)" on page 204
312 of 604
ProxySG Command Line Interface Reference
# (config general)
Synopsis
Set global defaults for user behavior when license or resource limits are exceeded, or to reflect client IP addresses when
forwarding requests, or to trust client-provided destination IP addresses.
Syntax
# (config) general
# (config general)
Subcommands
# (config general) exit
Enables, disables, or sets a tenant criterion for multi-tenant functionality. A license is required to enable multi-tenant support.
n When enabled, several command-line based options become available, and two new policy slots are added: landlord
and tenant.
n Enabling multi-tenant support automatically disables Universal Policy (cloud/on-premises SG hybrid) support.
n Define how tenants are identified with # (config general) multi-tenant criterion CPL_substitution or via landlord policy.
n Disabling this command will result in multi-tenant policies being cleared between appliance reboots.
For more information on multi-tenant deployments, refer to the Multi-Tenant Deployment Guide.
Configures the resource overflow action by choosing to either bypass or drop new connections when resources are scarce.
313 of 604
ProxySG Command Line Interface Reference
Allows the ProxySG appliance to trust a client-provided destination IP address and not do a DNS lookup.
Enables this option to have the appliance tunnel traffic when protocol errors occur. This option applies to the SSL proxy and the
HTTP proxy:
n The SSL proxy tunnels the connection when non-SSL traffic arrives at the SSL port (by default, port 443).
n The HTTP proxy tunnels the connection when it receives non-HTTP traffic or a broken HTTP request.
Sets overflow behavior when there are more licensed-user connections going through the system than is allowed by the model
license. If set to none, the licensed user limit is not enforced.
Example
# (config general) trust-destination-ip enable
ok
314 of 604
ProxySG Command Line Interface Reference
# (config geolocation)
Synopsis
Specify download parameters, disable geolocation settings, and view current geolocation settings.
Syntax
# (config) geolocation
# (config geolocation)
Subcommands
# (config geolocation) disable
Sets the encrypted form of the password used to download the database from an internal server.
Downloads the latest data. The CLI displays the download progress and status. If the database is already up-to-date, the
appliance does not download it again. To cancel the download in progress, press and hold CTRL+C.
Downloads the latest data in the background. You can continue to use the CLI while the download is in progress. If the
database is already up-to-date, the appliance does not download it again.
Ignores any existing data (even if the database is already up-to-date) and force a fresh download of the entire database. The
download occurs in the background, and you can continue to use the CLI while download is in progress.
Ignores any existing data (even if the database is already up-to-date) and force a fresh download of the entire database. To
cancel the download, press and hold CTRL+C.
Sets the password used to download the database from an internal server.
315 of 604
ProxySG Command Line Interface Reference
Specifies an existing SSL device profile to use for securing database downloads from an internal server.
Sets the URL of the internal server that hosts the database.
Sets the username to use when downloading the database from an internal server.
Clears the specified download parameter. Clearing the url parameter resets the database download option to the default
(direct download from Symantec).
where:
Tests a fully-qualified URL and perform a DNS lookup to the IP addresses mapped to the geolocation codes you enter.
Displays license information, license expiration date, the download URL for the geolocation database, results of the last
download, last successful download, and database version. This subcommand produces the same output as the # show
geolocation command.
Displays the list of countries defined in the geolocation database (if one has been downloaded). This subcommand produces
the same output as # show geolocation countries.
Example
# (config geolocation) view
License Type: Subscription
Licensed Until: Thu, 01 Jan 2015 00:00:00 UTC
Service: Enabled
316 of 604
ProxySG Command Line Interface Reference
See Also
n "Geolocation" in SGOS Administration Guide
317 of 604
ProxySG Command Line Interface Reference
# (config health-check)
Synopsis
Configure health check settings.
Note: Some subcommands refer to specific health checks; to determine health check names,
see the table in "# (config health-check health_check_name)" on page 321.
Syntax
# (config) health-check
# (config health-check)
Subcommands
# (config health-check) copy source_health_check target_health_check
Copies settings from an existing user-defined health check to another health check of the same type. If the target health check
does not exist, a new health check is created with the specified name and source settings.
# (config health-check) create {composite health_check | http health_check URL | https health_check
URL | icmp health_check hostname | ssl health_check hostname [port] | tcp health_check hostname
[port]}
Creates a user-defined health check of the specified type. Hostnames can be an IPv4 or IPv6 host or address. URLs must
include the protocol.
# (config health-check) default e-mail {healthy {enable | disable} | report-all-ips {enable | disable}
| sick {enable | disable}}
Configures defaults for event-log options. An informational or a severe event-log message is logged depending on the setting
chosen.
318 of 604
ProxySG Command Line Interface Reference
# (config health-check) default snmp {healthy {enable | disable} | report-all-ips {enable | disable} |
sick {enable | disable}}
# (config health-check) default threshold {healthy count | response-time milliseconds | sick count}
Disable the specified health check and have it always report health or sick.
Configures options for the specified health check. Changes the prompt to "# (config health-check health_check_name)" on
page 321.
Displays the configuration or statistics for all health checks. You can also view a summary of the health-check statistics.
Example
# (config health-check) view
Health Check Configuration
Authentication
auth.test
Authentication realm: test
Type of test: Authentication Enable state: Enabled
319 of 604
ProxySG Command Line Interface Reference
DNS Server
dns.8.8.8.8
DNS Server: 8.8.8.8
Type of test: DNS Server Enable state: Enabled
E-Mail Notifications: Use default
Event Log Notifications: Use default
SNMP Notifications: Use default
Monitoring Notifications: Use default
Limits: Use default
Hostname: Use default: www.bluecoat.com
External Services
drtr.rating_service
Type of test: DRTR Enable state: Enabled
E-Mail Notifications: Use default
Event Log Notifications: Use default
SNMP Notifications: Use default
Monitoring Notifications: Use default
Limits:
Healthy interval: 10800 seconds Sick interval: Use default
Healthy threshold: Use default Sick threshold: Use default
Response time threshold: Use default Failure trigger: 1
Hostname: webpulse.es.bluecoat.com
See Also
n "# (config health-check health_check_name)" on the facing page
320 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) health-check
# (config health-check)
# (config health-check) edit health_check_name
321 of 604
ProxySG Command Line Interface Reference
where health_check_name depends on the health check type, as described in the table in " Synopsis" on the previous page.
Subcommands
Note: The following subcommands are available for all health checks unless specified
otherwise.
(Composite health check only) Adds the specified member to the composite health check group.
(Forwarding host/group and user-defined only) Configures authentication settings for the health check.
(Composite and forwarding group/host only) Requires that all, some, or any members of the group report as healthy to have the
health check report as healthy.
Sends e-mail notification when a health check reports healthy or sick, whether or not those reports are for all IP addresses.
Logs an event when a health check reports healthy or sick, whether or not those reports are for all IP addresses.
(DNS only) Sets the hostname for the health check to the default hostname or to a user-defined hostname.
322 of 604
ProxySG Command Line Interface Reference
(All except composite) Configures intervals before the health check is re-run. The intervals can be different for health checks
that are reporting healthy and health checks that are reporting sick.
(Forwarding host/group and user-defined only) Configures authentication settings for the health check when intermediate
proxies exist between the appliance and the target. Specify the username and password for the intermediate proxy.
(Forwarding host/group and all user-defined except composite) Manages a list of HTTP/HTTPS codes that are considered
successes. You can specify multiple codes, separated by semi-colons. If a success code is received by the health check, the
health check considers the HTTP/ HTTPS test to be successful.
Sets the severity level of the health check, which determines how this health check affects the overall health of the device.
(All except WebPulse) Sends an SNMP trap when the health check reports healthy or sick, whether or not those reports are for
all IP addresses.
(All except composite) Sets the level when health checks report as healthy or sick.
# (config health-check health_check_name) type (http URL | https URL | icmp hostname | ssl hostname
[port] | tcp hostname [port]}
(Forwarding host/group, SOCKS, and all user-defined except composite) Sets the number of consecutive healthy or sick test
results before the health check actually reports as healthy or sick.
Resets the defaults of the health check to use the global defaults instead of any explicitly set values.
323 of 604
ProxySG Command Line Interface Reference
Example
# (config health-check user.ssl1) clear-statistics
ok
See Also
n "# (config health-check) " on page 318
324 of 604
ProxySG Command Line Interface Reference
# (config) hide-advanced
See "# hide-advanced" on page 75.
325 of 604
ProxySG Command Line Interface Reference
# (config) http
Synopsis
Configure HTTP settings.
Syntax
# (config) http {subcommand}
Subcommands
# (config) http [no] add-header {client-ip | front-end-https | via | x-forwarded-for }
Enables or (after it has already been enabled) disables upstream HTTP error code 407 authentication challenges.
Enables HTTP byte-range support. If byte-range support is disabled, then HTTP treats all byte range requests as non-
cacheable. This means that HTTP never even checks to see if the object is in the cache, but forwards the request to the origin-
server and does not cache the result. So the range request has no affect on the cache. For instance, if the object was in the
cache before a range request, it would still be in the cache afterward—the range request does not delete any currently cached
objects. Also, the Range header is not modified when forwarded to the origin-server. If the requested byte range is type 3 or 4,
then the request is treated as if byte-range support is disabled. That is, the request is treated as non-cacheable and has no
affect on objects in the cache.
Limits the number of clientless requests (used for caching and optimization) and prevent overwhelming an OCS.
Using the no option prevents the appliance from sending exception pages to clients when upstream connection errors occur.
326 of 604
ProxySG Command Line Interface Reference
Parses HTML objects for the cache-control, expires, and pragma-no-cache meta-tags.
Sets persistent connection timeout for the client to the specified number of seconds.
Sets persistent connection timeout for the server to the specified number of seconds.
Prefetches either embedded objects in client requests or redirected responses to client requests. Disabled by default.
Prefetches either embedded objects in pipelined objects or redirected responses to pipelined requests. Disabled by default.
Enables Symantec (Blue Coat)-proprietary HTTP header extensions. By default the proprietary headers are disabled. This is a
deprecated method for troubleshooting HTTP responses. Symantec recommends that you refer to the access log and use the
Advanced URLS for troubleshooting HTTP responses instead.
327 of 604
ProxySG Command Line Interface Reference
Forces compliance with explicit expirations by never refreshing objects before their explicit expiration. The no parameter clears
the setting.
Forces compliance with explicit expirations by never serving objects after their explicit expiration. The no parameter clears the
setting.
Removes HTTP information from headers. The no parameter clears the setting.
Uses an HTTP "get" in place of HTTP 1.1 conditional get. The no parameter clears the setting.
Uses an HTTP "get" for Microsoft Internet Explorer reload requests. The no parameter clears the setting.
Uses an HTTP "get" instead of "get-if-modified". The no parameter clears the setting.
Indicates the version of HTTP that should be used by the ProxySG appliance. The preserve option preserves the inbound
HTTP version.
328 of 604
ProxySG Command Line Interface Reference
Example
# (config) http pipeline client requests
ok
329 of 604
ProxySG Command Line Interface Reference
# (config) http2
Synopsis
Configure HTTP2 settings.
Note: If you change the HTTP/2 connection, frame, and stream values from their defaults, see
"HTTP/2 Communication Requirements" below below for appropriate settings.
Syntax
# (config) http2 {subcommand}
Subcommands
# (config) http2 connection-window-size size_in_bytes
Sets the maximum number of concurrent streams allowed by the appliance when the upstream connection is detected to
be HTTP/1.1. Applies only when the appliance is translating client-side HTTP/2 to server-side HTTP/1.1.
connection- 65535 524286 8388480 For better performance, should be equal to or greater than the value of
window-size stream-window-size.
330 of 604
ProxySG Command Line Interface Reference
max-concurrent- 1 15 150 For better performance, should be less than the max-concurrent-streams
http1- streams setting.
max-concurrent- 1 100 150 For better performance, should be greater than the max-concurrent http-
streams streams setting.
max-frame-size 1024 16384 65535 Must be less than or equal to the value of stream-window-size.
stream-window- 16384 65535 262144 Must be equal to or greater than the value of max-frame-size. For better
size performance, should be less than or equal to the value of connection-
window size.
Example
# (config) http2 max-concurrent-streams 75
ok
331 of 604
ProxySG Command Line Interface Reference
# (config identd)
Synopsis
Configure the IDENTD protocol.
Syntax
# (config) identd
# (config identd)
Subcommands
# (config identd) client server-query-port port
Sets the timeout period for client IDENTD queries. Specify between 1 and 300 seconds.
Example
# (config identd) server enable
ok
332 of 604
ProxySG Command Line Interface Reference
# (config) inline
See "# inline" on page 76.
333 of 604
ProxySG Command Line Interface Reference
# (config) load
See "# load" on page 81.
334 of 604
ProxySG Command Line Interface Reference
# (config installed-systems)
Synopsis
Manage the system images installed on the appliance.
Syntax
# (config) installed-systems
# (config installed-systems)
Subcommands
# (config installed-systems) default system_number [ignore-warnings]
The ignore-warnings option allows you to set the default system even if you receive a disk layout compatibility warning.
Keep in mind that if you use the ignore-warnings option to forcing a change to a default system that is incompatible with your
disk layout may result in configuration and/or data loss.
Restricts system image download and installation to signed images only. The default, disable, allows all images to be
downloaded.
Specifies that the specified system is to be replaced next, or clears the setting.
Shows all installed SGOS system images. Use this command to determine the system numbers to specify in other
commands.
335 of 604
ProxySG Command Line Interface Reference
Example
# (config installed-systems) view
ProxySG Appliance Systems
1. Version: SGOS 7.2.1.0, Release ID: 242101
Friday September 13 2019 11:11:08 UTC,
Attributes: Signed
Boot Status: Last boot succeeded, Last Successful Boot: Friday September 13 2019 14:04:50 UTC
Disk Layout: Compatible
2. Version: SGOS 7.2.1.0, Release ID: 241968
Wednesday September 11 2019 16:02:58 UTC,
Attributes: Signed
Boot Status: Last boot succeeded, Last Successful Boot: Wednesday September 11 2019 19:23:45 UTC
Disk Layout: Compatible
3. Version: SGOS 7.1.2.0, Release ID: 241796
Friday September 6 2019 02:49:00 UTC,
Attributes: Signed, FIPS capable
Boot Status: Last boot succeeded, Last Successful Boot: Wednesday September 11 2019 18:06:42 UTC
Disk Layout: Compatible
4. Version: SGOS 7.2.1.0, Release ID: 241628
Friday August 30 2019 19:42:37 UTC,
Attributes: Signed
Boot Status: Last boot succeeded, Last Successful Boot: Wednesday September 11 2019 18:54:01 UTC
Disk Layout: Compatible
5. Version: SGOS 7.2.1.1, Release ID: 241307
Thursday August 22 2019 04:05:23 UTC,
Attributes: Signed
Boot Status: Last boot succeeded, Last Successful Boot: Thursday August 22 2019 17:50:02 UTC
Disk Layout: Compatible
Default system to run on next hardware restart: 1
System to replace next: 5
#(config installed-systems) delete 4
Are you sure you want to delete system 4? (y or n) y
ok
336 of 604
ProxySG Command Line Interface Reference
# (config) interface
Synopsis
Configure the network interfaces (both physical and Virtual LAN). The built-in Ethernet adapter is configured for the first time
using the setup console. Use these commands to modify the built-in adapter configuration or if you have multiple adapters.
Syntax
# (config) interface {subcommand}
Subcommands
# (config) interface fast-ethernet interface_number
Sets the number of the fast Ethernet connection to the specified interface. Valid interface numbers are 0 through 3.
Configures the specified interface. Changes the prompt to"# (config interface interface)" on page 340.
# (config) interfaceaggr:number
Configures the specified interface. Changes the prompt to "# (config interface aggr:number)" on the next page.
Example
# (config) interface fast-ethernet 0
ok
See Also
n "# (config interface aggr:number)" on the next page
337 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) interface aggr:number
Subcommands
# (config interface aggr:number) add adapter:interface
Specifies the link aggregation transit delay time in milliseconds (ms). The default value is 3000 ms.
The transit delay setting determines how much settle time LACP requires to switch from sending packets from an unlinked port
to sending from a linked port. During the settle time, all packets for an unlinked port are dropped. The settle time is required to
ensure packets are not received out-of-order when switching to a linked port to send the traffic. Setting a smaller transit-delay
time will reduce the number of packets lost during the port transition, while increasing the possibility of out-of-order packets.
338 of 604
ProxySG Command Line Interface Reference
Example
# (config) interface aggr:1
# (config interface aggr:1) add 5:2
ok
# (config interface aggr:1) add 5:1
ok
# (config interface aggr:0) view
Ethernet aggregate aggr:1
Status: enabled
MTU size: 1500
LACP state: 2 Up
Reject inbound: disabled
Allow intercept: enabled
VLAN trunk: enabled
Native VLAN:
Spanning tree: disabled
IPv6 auto-linklocal: enabled
Member interfaces:
Ethernet interface 5:1 (LAN)
Status: enabled
LACP state: Up
Internet address: 192.0.2.0 netmask 255.255.255.0
Link status: autosensed to full duplex, 1 gigabit/sec network
Ethernet interface 5:2 (WAN)
Status: enabled
LACP state: Up
Internet address: 2001:cdba:0:0:0:3257:9652 prefixlen 64
Link status: autosensed to full duplex, 1 gigabit/sec network
339 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) interface interface
Subcommands
# (config interface interface) allow-intercept {enable | disable}
Allows interception on this interface. See "Allow Intercept and Reject Inbound" on page 342 for usage details.
Note: You will not see a loss of connectivity warning message when using CLI to shut down a
Management Console interface. If you lose connection to the Management Console, reconnect
with an active IP address.
Sets the IPv4 address and subnet mask or IPv6 address and prefix length for this interface.
340 of 604
ProxySG Command Line Interface Reference
Enables or disables the automatic generation of link-local addresses for this interface. After a link-local address is generated
for an interface, it will stay configured until it is manually removed using the no ip-address command or until the ProxySG
appliance is rebooted.
Jumbo frames are Ethernet frames with more than 1500 bytes of payload. By configuring the mtu size of an interface to 1500
bytes or more you are enabling jumbo frames. You can configure jumbo frames between 1500 and 9000 MTUs. The max mtu
size depends on the NIC you are using. If you have attempted to configure the mtu size to one that is not compatible with the
NIC you are using, an error message will be displayed.
Note: If the appliance receives frames over 1500 bytes, but the mtu size has not been set to
enable jumbo frames, packets may be dropped. Configure the interfaces on a software bridge
with identical MTU settings. Using different MTU interface settings on a bridge can cause
unpredictable behavior.
Rejects inbound connections on the interface. See "Allow Intercept and Reject Inbound" on the next page for usage details.
341 of 604
ProxySG Command Line Interface Reference
Example
# (config) interface 0
# (config interface 0) ip-address 10.252.10.54 255.255.255.0
ok
# (config interface 0) exit
# (config) interface 0:1
# (config interface 0:1) 10.252.10.72
ok
# (config interface 0:1) exit
342 of 604
ProxySG Command Line Interface Reference
# (config) ip-default-gateway
Synopsis
A key feature of the ProxySG appliance is the ability to distribute traffic originating at the cache through multiple IP gateways.
Further, you can fine tune how the traffic is distributed among gateways. This feature works with any routing protocol (for
example, static routes or RIP).
Note: Load balancing through multiple IP gateways is independent from the per-interface load
balancing that the ProxySG appliance automatically does when more than one network
interface is installed.
Syntax
# (config) ip-default-gateway {subcommand}
Subcommands
# (config) ip-default-gateway ip_address [preference-group 1_to_10] [weight 1_to_100]
Specifies the IPv4 or IPv6 address of the default gateway to be used by the ProxySG appliance.
Example
# (config) ip-default-gateway 10.25.36.47
ok
343 of 604
ProxySG Command Line Interface Reference
# (config) ipv6
Synopsis
Configure global IPv6 settings.
Syntax
# (config) ipv6 {subcommand}
Subcommands
# (config) ipv6 auto-linklocal {enable | disable}
Enables or disables automatic generation of link-local addresses on all interfaces. When this parameter is enabled (as it is by
default), individual interface configuration values will override this setting. When this setting is disabled, it will be disabled for
all interfaces (regardless of the per-interface setting). After link-local addresses are generated for the appliance interfaces, they
will stay configured until they are manually removed using the no ip-address command or until the ProxySG appliance is
rebooted.
Enables or disables IPv6 force-bypass. When force-bypass is enabled, all IPv6 traffic will be bridged or routed. This option is
disabled by default.
Enables or disables IPv6 forwarding. This is a layer-3 configuration. When IPv6 forwarding is disabled (as it is by default), the
appliance will discard bypassed traffic at the IPv6 layer; this setting is appropriate for most situations, since by default, the
ProxySG appliance is not configured to function as a router.
Example
# (config) ipv6 auto-linklocal disable
ok
See Also
n "Using the ProxySG in an IPv6 Environment" in SGOS Administration Guide
344 of 604
ProxySG Command Line Interface Reference
# (config) isatap
Synopsis
Use this command to configure appliance behavior with Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) traffic.
When ISATAP is enabled with the isatap commands, the ProxySG appliance looks inside the encapsulated 6-in-4 packet to
determine the service and then chooses a proxy to use:
n If the service is intercepted, the ISATAP traffic is processed by the appropriate application proxy (HTTP, CIFS, FTP,
etc.). Traffic is optimized with all applicable acceleration techniques and sent through an ADN tunnel if an ADN peer is
found.
n If the service is not intercepted, the traffic is processed by the ISATAP proxy. Traffic is with byte caching and
compression inside an ADN tunnel (assuming an ADN peer is found).
Syntax
# (config) isatap {subcommand}
Subcommands
# (config) isatap allow-intercept {enable | disable}
When enabled, 6-in-4 packets of intercepted services are processed by the appropriate application proxy (for example, CIFS,
HTTP, or Flash). When allow-intercept is disabled, this traffic is processed by the ISATAP proxy. For full ISATAP
functionality, enable this command and adn-tunnel.
When enabled, the ISATAP proxy processes 6-in-4 traffic for services (such as ICMPv6) that aren’t intercepted. When adn-
tunnel is disabled, the ISATAP proxy is not used: any traffic that would have been processed by this proxy is bypassed. For
full ISATAP functionality, enable this command and allow-intercept.
Applies to traffic that the ISATAP proxy is processing. It controls whether to optimize this traffic using the byte caching
optimization technique when connecting upstream in an ADN tunnel. This option is enabled
by default.
Applies to traffic that the ISATAP proxy is processing. It controls whether to optimize this traffic using GZIP compression
when connecting upstream in an ADN tunnel. This option is enabled by default.
Applies to traffic that the ISATAP proxy is processing. You can adjust retention priority of byte cache data. If you want to keep
streams in the byte cache for as long as possible, set a high retention priority. Or for streams that aren’t likely to get much
345 of 604
ProxySG Command Line Interface Reference
benefit from byte caching, you can set a low retention priority. ISATAP is set to normal priority by default. Note that unless
adn-byte-cache is enabled for ISATAP, the priority setting will have no effect; if you try to set a retention priority when byte
caching is disabled, a warning message displays to inform you that the byte-cache-priority attribute has no effect when adn-
byte-cache is disabled.
Example
# (config) isatap allow-intercept enable
ok
# (config) isatap adn-tunnel enable
ok
346 of 604
ProxySG Command Line Interface Reference
# (config) license-key
Synopsis
Configure license key settings.
Syntax
# (config) license-key {subcommand}
Subcommands
# (config) license-key auto-update {disable | enable}
Example
# (config) license-key no path
ok
See Also
n "Licensing" in SGOS Administration Guide
347 of 604
ProxySG Command Line Interface Reference
# (config line-vty)
Synopsis
When you have a CLI session, that session remains open as long as there is activity. If you leave the session idle, the
connection eventually times out and you must reconnect. The default timeout is five minutes. You can set the timeout and
other session-specific options using the line-vty command.
Syntax
# (config) line-vty
# (config line-vty)
Subcommands
# (config line-vty) exit
Specifies the number of lines of code that should appear on the screen at one time. Specify 0 to scroll without pausing.
Carriage returns are sent to the Telnet console as a carriage return plus linefeed.
348 of 604
ProxySG Command Line Interface Reference
Example
# (config) line-vty
# (config line-vty) timeout 60
ok
349 of 604
ProxySG Command Line Interface Reference
# (config) load
See "# load" on page 81.
350 of 604
ProxySG Command Line Interface Reference
# (config management-services)
Synopsis
The ProxySG appliance provides the following console services:
n HTTPS
n SSH
n Telnet (Not created by default; a Telnet proxy service is created by default on port 23.)
Syntax
# (config) management-services
# (config management-services)
Subcommands
# (config management-services) create {http-console | https-console | ssh-console | snmp | telnet-
console } service_name
Note: If you create a console name with spaces, the name must be enclosed in quotes; for
example, "My Console1".
Edits the specified service. Changes the prompt to one of the following:
351 of 604
ProxySG Command Line Interface Reference
Example
# (config management-services) create https-console HTTPS1
See Also
n "# (config http_console)" on the facing page
352 of 604
ProxySG Command Line Interface Reference
# (config http_console)
Synopsis
This console service intercepts HTTP traffic, usually on port 80. This console service is created but not enabled due to
security concerns.
Syntax
# (config management-services) edit http_console
# (config http_console)
Subcommands
# (config http_console) add {all | proxy_ip_address} port {enable | disable}
Adds a listener to the console service. All selects all IPv4 and IPv6 addresses on the proxy; alternatively, you can select a
specific proxy’s IPv4/IPv6 address. When specifying IPv6 addresses, only global (not linklocal) addresses can be used. You
must always choose a port. By default the listener is enabled.
Example
# (config management-services) edit HTTP1
# (config HTTP1) add 10.25.36.47
ok
# (config HTTP1) enable 10.25.36.47 80
ok
353 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config https_console)" on the facing page
354 of 604
ProxySG Command Line Interface Reference
# (config https_console)
Synopsis
The HTTPS management console permits secure access to the management console, by default on port 8082. You can create
additional HTTPS console services if necessary.
Syntax
# (config) management-services
Subcommands
# (config https_console) add {all | proxy_ip_address} port {enable | disable}
Add a listener to the console service. All selects all IPv4 and IPv6 addresses on the proxy; alternatively, you can select a
specific IPv4/IPv6 address on the appliance. When specifying IPv6 addresses, only global (not link-local) addresses can be
used. You must always choose a port. By default the listener is enabled.
Associates the specified cipher suite(s) with the current HTTPS console service. Pressing ENTER without specifying cipher
suites displays a list of available ciphers and a prompt to select ciphers.
You can use interactive mode or non-interactive mode. Interactive mode does not support specifying cipher suites. Symantec
Director uses non-interactive commands in profiles and overlays to create cipher suites.
If specifying cipher suites, type them in a space-separated list such as AES128-GCM-SHA256 DHE-DSS-AES256-SHA256.
Refer to TECH247556 for an overview of cipher suites shipped with the appliance:
http://www.symantec.com/docs/TECH247556
Selects the SSL version or versions to use. Changing the protocol version/versions in use resets the list of available cipher
suites.
355 of 604
ProxySG Command Line Interface Reference
Example
# (config) management-services
# (config management-services) create https-console https-console2
# (config management-services) edit https-console2
# (config https-console2) add 10.25.36.47 443
# (config https-console2) enable 10.25.36.47 443
# (config https-console2) attribute cipher-suite AES128-GCM-SHA256 DHE-DSS-AES256-SHA256
See Also
n "# (config http_console)" on page 353
356 of 604
ProxySG Command Line Interface Reference
# (config ssh_console)
Synopsis
The SSH console service allows to you to securely connect to the CLI. By default, SSHv2 is enabled and assigned to port 22.
You do not need to create a new host key unless you want to change the existing configuration.
To manage new host keypairs or global settings for all SSH console services, use the "# (config) ssh-console" on page 552
command.
Syntax
# (config management-services) create ssh-console ssh_console
# (config management-services) edit ssh_console
# (config ssh_console)
Subcommands
# (config ssh_console) add {all | proxy_ip_address} port {enable | disable}
Adds a listener to the console service. All selects all IPv4 and IPv6 addresses on the proxy; alternatively, you can select a
specific proxy’s IPv4/IPv6 address. When specifying IPv6 addresses, only global (not linklocal) addresses can be used. You
must always choose a port. By default the listener is enabled.
357 of 604
ProxySG Command Line Interface Reference
Example
# (config ssh_console_name) add 10.25.36.47 80
ok
See Also
n "# (config http_console)" on page 353
358 of 604
ProxySG Command Line Interface Reference
# (config snmp_service)
Synopsis
The SNMP management service provides an explicit connection for communicating with the ProxySG appliance. You can
create an SNMP listener for any available port and for all available ProxySG appliance. IP addresses or for a specific IPv4 or
IPv6 address.
Syntax
# (config management-services) edit snmp_service
# (config snmp_service)
Subcommands
# (config snmp_service) add {all | proxy_ip_address port} {enable | disable}
Add an SNMP listener to the management service. All selects all IPv4 and IPv6 addresses on the proxy; alternatively, you can
select a specific proxy’s IPv4/IPv6 address. You must always choose a port. By default, the listener is enabled.
Example
# (config) management-services
# (config management-services) create snmp mysnmp
ok
# (config management-services) edit mysnmp
# (config mysnmp) view
359 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config http_console)" on page 353
360 of 604
ProxySG Command Line Interface Reference
# (config telnet_console)
Synopsis
This console service provides access to the administrative CLI through Telnet. Due to security concerns, use of this console
is not recommended.
A shell Telnet proxy service is created on port 23. If you do decide to create a Telnet console, you must first remove the Telnet
proxy service and apply the changes. You can later re-add the Telnet proxy service on a different port.
Syntax
# (config management-services) edit telnet_console
# (config telnet_console)
Subcommands
# (config telnet_console) add {all | proxy_ip_address} port {enable | disable}
Adds a listener to the console service. All selects all IPv4 and IPv6 addresses on the proxy; alternatively, you can select a
specific IPv4/IPv6 address on the appliance. When specifying IPv6 addresses, only global (not linklocal) addresses can be
used. You must always choose a port. By default the listener is enabled.
Example
# (config telnet_console) add 10.25.36.47 80
ok
361 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config http_console)" on page 353
362 of 604
ProxySG Command Line Interface Reference
# (config mapi)
Synopsis
Configures MAPI.
Syntax
# (config) mapi
# (config mapi)
Subcommands
# (config mapi) batching {enable | disable}
Configures the virtual IPv4 address of a Client Access Server (CAS) array so that the ProxySG appliance can create a new
listener for this VIP. After this is configured, the MAPI connections to the CAS array virtual host can be intercepted and
optimized. This setting must be configured on each Branch peer that will handle MAPI traffic to an Exchange server with a third
party load balancer, and must be set before Outlook connects to the Exchange Server. Only one VIP can be configured per
ProxySG appliance.
Selects the MAPI exchange domain name alias to use. This command is required for accelerating encrypted MAPI.
Returns to # (config) mode.
Sets the length of time, in hours, that the session is active. The default is 72 hours.
363 of 604
ProxySG Command Line Interface Reference
Sets the length of time, in minutes, before the service checks for new e-mail. The default is 30 minutes.
Sets the maximum number of active sessions at any given point. The default is 100 sessions. If the limit is reached, the oldest
session is dropped.
Clears the settings for Exchange domain alias or CAS virtual IP address.
Example
# (config mapi) view
Batching: enabled
Keep-Alive: disabled
Keep-Alive Duration (hours): 72
Keep-Alive Interval (minutes): 30
Keep-Alive Maximum Sessions: 100
Endpoint Mapper Handoff: enabled
See Also
n # (config endpoint_mapper_proxy_service)
364 of 604
ProxySG Command Line Interface Reference
# (config netbios)
Synopsis
Use this command to configure NetBIOS.
Syntax
# (config) netbios
# (config netbios)
Subcommands
# (config netbios) exit
Requester is enabled by default and cannot be disabled, with three retries and a five second timeout. Responder is disabled by
default. Note that the requestor is used only if you write policy that uses it. If no features that trigger request are used, no traffic
is sent.
Example
# (config) netbios
# (config netbios) nbstat responder enable
ok
365 of 604
ProxySG Command Line Interface Reference
# (config netflow)
Synopsis
NetFlow is a network protocol developed by Cisco Systems to monitor and export IP traffic information. After you configure
NetFlow on the appliance, direct the flow data to the collectors that you have already set up. If you enable NetFlow on the
ProxySG appliance (it is disabled by default), it observes network flows on all interfaces and keeps track of flow statistics,
such as source and destination IP addresses, the size of the flow (in terms of packets and bytes), and when the flow was sent.
After the appliance gathers the flow statistics, it exports them in NetFlow records to a remote system called a collector.
Caution: Because NetFlow runs on UDP, the ProxySG appliance cannot verify collector
configuration. Make sure that collector IP address and port are correct before setting up
NetFlow in the CLI.
Currently, SGOS supports NetFlow v5, which is restricted to collecting flow statistics for IPv4 packets only.
Terminology
Symantec documentation uses the following terms to describe the NetFlow feature in SGOS.
n Network flow: A sequence of packets from a source application to a destination application. A network flow has
attributes such as IP address, port, protocol, and inbound/outbound interfaces. A flow is exported to the collectors
when:
o it is reported as being finished (for example, traffic for an existing flow stops)
o it has been inactive for a period of time exceeding the inactive-timeout value (for example, the connection is
stale)
o it has been active for a period of time exceeding the active-timeout value (for example, it is a long-running flow)
n Flow records: Contain information about a flow, such as source and destination IP addresses, the amount of data
transferred (in terms of packets and bytes), and the flow start and end times.
n Inbound/outbound interfaces: Flow records sent to the ProxySG appliance are exported on inbound interfaces. Flow
records originating from the ProxySG appliance are exported on outbound interfaces.
n NetFlow packets: NetFlow-formatted packets, which contain copies of expired flows. These packets are sent to a
collector once they reach the maximum of 30 records, or two minutes after the first flow record is collected.
Syntax
# (config) netflow
366 of 604
ProxySG Command Line Interface Reference
# (config netflow)
Subcommands
# (config netflow) active-timeout timeout_seconds
Specifies the age of an active flow, after which it is reported. When an active flow exceeds the maximum time, the flow is
reported containing the flow statistics up to that point. The default is 1800 seconds.
Note: The active-timeout value must be greater than the inactive-timeout value.
Configures NetFlow collector(s). Changes prompt to "# (config netflow collectors) " on page 369.
Sends the remaining flow data to the collectors and disables the capture of any more Netflow information. This is the default
setting.
Enables the appliance to begin monitoring if one or more collectors have been configured. See "# (config netflow collectors) "
on page 369. If no collectors are defined when you enter this command, the CLI warns you to configure at least one collector.
Specifies the maximum amount of time a flow is considered active without seeing network traffic. When the maximum is
exceeded, the appliance determines that the flow is inactive and exports a flow record. The default is 15 seconds.
Note: The inactive-timeout value must be less than the active-timeout value.
Configures NetFlow interfaces. Changes prompt to "# (config netflow interfaces)" on page 371.
n NetFlow state
367 of 604
ProxySG Command Line Interface Reference
n Collector information
The # show netflow command also displays these settings and statistics.
Example
# (config) netflow
# (config netflow) enable
ok
See Also
n "# (config netflow collectors) " on the facing page
368 of 604
ProxySG Command Line Interface Reference
You define a collector uniquely by both address and port. This allows you to configure multiple collectors on different ports for
the same machine. You can configure up to four collectors to collect the flow records from the ProxySG appliance. Note that
collectors on the same machine are counted separately.
Caution: The appliance exports NetFlow records over UDP, which does not guarantee that the
data will be sent to a destination; thus, the appliance cannot verify if collector configuration is
correct. Symantec recommends that you ensure collectors are configured correctly before
setting up NetFlow. Then, when you add a collector in the CLI, be sure to enter the correct IP
address and port.
In addition, because UDP does not attempt to re-send lost data, configuring more than collector can help establish some
redundancy in your NetFlow setup. For example, consider a NetFlow setup with two collectors. The NetFlow data streams
sent to both collectors may lose different packets and different amounts of data, but you can inspect both sets of partial data to
gain a more complete picture of those specific flows.
Syntax
# (config) netflow
# (config netflow)
# (config netflow) collectors
Subcommands
# (config netflow collectors) add IP_address port
Adds a collector on either an IPv4 or IPv6 address. Specify the collector's IP address and the port on which it is listening. You
can add multiple collectors on different ports on the same machine. If NetFlow is disabled, adding collectors does not enable
NetFlow. To enable NetFlow, use the # (config netflow) enable command.
369 of 604
ProxySG Command Line Interface Reference
Caution: If you specify IPv4 addresses to configure collectors, you must use unique IP
addresses and ports. If you use different strings to specify the same logical IP address (for
example, canonical and abbreviated forms for the same address), the ProxySG appliance
detects the duplicate IP address.
Removes a collector from the list. Specify the collector’s IPv4 or IPv6 IP address and the port on which it is listening. If
NetFlow is enabled and you remove all collectors, a warning message appears and NetFlow collection will be suspended,
although the feature remains enabled.
Example
# (config) netflow
# (config netflow) collectors
# (config netflow collectors)
# (config netflow collectors) add 192.0.2.0 9800
ok
See Also
n "# (config netflow)" on page 366
370 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) netflow
# (config netflow)
# (config netflow) interfaces
Subcommands
# #(config netflow interfaces) add all
Adds an interface used for processing NetFlow input (in), output (out), or both (inout). If no parameter is specified, the default is
used (inout).
Note: By default, all interfaces are included for NetFlow processing. You need only add
interfaces that you removed previously.
Removes the interface used for processing NetFlow input (in), output (out), or both (inout). If no parameter is specified, the
default is used (inout).
If you remove all interfaces from NetFlow processing, and NetFlow is enabled, the CLI warns you that no interfaces are
available for processing and that collection will be disabled.
371 of 604
ProxySG Command Line Interface Reference
Example
# (config netflow interfaces) add 1:0 inout
ok
See Also
n "# (config netflow collectors) " on page 369
372 of 604
ProxySG Command Line Interface Reference
# (config) no
Synopsis
Negate the current settings for the archive configuration, content priority, IP default gateway, SOCKS machine, or system
upgrade path.
Syntax
# (config) no {subcommand}
Subcommands
# (config) no archive-configuration
# (config) no bridge
# (config) no ip-default-gateway
# (config) no socks-machine-id
# (config) no upgrade-path
Example
# (config) no content priority regex http://.*cnn.com
ok
373 of 604
ProxySG Command Line Interface Reference
# (config) ntp
Synopsis
Set NTP parameters. Network Time Protocol (NTP) is a protocol that is used to synchronize computer clock times in a
network of computers. The ProxySG appliance sets the UTC time by connecting to an NTP server. The ProxySG appliance
includes a list of NTP servers available on the Internet. If an NTP server is not available, you can set the time manually using
the Management Console.
Syntax
# (config) ntp {subcommand}
Subcommands
# (config) ntp clear
Disables NTP.
Adds a server to the server list, where encrypted_key is a key in an encrypted format. See # (config) ntp server for
details.
Enables NTP.
Removes the NTP server named domain_name from the NTP server list.
Adds a server to the NTP server list, using either the domain name of an NTP server that resolves to an IPv4 or IPv6 address,
or the IPv4 or IPv6 address of an NTP server.
If the server supports authentication, you can specify the authentication key information provided to you by the NTP server
authority:
374 of 604
ProxySG Command Line Interface Reference
Example
# (config) ntp server clock.tricity.wsu.edu
ok
375 of 604
ProxySG Command Line Interface Reference
# (config) policy
Synopsis
Specify central and local policy file location, status, and other options.
Syntax
# (config) policy {subcommand}
Subcommands
# (config) policy builtin-path url
Specifies the network path (indicated by url) from which to download the builtin policy file.
Specifies the network path (indicated by url) from which to download the central policy file.
Specifies the network path (indicated by url) from which to download the VPM object enforcement classification file.
Specifies the network path (indicated by url) from which to download the forward policy file.
Sets the encrypted key used by the :hmac policy substitution function to perform digital signatures.
Note: If you administer multiple ProxySG appliances using Director, use this command to
synchronize the HMAC secret key across all appliances and to restore the key when an
appliance is remanufactured.
Generates a new random key to use for :hmac policy substitution function to perform digital signatures.
Specifies the network path (indicated by url) from which to download the landlord policy file.
376 of 604
ProxySG Command Line Interface Reference
Specifies the network path (indicated by url) from which to download the local policy file.
Specifies that the current central policy file URL setting should be cleared.
Specifies that the current classification file URL setting should be cleared.
Specifies that the current forward policy file URL setting should be cleared.
Specifies that the current local policy file URL setting should be cleared.
Specifies that no e-mail notification should be sent if the central policy file should change.
Disables the time and volume quotas library. If quota policy exists on the appliance, you must remove the policy or disable the
policy layer before disabling the library. If you do not remove or disable the policy before issuing this command, the CLI warns
that policy failed to compile. The quota library is disabled by default.
Specifies that the current policy should not be automatically updated in the event of a central policy change.
Specifies that the current VPM classification should not be automatically updated in the event of a classification change.
377 of 604
ProxySG Command Line Interface Reference
Specifies that an e-mail notification should be sent if the central policy file should change.
Specifies the number of minutes that should pass between tests for central policy file changes.
Specifies the number of minutes that should pass between tests for classification file changes.
Enables the time and volume quotas library. The library is disabled by default; if you do not enable it before trying to install time
or volume quota policy in the VPM, you receive a “variable not defined” error.
Note: Enabling time and volume quotas might have a performance impact on CPU utilization.
Note: To protect against misuse of DNS lookups from malicious third parties, Symantec
recommends that you restrict all DNS lookups.
378 of 604
ProxySG Command Line Interface Reference
Note: By default, all RDNS lookups are restricted. The restriction protects against the misuse
of RDNS lookups from malicious third parties.
Indicates that the current policy should be automatically updated in the event of a central policy change.
Indicates that the current policy should be automatically updated in the event of a VPM classification file change.
Specifies the network path (indicated by url) from which to download the default tenant policy file.
Specifies the network path (indicated by url) from which to download the vpm-cpl policy file.
Specifies the network path (indicated by url) from which to download the vpm-xml policy file.
Example
# (config) policy local-path http://www.server1.com/local.txt
ok
# (config) policy central-path http://www.server2.com/central.txt
ok
379 of 604
ProxySG Command Line Interface Reference
# (config policy-services)
Synopsis
Configure settings for the Policy Services subscription.
Syntax
# (config) policy-services
# (config policy-services)
Subcommands
# (config policy-services) disable
Note: Disabling the service prevents database downloads, but does not disable or remove any
Access Security or Content Security policies. To remove related policy, use the Web Visual
Policy Manager.
Sets the encrypted form of the password used when downloading from an internal server.
Downloads the latest data. The CLI displays the download progress and status. If the database is already up-to-date, the
appliance does not download it again. To cancel the download in progress, press and hold CTRL+C.
Specifies an existing SSL device profile to use for securing connections to the internal server.
380 of 604
ProxySG Command Line Interface Reference
Displays the download URL for the Policy Services database, results of the last download, last successful download, and
database version. This subcommand produces the same output as the # show policy-services command.
Example
# (config policy-services) download profile default
ok
See Also
n ProxySG Security Best Practices
381 of 604
ProxySG Command Line Interface Reference
# (config private-network)
Synopsis
Configure information on the private network(s) in your environment.
Syntax
# (config) private-network
# (config private-network)
Subcommands
# (config private-network) add {subnet subnet_prefix [/prefix_length] | domain domain_name}
Exits the private network configuration and brings you back to the configuration prompt.
Example
# (config private-network) add 1.2.3.4
# (config private-network) add 1.2.0.0/16
# (config private-network) remove domain bluecoat.com
382 of 604
ProxySG Command Line Interface Reference
# (config) profile
Synopsis
Configure the system profile.
Syntax
# (config) profile {subcommand}
Subcommands
# (config) profile bwgain
Example
# (config) profile bwgain
ok
383 of 604
ProxySG Command Line Interface Reference
# (config proxy-services)
Synopsis
Manage the proxy services on the ProxySG appliance.
Syntax
# (config) proxy-services
# (config proxy-services)
Subcommands
# (config proxy-services) create service_type service_name [service_group]
Creates a proxy service of the type and name that you specify. Optionally, specify a service group. If no service group is
specified the service is placed in the service group “Other.”
For more information on creating specific proxy services, see "Available Service Types" on the facing page.
Manages dynamic bypass settings. Changes the prompt to "# (config dynamic-bypass) " on page 390.
Allows you to edit a proxy service of the specified name. For more information on editing specific proxy services, see
"Available Service Types" on the facing page.
Allows you to temporarily bypass all proxy services when enabled. Disabling force bypass returns proxy services to normal
operation.
Imports a predefined service from the library. Optionally, an existing service may be replace by a service from the library by
entering the keyword overwrite.
384 of 604
ProxySG Command Line Interface Reference
Restricts interception to a limited number of clients and servers. Changes the prompt to "# (config restricted-intercept)" on
page 407.
Manages static bypass settings. Changes the prompt to "# (config static-bypass)" on page 418.
Example
# (config proxy-services) create tcp-tunnel tcp_tunnel_2
ok
385 of 604
ProxySG Command Line Interface Reference
# (config cifs_proxy_service)
Synopsis
Manage services that are controlled by the CIFS proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create cifs cifs_proxy_service [service_group]
# (config proxy-services) edit cifs_proxy_service
# (config cifs_proxy_service)
Subcommands
# (config cifs_proxy_service) add {all | source_ip | source_ip/subnet_mask} {transparent |
destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept | bypass]
Adds a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). When the destination address on a listener is defined as transparent or all, it applies to IPv4 and IPv6
addresses.
Controls whether ADN is enabled for the service. Enabling ADN does not guarantee the connections are accelerated by ADN.
The actual decision is determined by ADN routing (for explicit deployment) and network setup (for transparent deployment).
Controls whether to optimize traffic using the byte caching optimization technique when connecting upstream in an ADN
tunnel.
Controls whether to optimize traffic using GZIP compression when connecting upstream in an ADN tunnel.
Adjusts retention priority of byte cache data. If you want to keep certain types of streams in the byte cache for as long as
possible, set a high retention priority for the service. Or for streams that aren’t likely to get much benefit from byte caching, you
can set a low retention priority for the related service. Most services are set to normal priority by default. Note that unless the
underlying service has adn-byte-cache enabled, the priority setting will have no effect; if you try to set a retention priority when
386 of 604
ProxySG Command Line Interface Reference
byte caching is disabled, the CLI displays a warning message to inform you that the byte-cache-priority attribute has no effect
when adn-byte-cache is disabled.
Changes the behavior from intercept to bypass for the specified listener.
Changes the behavior from bypass to intercept for the specified listener.
Example
# (config proxy-services) create cifs CIFS2
# (config proxy-services) edit CIFS2
# (config CIFS2) attribute adn-byte-cache disable
ok
See Also
n "# (config proxy-services)" on page 384
387 of 604
ProxySG Command Line Interface Reference
# (config dns_proxy_service)
Synopsis
Manage services that are controlled by the DNS proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create dns proxy_service [service_group]
# (config proxy-services) edit dns_proxy_service
# (config dns_proxy_service)
Subcommands
# (config dns_proxy_service) add {all | source_ip | source_ip/subnet_mask} {transparent | explicit |
all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept | bypass]
Adds a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it applies to IPv4 and
IPv6 addresses.
Changes the behavior from intercept to bypass for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Change the behavior from bypass to intercept for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet mask
(for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
388 of 604
ProxySG Command Line Interface Reference
Example
# (config proxy-services) create cifs CIFS2
# (config proxy-services) edit CIFS2
# (config CIFS2) attribute adn-byte-cache disable
ok
See Also
n "# (config proxy-services)" on page 384
389 of 604
ProxySG Command Line Interface Reference
# (config dynamic-bypass)
Synopsis
Dynamic bypass provides a maintenance-free method for improving performance of the ProxySG appliance by automatically
compiling a list of requested URLs that return various kinds of errors.
Syntax
# (config) proxy-services
# (config proxy-services) dynamic-bypass
# (config dynamic-bypass)
Subcommands
# (config dynamic-bypass) clear
Specifies the maximum number of dynamic-bypass entries. Connections that match entries in the dynamic bypass list are not
intercepted by the application proxies. Entries in the dynamic bypass list eventually time out based on the configuration. If the
list grows beyond its configured size, the oldest entry is removed
#(config dynamic-bypass) no trigger {all | connect-error | non-http | receive-error | 400 | 401 | 403
| 405 | 406 | 500 | 502 | 503 | 504}
Disables dynamic bypass for the specified HTTP response code, all HTTP response codes, or all non-HTTP responses.
Specifies the number of client entries for all clients to bypass a server. Each dynamic entry can be identified by a server
address or client/server address pair. A dynamic entry without a client address means the client address is a wildcard address.
For example, if the server threshold is set to 10 and there are already nine dynamic entries with different client addresses for
390 of 604
ProxySG Command Line Interface Reference
the same server address, the next time a new dynamic entry is added to the same server address but contains a different client
address, the ProxySG appliance compresses the nine dynamic entries into one dynamic entry with server address only; all
clients going to that server address are bypassed.
#(config dynamic-bypass) trigger {all | connect-error | non-http | receive-error | 400 | 401 | 403 |
405 | 406 | 500 | 502 | 503 | 504}
Enables dynamic bypass for the specified HTTP response code, all HTTP response codes, or all non-HTTP responses.
Displays the dynamic-bypass configuration or to filter the dynamic-bypass list on the parameters above.
Example
# (config proxy-services) dynamic-bypass
# (config dynamic-bypass) clear
ok
# (config dynamic-bypass) enable
WARNING:
Requests to sites that are put into the dynamic bypass list
bypass future policy evaluation. This could result in subversion
of on-box policy. The use of dynamic bypass is cautioned.
ok
# (config dynamic-bypass) trigger all
ok
391 of 604
ProxySG Command Line Interface Reference
# (config endpoint_mapper_proxy_service)
Synopsis
Manage services that are controlled by the Endpoint Mapper proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create endpoint-mapper proxy_service [service_group]
# (config proxy-services) edit endpoint_mapper_proxy_service
# (config endpoint_mapper_proxy_service)
Subcommands
# (config endpoint_mapper_proxy_service) add {all | source_ip | source_ip/subnet_mask} {transparent |
explicit | all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept
| bypass]
Adds a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it applies to IPv4 and
IPv6 addresses.
Controls whether to optimize traffic using the byte caching optimization technique when connecting upstream in an ADN
tunnel.
Controls whether to optimize traffic using GZIP compression when connecting upstream in an ADN tunnel.
Adjust retention priority of byte cache data. If you want to keep certain types of streams in the byte cache for as long as
possible, set a high retention priority for the service. Or for streams that aren’t likely to get much benefit from byte caching, you
can set a low retention priority for the related service. Most services are set to normal priority by default. Note that unless the
underlying service has adn-byte-cache enabled, the priority setting will have no effect; if you try to set a retention priority when
byte caching is disabled, a warning message displays to inform you that the byte-cache-priority attribute has no effect when
adn-byte-cache is disabled.
392 of 604
ProxySG Command Line Interface Reference
Controls whether ADN is enabled for the service. Enabling ADN does not guarantee the connections are accelerated by ADN.
The actual decision is determined by ADN routing (for explicit deployment) and network setup (for transparent deployment).
Change the behavior from intercept to bypass for the specified listener.
Change the behavior from bypass to intercept for the specified listener.
Example
# (config proxy-services) create endpoint-mapper epmapper1
# (config proxy-services) edit epmapper1
# (config epmapper1) add all 10003
ok
See Also
n "# (config proxy-services)" on page 384
393 of 604
ProxySG Command Line Interface Reference
# (config ftp_proxy_service)
Synopsis
Manage services that are controlled by the FTP proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create ftp proxy_service [service_group]
# (config proxy-services) edit ftp_proxy_service
# (config ftp_proxy_service)
Subcommands
# (config ftp_service_name) add {all | source_ip | source_ip/subnet_mask} {transparent | explicit |
all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept | bypass]
Adds a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it applies to IPv4 and
IPv6 addresses.
Controls whether to optimize traffic using the byte caching optimization technique when connecting upstream in an ADN
tunnel.
Controls whether to optimize traffic using GZIP compression when connecting upstream in an ADN tunnel.
Adjust retention priority of byte cache data. If you want to keep certain types of streams in the byte cache for as long as
possible, set a high retention priority for the service. Or for streams that aren’t likely to get much benefit from byte caching, you
can set a low retention priority for the related service. Most services are set to normal priority by default. Note that unless the
underlying service has adn-byte-cache enabled, the priority setting will have no effect; if you try to set a retention priority when
byte caching is disabled, a warning message displays to inform you that the byte-cache-priority attribute has no effect when
adn-byte-cache is disabled.
394 of 604
ProxySG Command Line Interface Reference
Controls whether ADN is enabled for the service. Enabling ADN does not guarantee the connections are accelerated by ADN.
The actual decision is determined by ADN routing (for explicit deployment) and network setup (for transparent deployment).
Changes the behavior from intercept to bypass for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Changes the behavior from bypass to intercept for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Removes a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6).
Example
# (config proxy-services) create ftp ftp1
# (config proxy-services) edit ftp1
# (config ftp1) intercept all 10004
ok
See Also
n "# (config proxy-services)" on page 384
395 of 604
ProxySG Command Line Interface Reference
# (config ftps_proxy_service)
Synopsis
Manage services that use the FTPS protocol in implicit mode.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create ftps proxy_service [service_group]
# (config proxy-services) edit ftps_proxy_service
# (config ftps_proxy_service)
Subcommands
# (config ftps_service_name) add {all | source_ip | source_ip/subnet_mask} {transparent | explicit |
all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept | bypass]
Adds a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it applies to IPv4 and
IPv6 addresses.
Controls whether to optimize traffic using the byte caching optimization technique when connecting upstream in an ADN
tunnel.
Controls whether to optimize traffic using GZIP compression when connecting upstream in an ADN tunnel.
Adjust retention priority of byte cache data. If you want to keep certain types of streams in the byte cache for as long as
possible, set a high retention priority for the service. Or for streams that aren’t likely to get much benefit from byte caching, you
can set a low retention priority for the related service. Most services are set to normal priority by default. Note that unless the
underlying service has adn-byte-cache enabled, the priority setting will have no effect; if you try to set a retention priority when
byte caching is disabled, a warning message displays to inform you that the byte-cache-priority attribute has no effect when
adn-byte-cache is disabled.
396 of 604
ProxySG Command Line Interface Reference
Controls whether ADN is enabled for the service. Enabling ADN does not guarantee the connections are accelerated by ADN.
The actual decision is determined by ADN routing (for explicit deployment) and network setup (for transparent deployment).
Changes the behavior from intercept to bypass for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Changes the behavior from bypass to intercept for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Removes a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6).
Example
# (config proxy-services) create ftps ftps1
The service group for "ftps1" is not specified; default to group "Standard".
ok
# (config proxy-services) edit ftps1
# (config ftps1) group "bypass recommended"
ok
397 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config proxy-services)" on page 384
398 of 604
ProxySG Command Line Interface Reference
# (config http)
Synopsis
Manages services that are controlled by the HTTP proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create http proxy_service [service_group]
# (config proxy-services) edit http_proxy_service
# (config http_proxy_service)
Subcommands
# (config http_service_name) add {all | source_ip | source_ip/subnet_mask} {transparent | explicit |
all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept | bypass]
Adds a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it applies to IPv4 and
IPv6 addresses.
Controls whether to optimize traffic using the byte caching optimization technique when connecting upstream in an ADN
tunnel.
Controls whether to optimize traffic using GZIP compression when connecting upstream in an ADN tunnel.
All transparent and explicit requests received on the port always use transparent authentication (cookie or IP, depending on the
configuration). This is especially useful to force transparent proxy authentication in some proxy-chaining scenarios.
Adjusts retention priority of byte cache data. If you want to keep certain types of streams in the byte cache for as long as
possible, set a high retention priority for the service. Or for streams that aren’t likely to get much benefit from byte caching, you
can set a low retention priority for the related service. Most services are set to normal priority by default. Note that unless the
underlying service has adn-byte-cache enabled, the priority setting will have no effect; if you try to set a retention priority when
399 of 604
ProxySG Command Line Interface Reference
byte caching is disabled, a warning message displays to inform you that the byte-cache-priority attribute has no effect when
adn-byte-cache is disabled.
Protocols that can be detected include: HTTP, P2P (eDonkey, BitTorrent, FastTrack, Gnutella), SSL, and Endpoint Mapper.
Controls whether ADN is enabled for the service. Enabling ADN does not guarantee the connections are accelerated by ADN.
The actual decision is determined by ADN routing (for explicit deployment) and network setup (for transparent deployment).
Changes the behavior from intercept to bypass for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Changes the behavior from bypass to intercept for the listener you specify. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
400 of 604
ProxySG Command Line Interface Reference
Removes a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6).
Example
# (config proxy-services) create http http2
# (config proxy-services) edit http2
# (config http2) attribute authenticate-401 enable
ok
See Also
n "# (config proxy-services)" on page 384
401 of 604
ProxySG Command Line Interface Reference
# (config https_reverse_proxy_service)
Synopsis
Manage services that are controlled by the HTTPS reverse proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create http-reverse-proxy proxy_service service_group
# (config proxy-services) edit https_reverse_proxy_service
# (config https_reverse_proxy_service)
Subcommands
# (config https_reverse_proxy_service) add {all | source_ip | source_ip/subnet_mask} {transparent |
explicit | all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept
| bypass]
Adds a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it applies to IPv4 and
IPv6 addresses.
Controls whether ADN is enabled for the service. Enabling ADN does not guarantee the connections are accelerated by ADN.
The actual decision is determined by ADN routing (for explicit deployment) and network setup (for transparent deployment).
Controls whether to optimize traffic using the byte caching optimization technique when connecting upstream in an ADN
tunnel.
Controls whether to optimize traffic using GZIP compression when connecting upstream in an ADN tunnel.
Adjust retention priority of byte cache data. If you want to keep certain types of streams in the byte cache for as long as
possible, set a high retention priority for the service. Or for streams that aren’t likely to get much benefit from byte caching, you
can set a low retention priority for the related service. Most services are set to normal priority by default. Note that unless the
underlying service has adn-byte-cache enabled, the priority setting will have no effect; if you try to set a retention priority when
402 of 604
ProxySG Command Line Interface Reference
byte caching is disabled, a warning message displays to inform you that the byte-cache-priority attribute has no effect when
adn-byte-cache is disabled.
Specifies the cipher suites you want to use with the HTTPS reverse proxy service. The default is to use all cipher suites. If you
want to change the default, you have two choices:
n interactive mode
n non-interactive mode
The optional list of cipher suites is a space-separated list, such as rc4-md5 exp-des-cbc-sha. You may specify more than
one cipher suite. If you want to use the interactive mode, do not specify a cipher suite.
Refer to TECH247556 for an overview of cipher suites shipped with the appliance:
http://www.symantec.com/docs/TECH247556
When used with the verify-client attribute, puts the extracted client certificate information into a
header that is included in the request when it is forwarded to the OCS. The name of the header is
Client-Cert. The header contains the certificate serial number, subject, validity dates and issuer (all as
Allows you to specify the keyring or keylist you want to use with this service.
Changes the behavior from intercept to bypass for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
403 of 604
ProxySG Command Line Interface Reference
Changes the behavior from bypass to intercept for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Removes a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6).
Example
# (config proxy-services) create https-reverse-proxy HTTPS_RP1
# (config proxy-services) edit HTTPS_RP1
# (config HTTPS_RP1) attribute use-adn enable
ok
See Also
n "# (config proxy-services)" on page 384
404 of 604
ProxySG Command Line Interface Reference
# (config mms)
Synopsis
Manages services that are controlled by the MMS proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create mms proxy_service [service_group]
# (config proxy-services) edit mms_proxy_service
# (config mms_proxy_service)
Subcommands
# (config mms_service_name) add {all | source_ip | source_ip/subnet_mask} {transparent | explicit |
all | destination_ip | destination_ip/subnet-mask} {port | first_port-last_port} [intercept | bypass]
Changes the behavior from intercept to bypass for the specified listener.
Changes the behavior from bypass to intercept for the specified listener.
405 of 604
ProxySG Command Line Interface Reference
Example
# (config proxy-services) create mms mms1
# (config proxy-services) edit mms1
# (config mms1)
See Also
n "# (config proxy-services)" on page 384
406 of 604
ProxySG Command Line Interface Reference
# (config restricted-intercept)
Synopsis
By default, all clients and servers evaluate the entries in proxy services where the decision is made to intercept or bypass a
connection. To restrict or reduce the clients and servers that can be intercepted by proxy services, use the restricted intercept
list. The restricted intercept list is useful in a rollout, prior to full production, where you only want to intercept a subset of the
clients. After you are in full production mode, the restricted intercept list can be disabled.
Enabling restricted intercept only intercepts traffic specified in the client/server list. Disabling restricted intercept results in
normal interception.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) restricted-intercept
# (config restricted-intercept)
Subcommands
# (config restricted-intercept) {enable | disable}
Adds an entry to the restricted list, either a client or a server. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4)
or prefix length (for IPv6).
Clears the specified client or server from the restricted list. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or
prefix length (for IPv6).
Displays the entire list or only the specifiedclients or servers. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4)
or prefix length (for IPv6).
407 of 604
ProxySG Command Line Interface Reference
Example
# (config) proxy-services
# (config proxy-services) restricted-intercept
# (config restricted-intercept) add all 192.168.100.1
See Also
n "# (config proxy-services)" on page 384
408 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create rtmp proxy_service [service_group]
# (config proxy-services) edit rtmp_proxy_service
# (config rtmp_proxy_service)
Subcommands
# (config rtmp_service_name) add {all | source_ip | source_ip/subnet_mask} {transparent | explicit |
all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept | bypass]
Changes the behavior from intercept to bypass for the specified listener.
Changes the behavior from bypass to intercept for the specified listener.
409 of 604
ProxySG Command Line Interface Reference
Example
# (config proxy-services) create rtmp rtmp1
# (config proxy-services) edit rtmp1
# (config rtmp1) proxy-type http
ok
See Also
n "# (config proxy-services)" on page 384
410 of 604
ProxySG Command Line Interface Reference
# (config rtsp)
Synopsis
Manage services that are controlled by the RTSP proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create rtsp proxy_service [service_group]
# (config proxy-services) edit rtsp_proxy_service
# (config rtsp_proxy_service)
Subcommands
# (config rtsp_service_name) add {all | source_ip | source_ip/subnet_mask} {transparent | explicit |
all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept | bypass]
Changes the behavior from intercept to bypass for the specified listener.
Changes the behavior from bypass to intercept for the specified listener.
411 of 604
ProxySG Command Line Interface Reference
Example
# (config proxy-services) create rtsp rtsp1
# (config proxy-services) edit rtsp1
# (config rtsp1) attribute use-adn enable
ok
See Also
n "# (config proxy-services)" on page 384
412 of 604
ProxySG Command Line Interface Reference
# (config socks)
Synopsis
Manage services that are controlled by the SOCKS proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create socks_proxy_service [service_group]
# (config proxy-services) edit socks_proxy_service
# (config socks_proxy_service)
Subcommands
# (config socks_service_name) add {all | source_ip | source_ip/subnet_mask} {transparent | explicit |
all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept | bypass]
Detects the protocol being used. Protocols that can be detected include: HTTP, P2P (eDonkey, BitTorrent, FastTrack,
Gnutella), SSL, and Endpoint Mapper.
Changes the behavior from intercept to bypass for the specified listener.
Changes the behavior from bypass to intercept for the specified listener.
413 of 604
ProxySG Command Line Interface Reference
Example
# (config proxy-services) create socks socks1
# (config proxy-services) edit socks1
# (config socks1) attribute detect-protocol enable
ok
See Also
n "# (config proxy-services)" on page 384
414 of 604
ProxySG Command Line Interface Reference
# (config ssl)
Synopsis
Manages services that are controlled by the SSL proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create ssl_proxy_service [service_group]
# (config proxy-services) edit ssl_proxy_service
# (config ssl_proxy_service)
Subcommands
# (config ssl_service_name) add {all | source_ip | source_ip/subnet_mask} {transparent | explicit |
all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept | bypass]
Adds a listener with the parameters you specify. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it applies to IPv4 and
IPv6 addresses.
Controls whether to optimize traffic using the byte caching optimization technique when connecting upstream in an ADN
tunnel.
Controls whether to optimize traffic using GZIP compression when connecting upstream in an ADN tunnel.
Adjusts retention priority of byte cache data. If you want to keep certain types of streams in the byte cache for as long as
possible, set a high retention priority for the service. Or for streams that aren’t likely to get much benefit from byte caching, you
can set a low retention priority for the related service. Most services are set to normal priority by default. Note that unless the
underlying service has adn-byte-cache enabled, the priority setting will have no effect; if you try to set a retention priority when
byte caching is disabled, a warning message informs you that the byte-cache-priority attribute has no effect when adn-byte-
cache is disabled.
415 of 604
ProxySG Command Line Interface Reference
Controls whether ADN is enabled for the service. Enabling ADN does not guarantee the connections are accelerated by ADN.
The actual decision is determined by ADN routing (for explicit deployment) and network setup (for transparent deployment).
Changes the behavior from intercept to bypass for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Controls whether to detect HTTPS protocol after intercepting the SSL traffic, and hand it off to the HTTPS proxy.
Changes the behavior from bypass to intercept for the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Removes the specified listener. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix length (for IPv6).
Example
# (config proxy-services) edit ssl1
# (config ssl1) add transparent 443
ok
416 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config ssl) " on page 415
417 of 604
ProxySG Command Line Interface Reference
# (config static-bypass)
Synopsis
Static bypass prevents the ProxySG appliance from transparently accelerating requests to servers that perform IP
authentication with clients. When a request matches an IP address and subnet mask specification, the request is sent to the
designated gateway without going through the ProxySG appliance
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) static-bypass
# (config static-bypass)
Subcommands
# (config static-bypass) add {all | client_ip_address | client_ip_address/subnet_mask} {all | server_
ip_address | server_ip_address/subnet_mask} ["comment"]
Adds a listener with the parameters you specify. IP addresses can be in IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). All includes IPv4 and IPv6 addresses. You can optionally enter a comment of up to 80 characters enclosed in
quotation marks (" ") that specifies why you want the specific source/destination combination to be bypassed. Adding a
comment is also useful if another administrator needs to make changes to the configuration later.
Removes a listener with the parameters you specify. IP addresses can be in IPv4 or IPv6; enter a subnet mask (for IPv4) or
prefix length (for IPv6). includes IPv4 and IPv6 addresses.
Displays static bypass entries based on the filters you specify. IP addresses can be in IPv4 or IPv6; entera subnet mask (for
IPv4) or prefix length (for IPv6).
418 of 604
ProxySG Command Line Interface Reference
Example
# (config proxy-services) static-bypass
# (config static-bypass) add 10.9.17.135 all
ok
See Also
n "# (config proxy-services)" on page 384
419 of 604
ProxySG Command Line Interface Reference
# (config tcp-tunnel)
Synopsis
Manages services that are controlled by the TCP Tunnel proxy
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create tcp-tunnel tcp_tunnel_proxy_service [service_group]
# (config proxy-services) edit tcp_tunnel_proxy_service
# (config tcp_tunnel_proxy_service
Subcommands
# (config tcp_tunnel_service) add {all | source_ip | source_ip/subnet_mask} {transparent | explicit |
all | destination_ip | destination_ip/subnet_mask} {port | first_port-last_port} [intercept | bypass]
Adds a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it applies to IPv4 and
IPv6 addresses.
Controls whether to optimize traffic using the byte caching optimization technique when connecting upstream in an ADN
tunnel.
Controls whether to optimize traffic using GZIP compression when connecting upstream in an ADN tunnel.
Adjusts retention priority of byte cache data. If you want to keep certain types of streams in the byte cache for as long as
possible, set a high retention priority for the service. Or for streams that aren’t likely to get much benefit from byte caching, you
can set a low retention priority for the related service. Most services are set to normal priority by default. Note that unless the
underlying service has adn-byte-cache enabled, the priority setting will have no effect; if you try to set a retention priority when
byte caching is disabled, a warning message displays to inform you that the byte-cache-priority attribute has no effect when
adn-byte-cache is disabled.
Detects the protocol being used. Protocols that can be detected include: HTTP, P2P (eDonkey, BitTorrent,
420 of 604
ProxySG Command Line Interface Reference
Controls whether the proxy responds to client TCP connection requests before connecting to the upstream server. When early
intercept is disabled, the proxy delays responding to the client until after it has attempted to contact the server.
Applies special treatment to streams from thin client applications (such as RDP, VNC, and Citrix). This processing improves
responsiveness of thin client actions. For example, end users will notice that the desktop displays significantly faster. This
option is available only for services using the TCP Tunnel proxy, and can be enabled only when ADN is enabled and byte
caching and/or compression is enabled. The byte-cache-priority and adn-thin-client settings are mutually exclusive; you cannot
enable both options for a service.
Controls whether ADN is enabled for the service. Enabling ADN does not guarantee the connections are accelerated by ADN.
The actual decision is determined by ADN routing (for explicit deployment) and network setup (for transparent deployment).
Changes the behavior from intercept to bypass for the listener you specify. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Changes the behavior from bypass to intercept for the listener you specify. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
421 of 604
ProxySG Command Line Interface Reference
Example
# (config proxy-services) create tcp-tunnel TCP1
# (config proxy-services) edit TCP1
# (config TCP1) attribute early-intercept enable
ok
See Also
n "# (config proxy-services)" on page 384
422 of 604
ProxySG Command Line Interface Reference
# (config telnet)
Synopsis
Manage services that are controlled by the Telnet proxy.
Syntax
# (config) proxy-services
# (config proxy-services)
# (config proxy-services) create telnet telnet_proxy_service [service_group]
# (config proxy-services) edit telnet_proxy_service
# (config telnet_proxy_service
Subcommands
# (config telnet_service) add {all | source_ip[/subnet_mask]} {transparent | explicit | all |
destination_ip[/subnet_mask]} {port | first_port-last_port} [intercept | bypass]
Adds a listener with the specified parameters. IP addresses can be IPv4 or IPv6; enter a subnet mask (for IPv4) or prefix
length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it applies to IPv4 and
IPv6 addresses.
Controls whether to optimize traffic using the byte caching optimization technique when connecting upstream in an ADN
tunnel.
Controls whether to optimize traffic using GZIP compression when connecting upstream in an ADN tunnel.
Adjusts retention priority of byte cache data. If you want to keep certain types of streams in the byte cache for as long as
possible, set a high retention priority for the service. Or for streams that aren’t likely to get much benefit from byte caching, you
can set a low retention priority for the related service. Most services are set to normal priority by default. Note that unless the
underlying service has adn-byte-cache enabled, the priority setting will have no effect; if you try to set a retention priority when
byte caching is disabled, a warning message displays to inform you that the byte-cache-priority attribute has no effect when
adn-byte-cache is disabled.
423 of 604
ProxySG Command Line Interface Reference
Detects the protocol being used. Protocols that can be detected include: HTTP, P2P (eDonkey, BitTorrent, FastTrack,
Gnutella), SSL, and Endpoint Mapper.
Controls whether the proxy responds to client TCP connection requests before connecting to the upstream server. When early
intercept is disabled, the proxy delays responding to the client until after it has attempted to contact the server.
Controls whether ADN is enabled the specific service. Enabling ADN does not guarantee the connections are accelerated by
ADN. The actual decision is determined by ADN routing (for explicit deployment) and network setup (for transparent
deployment).
Changes the behavior from intercept to bypass for the listener you specify. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
Change the behavior from bypass to intercept for the listener you specify. IP addresses can be IPv4 or IPv6; enter a subnet
mask (for IPv4) or prefix length (for IPv6). When the destination address on a listener is defined as transparent, explicit, or all, it
applies to IPv4 and IPv6 addresses.
424 of 604
ProxySG Command Line Interface Reference
Example
# (config proxy-services) create telnet telnet1
# (config proxy-services) edit telnet1
# (config telnet1) view
Service Name: telnet1
Proxy: Telnet
Attributes: early-intercept
Destination IP Port Range Action
See Also
n "# (config proxy-services)" on page 384
425 of 604
ProxySG Command Line Interface Reference
# (config) restart
Synopsis
Set restart options for the ProxySG appliance.
Syntax
# (config) restart {subcommand}
Subcommands
# (config) restart core-image {context | full | none}
Example
# (config) restart mode software
ok
See Also
n link or reference
n link or reference
426 of 604
ProxySG Command Line Interface Reference
# (config) return-to-sender
Synopsis
Return to Sender (RTS) eliminates the need to create static routes by configuring the ProxySG appliance to send response
packets back to the same interface that received the request packet, entirely bypassing any routing lookup on the ProxySG
appliance. Essentially, the ProxySG appliance stores the source Ethernet MAC address that the client’s packet came from
and sends all responses to that address.Under these conditions, if the return-to-sender feature is enabled, the ProxySG
appliance remembers the MAC address of the last hop for a packet from the client or server and sends any responses or
requests to the MAC address instead of the default gateway.
Inbound RTS affects connections initiated to the ProxySG appliance by clients and is enabled by default. Inbound RTS
configures the ProxySG appliance to send SYN-ACK packets to the same interface that the SYN packet arrived on. All
subsequent TCP/IP response packets are also sent to the same interface that received the request packet.
RTS inbound applies only to clients who are on a different subnet than the ProxySG appliance. If clients are on the same
subnet, interface routes are used. Outbound RTS affects connections initiated by the ProxySG appliance to origin servers.
Outbound RTS causes the ProxySG appliance to send ACK and subsequent packets to the same interface that the SYN-ACK
packet arrived on.
Note: RTS functionality should only be used if static routes cannot be defined for the clients
and servers or if routing information for the clients and servers is not available through RIP
packets.
You can use inbound RTS for load balancing. Normally, the ProxySG appliance would not know which load balancer to return
the packet to. When inbound RTS is enabled, the ProxySG appliance simply returns packets to the load balancer the packets
came from.
Syntax
# (config) return-to-sender {subcommand}
Subcommands
# (config) return-to-sender inbound {disable | enable}
When enabled, return-to-sender will overwrite any static route entries. The default is disabled.
427 of 604
ProxySG Command Line Interface Reference
Example
# (config) return-to-sender inbound enable
ok
428 of 604
ProxySG Command Line Interface Reference
# (config) reveal-advanced
See "# reveal-advanced" on page 96.
429 of 604
ProxySG Command Line Interface Reference
# (config) rip
Synopsis
Use this command to set RIP (Routing Information Protocol) configuration options.
Using RIP, a host and router can send a routing table list of all other known hosts to its closest neighbor host every 30
seconds. The neighbor host passes this information on to its next closest neighbor and so on until all hosts have perfect
knowledge of each other. (RIP uses the hop count measurement to derive network distance.) Each host in the network can
then use the routing table information to determine the most efficient route for a packet.
The RIP configuration is defined in a configuration file. To configure RIP, first create a text file of RIP commands and then load
the file by using the load command.
Syntax
# (config) rip {subcommand}
Subcommands
# (config) rip {disable | enable}
Allows you to set the preference group and weight of the default routes.
Clears the current RIP configuration path as determined using the rip path url command.
Sets the path to the RIP configuration file to the URL indicated by url.
Example
#(config) rip path url
ok
430 of 604
ProxySG Command Line Interface Reference
# (config routing-domains)
Synopsis
Segregate distinct networks on a single ProxySG appliance. Each routing domain is associated with specific logical interfaces
and includes its own routing table and default route. Traffic that flows over interfaces that are not configured in a routing domain
are subject to the default routing configuration of the ProxySG appliance, as set in Configuration > Network > Routing.
Note: Routing domains requires that TCP Forwarding is enabled. See"# (config) tcp-ip" on
page 593 for details.
Syntax
# (config) routing-domains
# (config routing-domains)
Subcommands
# (config routing-domains) create routing_domain_name
Edits the specified routing domain. Changes the prompt to "# (config routing-domains)" above.
Example
See the example in "# (config routing-domains)" above.
431 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config routing-domains)" on the previous page
n SGOS Administration Guide
432 of 604
ProxySG Command Line Interface Reference
Note: Routing domains requires that TCP Forwarding is enabled. See "# (config) tcp-ip" on
page 593 for details.
Syntax
# (config) routing-domains
# (config routing-domains)
# (config routing-domains) edit routing_domain_name
# (config routing_domain_name)
Subcommands
# (config routing_domain_name) default-gateway ip_address [ preference_group (1-10) [weight (1-100)]]
Sets the default gateway for this routing domain. Optionally specify the preference group and weight.
433 of 604
ProxySG Command Line Interface Reference
Example
Create a routing domain for the VLAN-tagged network used by the marketing department called Marketing, which uses a VLAN
ID of 144. This example uses the following steps:
# (config routing-domains)
# (config routing-domains) create Marketing_144
ok
# (config routing-domains) exit
# (config) interface 1:0.144
# (config interface 1:0.144) ip-address 144.144.144.1 255.255.255.0
ok
# (config interface 1:0.144) exit
# (config) routing-domains
# (config routing-domains) edit Marketing_144
# (config Marketing_144) interface 1:0.144
ok
# (config Marketing_144) default-gateway 144.144.144.100
# (config Marketing_144) inline static-route-table EOF
44.44.44.44/24 144.144.144.111
EOF
ok
# (config Marketing_144) view
Routing domain Marketing_144 configuration:
Associated interfaces: 1:0.144
; TCP/IP Routing Table
Routing tables
Routing domain 2 : Marketing_144
Internet:
Destination Gateway Flags Refs Use Netif Expire
default 144.144.144.100 UGS 1 0 1:0.144
44.44.44.0/24 144.144.144.111 UGS 1 0 1:0.144
144.144.144.0/24 link#9 UC 0 0 1:0.144
144.144.144.100 link#9 UHLW 1 0 1:0.144 66
144.144.144.111 link#9 UHLW 0 0 1:0.144
434 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config routing-domains routing_domain_name)" on page 433
n SGOS Administration Guide
435 of 604
ProxySG Command Line Interface Reference
# (config) security
Synopsis
Use # (config) security commands are used for security, authentication, and authorization. The ProxySG appliance
provides the ability to authenticate and authorize explicit and transparent proxy users using industry-standard authentication
services.
Syntax
# (config) security {subcommand}
Subcommands
Modes in the # (config) security command can be divided into the following categories:
436 of 604
ProxySG Command Line Interface Reference
(On applicable models) Sets a four-digit PIN to restrict access to the front panel of the appliance.
(On applicable models) Sets a hashed four-digit PIN to restrict access to the front panel of the appliance.
Specifies how to display SSH and SSL private keys in show config output.
437 of 604
ProxySG Command Line Interface Reference
Note: Up to 40 realms per type (such as certificate, authentication forms, and RADIUS) are
allowed.
Controls whether the ProxySG appliance forwards Authorization and Proxy-Authorization headers upstream to the OCS.
Creates and manages IWA realms that connect to Active Directory using BCAAA.
Creates and manages IWA realms that connect to Active Directory directly.
438 of 604
ProxySG Command Line Interface Reference
Transparent Proxy
You can configure the authentication method for transparent proxies.
Top-Level Domains
You can manually enter top-level domains.
439 of 604
ProxySG Command Line Interface Reference
Example
# (config) show security
Account:
Username: "admin"
Hashed Password: $1$a2zTlEE$1b88R3SXUTXS.zO7lh8db0
Hashed Enable Password: $1$xQnqGerX$LU65b20trsIAF6yJox26L
Hashed Front Panel PIN: "$1$ThSEiB1v$seyBhSxtTXEtUGDZ5NOB1/"
Management console display realm name: "Aurora"
Management console auto-logout timeout: Never
Access control is disabled
Access control list (source, mask):
Flush credentials on policy update is enabled
Default authenticate.mode: auto
Transparent proxy authentication:
Method: cookie
Cookie type: session
Cookie virtual-url: "www.cfauth.com/"
IP time-to-live: 15
Local realm:
No local realm is defined.
RADIUS realm:
No RADIUS realm is defined.
LDAP realm(s):
No LDAP realm is defined.
...
440 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security allowed-access {subcommand}
Subcommands
# (config) security allowed-access add source_ip [ip_mask]
Example
# (config) security allowed-access add 10.25.36.47
See Also
n "# (config) security enforce-acl" on page 460
441 of 604
ProxySG Command Line Interface Reference
442 of 604
ProxySG Command Line Interface Reference
n Create a new form or edit one of the existing authentication form exceptions
n Set policies
Syntax
# (config) security authentication-forms
Subcommands
# (config authentication-forms) copy source_form_name target_form_name
Changes the name of a form. Note that you cannot change the form type.
Creates a new authentication form using the form type you specify.
443 of 604
ProxySG Command Line Interface Reference
Specifies the path (URL or IP address) from which to load authentication forms.
Example
# (config) security authentication-forms
# (config authentication-forms) create form_type form_name
ok
where form_type indicates the default authentication-form, new-pin-form, or query-form and form_name is the name you give
the form.
See Also
n "# (config) security request-storage" on page 509
444 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security captcha {subcommand}
Subcommands
# (config) security captcha create-validator validator_name
Edits an existing CAPTCHA validator. Changes prompt to "# (config captcha realm_name)" on the next page.
Shows running system information for all CAPTCHA validators or the specified one.
Example
# (config) security captcha view captcha1
Validator name: captcha1
Captcha timeout: 300
Surrogate refresh: 900
Virtual URL: validator.cfauth.com
Disallowed characters: <None>
Captcha font: SansBold
Captcha length: 8
See Also
n "# (config captcha realm_name)" on the next page
445 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security captcha edit realm_name
Subcommands
# (config captcha realm_name) captcha-timeout
Specifies the maximum time (in seconds) allowed for users to enter the CAPTCHA challenge response. If the user enters a
response after the time has elapsed, the form refreshes and displays a new CAPTCHA challenge image.
Specifies the font to use for unobfuscated text in the CAPTCHA challenge image. By default, the text is obfuscated.
Restricts the length of the CAPTCHA challenge to the specified number of characters. number is an integer from 4 through 16.
Specifies an interval (in seconds) after which the CAPTCHA cookie expires.
Specifies the authentication virtual URL for the CAPTCHA validator. If one is not specified, the default validator.cfauth.com is
used.
Example
# (config captcha captcha1) font sans-bold
ok
446 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config) security captcha" on page 445
447 of 604
ProxySG Command Line Interface Reference
After an SSL session has been established, the user is asked to select the certificate to send to the ProxySG appliance. If the
certificate was signed by a Certificate Signing Authority that the ProxySG appliance trusts, including itself, then the user is
considered authenticated. The username for the user is the one extracted from the certificate during authentication.
n The policy works as desired when all certificate realm-authenticated users are not in any group
Syntax
# (config) security certificate {subcommand}
Subcommands
# (config) security certificate create-realm realm_name
Edits the specified realm. Changes the prompt to # (config certificate certificate_realm).
Displays the configuration of all certificate realms or just the configuration for realm_name if specified.
Example
# (config) security certificate create-realm certrealm
ok
See Also
n # (config certificate certificate_realm)
448 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security certificate edit certificate_realm
Subcommands
# (config certificate certificate_realm) authorization ignore-user-list {add | clear | remove}
Manages the ignore-user-list, which is the list of those to ignore if they are returned as search results.
Specifies the authorization realm to use. Only LDAP, XML, and local realms are valid authorization realms.
Specifies the search filter that should be used during a search of the LDAP server. The filter can contain policy substitutions
including $(cs-username).
Specifies the user-attribute (fully qualified domain name or an LDAP attribute name) to be used during a search of the LDAP
server.
Specifies the way a username should be determined. The default is the attribute cn, which specifies the user’s relative name.
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
Adds and removes extended key usage OIDs and clear the OID list.
449 of 604
ProxySG Command Line Interface Reference
Specifies the amount of time a session can be inactive before being logged out.
Specifies the virtual URL to use for this realm. If no URL is specified the global transparent proxy virtual URL is used.
Example
# (config) security certificate edit-realm testcert
# (config certificate testcert) refresh-time surrogate-refresh 800
ok
See Also
n "# (config) security certificate" on page 448
450 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security coreid {subcommand}
Subcommands
# (config) security coreid create-realm realm_name
Edits the specified realm. Changes prompt to "# (config coreid realm_name) " on the next page.
Displays the configuration of all COREid realms or just the configuration for realm_name if specified.
Example
# (config) security coreid create-realm coreid1
ok
See Also
n "# (config coreid realm_name) " on the next page
451 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security coreid edit-realm realm_name
Subcommands
# (config coreid realm_name) access-server-hostname hostname
When enabled, authorization actions from the policy domain obtained during authentication are added to each request
forwarded by the ProxySG appliance. Note that header responses replaces any existing header of the same name; if no such
header exists, the header is added. Cookie responses replace a cookie header with the same cookie name; if no such cookie
header exists, one is added.
The encrypted password associated with the alternate AccessGate. (Passwords can be up to 64 characters long and are
always case sensitive.) The primary use of the encrypted-secret command is to allow the ProxySG appliance to reload a
password that it encrypted. If you choose to use a third-party encryption application, be sure it supports ..RSA encryption,
OAEP padding, and is Base64 encoded with no newlines.
The hostname or the IP address of the alternate system that contains the agent.
452 of 604
ProxySG Command Line Interface Reference
The password associated with the alternate AccessGate. (Passwords can be up to 64 characters long and are always case-
sensitive.)
Specifies whether the username and group comparisons on the ProxySG appliance should be case-sensitive.
If Cert mode is used, the location on the BCAAA host machine where the key, server and CA chain certificates reside. The
certificate files must be named aaa_key.pem, aaa_cert.pem and aaa_chain.pem respectively.
# (config coreid realm_name) cookie {persistent {{disable | enable} | verify-ip {disable | enable}}
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
Equivalent to the display-name option in the CPL authenticate() action. The default value for the display name is the realm
name. The display name cannot be longer than 128 characters and it cannot be null.
If Simple or Cert mode is used, the Transport encrypted passphrase configured in the Access System.
Specifies the amount of time a session can be inactive before being logged out.
Allows you to challenge the user after log out and define the log out page display time.
453 of 604
ProxySG Command Line Interface Reference
The encrypted password associated with the primary AccessGate. (Passwords can be up to 64 characters long and are
always case sensitive.) The primary use of the encrypted-secret command is to allow the ProxySG appliance to reload a
password that it encrypted. If you choose to use a third-party encryption application, be sure it supports RSA encryption,
OAEP padding, and is Base64 encoded with no new line.
The hostname or the IP address of the primary system that contains the agent.
The password associated with the primary AccessGate. (Passwords can be up to 64 characters long and are always case-
sensitive.)
Specifies the resource name defined in the Access System policy domain.
Sets the refresh time for credential, rejected credentials cache, and surrogates.
The Security Transport Mode for the AccessGate to use when communicating with the Access System
The length of time to elapse before timeout if a response from BCAAA is not received.
If Simple or Cert mode is used, the Transport passphrase configured in the Access System.
454 of 604
ProxySG Command Line Interface Reference
Enables validation of the client IP address in SSO cookies. If the client IP address in the SSO cookie can be valid yet different
from the current request client IP address due to downstream proxies or other devices, then disable client IP address
validation. The WebGates participating in SSO with the ProxySG appliance should also be modified. The WebGateStatic.lst
file should be modified to either set the ipvalidation parameter to false or to add the downstream proxy/device to the
IPValidationExceptions lists.
The URL to redirect to when the user needs to be challenged for credentials. If the ProxySG appliance is participating in SSO,
the virtual hostname must be in the same cookie domain as the other servers participating in the SSO. It cannot be an IP
address or the default.
Example
# (config) security coreid edit-realm coreid_1
# (config coreid coreid_1) access-server-hostname AccessServer_1
# (config coreid coreid_1) refresh-time surrogate-refresh 800
See Also
n "# (config) security coreid" on page 451
455 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security default-authenticate-mode {subcommand}
Subcommands
# (config) security default-authenticate-mode auto
Example
# (config) security default-authenticate-mode sg2
ok
456 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security enable-password {subcommand}
Subcommands
# (config) security enable-password [password]
Password required to enter enable mode from the CLI when using console credentials, the serial console, or RSA SSH. If you
do not specify the password with the command, the CLI prompts you to enter the password.
Example
# (config) security enable-password
Enter password: *****
Confirm password: *****
ok
See Also
n "# (config) security hashed-enable-password" on page 462
457 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security encrypted-enable-password {subcommand}
Subcommands
# (config) security encrypted-enable-password encrypted_password
Example
# (config) security encrypted-enable-password encrypted_password
See Also
n "# (config) security encrypted-password" on the facing page
458 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security encrypted-password {subcommand}
Subcommands
# (config) security encrypted-password encrypted_password
Example
# (config) security encrypted-password encrypted_password
See Also
n "# (config) security encrypted-enable-password" on the previous page
459 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security enforce-acl {subcommand}
Subcommands
# (config) security enforce {disable | enable}
Example
# (config) security enforce disable
ok
See Also
n "# (config) alert" on page 155
460 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security front-panel-pin {subcommand}
Subcommands
# (config) security front-panel-pin PIN
Example
# (config) security front-panel-pin 12345
ok
See Also
n "# (config) security hashed-front-panel-pin" on page 463
461 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security hashed-enable-password {subcommand}
Subcommands
# (config) security hashed-enable-password hashed_password
Password required to enter enable mode from the CLI when using console credentials, the serial console, or SSH.
Example
# (config) security hashed-enable-password hashed_password
See Also
n "# (config) security enable-password" on page 457
462 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security front-panel-pin {subcommand}
Subcommands
# (config) security front-panel-pin hashed_PIN
Example
# (config) security hashed-front-panel-pin hashed_PIN
ok
See Also
n "# (config) security front-panel-pin" on page 461
463 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security hashed-password {subcommand}
Subcommands
# (config) security hashed-password hashed_password
Example
# (config) security hashed-password hashed_password
See Also
n "# (config) security password" on page 494
464 of 604
ProxySG Command Line Interface Reference
IWA is an authentication mechanism available on Windows networks. IWA is a Microsoft-proprietary authentication suite that
allows Windows clients (running on Windows 2000 and later) to automatically choose between using Kerberos and NTLM
authentication challenge/response, as appropriate. When an IWA realm is used and a resource is requested by the client from
the ProxySG appliance, the appliance contacts the client's domain account to verify the client's identity and request an access
token. The access token is generated by the domain controller (in case of NTLM authentication) or a Kerberos server (in the
case of Kerberos authentication) and passed to (and if valid, accepted by) the ProxySG appliance. Refer to the Microsoft Web
site for detailed information about the IWA protocol.
Syntax
# (config) security iwa-bcaaa {subcommands}
Subcommands
# (config) security iwa-bcaaa create-realm realm_name
Edits the specified realm. Changes the prompt to "# (config iwa-bcaaa realm_name)" on the next page.
Displays the configuration of all IWA realms or just the configuration for specified realm.
See Also
n "# (config iwa-bcaaa realm_name)" on the next page
465 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security iwa-bcaaa create-realm realm_name
ok
# (config) security iwa-bcaaa edit realm_name
Subcommands
Specifies the alternate server host and port.
# (config iwa-bcaaa realm_name) cookie {persistent {enable | disable} | verify-ip {enable | disable}
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
Disables/enables support for Basic credentials in this realm. At least one of Basic or NTLM/Kerberos credentials must be
supported.
Disables/enables support for Kerberos credentials in this realm. If Kerberos is enabled, NTLM must also be enabled. At least
one of Basic or NTLM/Kerberos credentials must be supported.
Disables/enables support for NTLM credentials in this realm. If NTLM is enabled, Kerberos must also be enabled. At least one
of Basic or NTLM/Kerberos credentials must be enabled.
Specifies the amount of time a session can be inactive before being logged out.
466 of 604
ProxySG Command Line Interface Reference
Allows you to challenge the user after log out and define the log out page display time.
Sets the refresh time for credential, rejected credentials cache time, and surrogates.
Enables/disables the forwarding of BASIC credentials of the authenticated user to the origin content server or for proxy
authentication. Flush the entries for a realm if the server- authentication value is changed to ensure that the server-
authentication value is immediately applied.
Tests the IWA configuration to ensure that you can successfully authenticate a user in your Active Directory.
467 of 604
ProxySG Command Line Interface Reference
Specifies the virtual URL to use for this realm. If no URL is specified the global transparent proxy virtual URL is used.
Example
# (config) security iwa-bcaaa edit-realm testIWA
# (config iwa-bcaaa testIWA) no alternate server
ok
See Also
n "# (config) security iwa-bcaaa" on page 465
468 of 604
ProxySG Command Line Interface Reference
IWA is a Microsoft-proprietary authentication suite that allows Windows clients (running on Windows 2000 and higher) to
automatically choose between using Kerberos and NTLM authentication challenge/response, as appropriate. When an IWA
realm is used and a resource is requested by the client from the ProxySG appliance, the appliance contacts the client's domain
account to verify the client's identity and request an access token. The access token is generated by the domain controller (in
case of NTLM authentication) or a Kerberos server (in the case of Kerberos authentication) and passed to (and if valid,
accepted by) the ProxySG appliance.
Refer to the Microsoft support site for detailed information about the IWA protocol.
Syntax
# (config) security iwa-direct {subcommand}
Subcommands
# (config) security iwa-direct create-realm realm_name windows_domain_name
Edits the specified realm. Changes the prompt to "# (config iwa-direct realm_name)" on the next page.
Displays the configuration of all IWA realms or just the configuration for the specified realm_name.
See Also
n "# (config iwa-direct realm_name)" on the next page
469 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security iwa-direct create-realm realm_name
ok
# (config) security iwa-direct edit realm_name
Subcommands
# (config iwa-direct realm_name) authorization {realm-name LDAP_realm | self}
Authorize with the specified LDAP realm or with the current IWA-Direct realm. By default, IWA Direct is used for authorization.
# (config iwa-direct realm_name) cookie {persistent {enable | disable} | verify-ip {enable | disable}
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
Disables/enables support for Basic credentials in this realm. At least one of Basic or NTLM/Kerberos credentials must be
supported.
Disables/enables support for Kerberos credentials in this realm. If Kerberos is enabled, NTLM must also be enabled. At least
one of Basic or NTLM/Kerberos credentials must be supported.
Disables/enables support for NTLM credentials in this realm. If NTLM is enabled, Kerberos must also be enabled. At least one
of Basic or NTLM/Kerberos credentials must be enabled.
Enable reporting on the user's email address. Use in conjunction with the email-attribute subcommand.
470 of 604
ProxySG Command Line Interface Reference
Specifies the attribute that represents the user's email address. Enable retrieval of this attribute with the email-address enable
subcommand.
Specifies the amount of time a session can be inactive before being logged out.
Allows you to challenge the user after log out and define the log out page display time.
Sets the refresh time for credential, rejected credentials cache time, and surrogates.
Enables/disables the forwarding of BASIC credentials of the authenticated user to the origin content server or for proxy
authentication. Flush the entries for a realm if the server-authentication value is changed to ensure that the server-
authentication value is immediately applied.
When enabled, suppress NTLM challenges and send only Negotiate challenges for NTLM and Kerberos; NTLM responses are
still accepted. When disabled, do not suppress NTLM challenges.
471 of 604
ProxySG Command Line Interface Reference
Tests the IWA configuration to ensure that you can successfully authenticate a user in your Active Directory. This submode
displays all user groups.
Tests the IWA configuration to ensure that you can successfully authenticate a user in your Active Directory. This submode
truncates the display results to 20 user groups.
Specifies the virtual URL to use for this realm. If no URL is specified the global transparent proxy virtual URL is used.
Example
# (config) security iwa-direct edit-realm MyRealm
# (config iwa-direct MyRealm) virtual-url http://myproxy
ok
See Also
n "# (config) security iwa-direct" on page 469
472 of 604
ProxySG Command Line Interface Reference
Symantec supports both LDAP v2 and LDAP v3, but recommends LDAP v3 because it uses Transport Layer Security (TLS)
and SSL to provide a secure connection between the appliance and the LDAP server.
An LDAP directory, either version 2 or version 3, consists of a simple tree hierarchy. An LDAP directory might span multiple
LDAP servers. In LDAP v3, servers can return referrals to others servers back to the client, allowing the client to follow those
referrals if desired. Directory services simplify administration; any additions or changes made once to the information in the
directory are immediately available to all users and directory-enabled applications, devices, and ProxySG appliances.
The ProxySG appliance supports the use of external LDAP database servers to authenticate and authorize users on a per-
group or per-attribute basis.
LDAP group-based authentication for the ProxySG appliance can be configured to support any LDAP-compliant directory
including:
n Other
Syntax
# (config) security ldap {subcommand}
Subcommands
# (config) security ldap create-realm realm_name
Edits the specified realm. Changes the prompt to "# (config ldap realm_name)" on page 475.
Displays the configuration of all LDAP realms or just the configuration for the specified realm_name.
473 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config ldap realm_name)" on the facing page
474 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security ldap create-realm realm_name
ok
# (config) security ldap edit realm_name
Subcommands
# (config ldap realm_name) alternate-server host [port]
# (config ldap realm_name) cookie {persistent {disable | enable} | verify-ip {disable | enable}
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
If the validate-authorized-user command is disabled and a default-group-name is configured, the default-group-name is used as
the group name for non-existent users.
Specifies the attribute type that defines the relative user name.
# (config ldap realm_name) distinguished-name base-dn {add | demote | promote | remove} {base_dn |
clear}
Adds/demotes/promotes/removes a base DN from the base DN list, or clears the base DN list.
475 of 604
ProxySG Command Line Interface Reference
Specifies the amount of time a session can be inactive before being logged out.
Allows you to challenge the user after log out and define the log out page display time.
Allows you to look up the common name of a group in your LDAP tree. For example, looking up the group finance might return a
value such as cn=finance,ou=headquarters,o=acme.
Allows you to look up the common name of a user in your LDAP tree. Note that this command will return all matching entries.
For example, looking up the user jdoe might return a values such as cn=jdoe,ou=headquarters,o=acme and CN=jdoe,o=acme.
Specifies the membership type. Specify group if user memberships are specified in groups. Specify user if memberships are
specified in users.
Specifies the username type to use during membership lookups. The full option specifies that the user's FQDN is used during
membership lookups, and relative option specifies that the user's relative username is used during membership lookups. Only
one can be selected at a time.
Specifies the attribute that defines nested group membership. For other, ad, and nds, the default attribute name is member. For
iPlanet, the default attribute name is uniqueMember.
476 of 604
ProxySG Command Line Interface Reference
Adds/removes container objectclass values from the list (these values are used during VPM searches of the LDAP realm), or
clears all values from the container objectclass list.
Adds/removes group objectclass values from the list (these values are used during VPM searches of the LDAP realm), or
clears all values from the group objectclass list.
Adds/removes user objectclass values from the list (these values are used during VPM searches of the LDAP realm), or clears
all values from the user objectclass list.
Specifies the LDAP version to use. SSL and referral processing are not available in LDAP v2.
Sets the refresh time for authorization, credential, rejected credentials cache, and surrogates.
Specifies the dereference level. Specify always to always dereference aliases. Specify finding to dereference aliases only
while locating the base of the search. Specify searching to dereference aliases only after locating the base of the search.
Specify never to never dereference aliases.
477 of 604
ProxySG Command Line Interface Reference
Enables/disables the forwarding of BASIC credentials of the authenticated user to the origin content server or for proxy
authentication. Flush the entries for a realm if the server-authentication value is changed to ensure that the server-
authentication value is immediately applied.
Disables/enables SSL communication between the ProxySG appliance and the LDAP server. This is only available in LDAP
v3.
Tests the LDAP configuration to ensure that the ProxySG appliance can successfully authenticate a user in your LDAP realm
using the username and password you provide.
When this command is enabled, an authorization (not authentication) request verifies that the user exists in the LDAP server. If
the user does not exist, the authorization request fails (authentication requests always require the user to exist).
478 of 604
ProxySG Command Line Interface Reference
When this command is disabled, no user existence check is made for an authorization request. If the user does not exist, the
authorization request succeeds.
Specifies the virtual URL to use for this realm. If no URL is specified the global transparent proxy virtual URL is used.
Example
# (config) security ldap edit-realm testldap
# (config ldap testldap) server-type iplanet
ok
See Also
n "# (config) security ldap" on page 473
479 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security legacy-relative-usernames {subcommand}
Subcommands
# (config) security legacy-relative-usernames {disable | enable}
Example
# (config) security legacy-relative-usernames disable
ok
480 of 604
ProxySG Command Line Interface Reference
Using a Local realm is appropriate when the network topography does not include external authentication or when you want to
add users and administrators to be used by the ProxySG appliance only.
The Local realm (you can create up to 40) uses a Local User List, a collection of users and groups stored locally on the
ProxySG appliance. You can create up to 50 different Local User Lists. Multiple Local realms can reference the same list at the
same time, although each realm can only reference one list at a time. The default list used by the realm can be changed at any
time.
Syntax
# (config) security local {subcommand}
Subcommands
# (config) security local create-realm realm_name
Edits the specified realm. Changes the prompt to "# (config local realm_name)" on the next page.
Displays the configuration of all local realms or just the configuration for the specified realm_name.
See Also
n "# (config local realm_name)" on the next page
481 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security local create-realm realm_name
ok
# (config) security local edit realm_name
Subcommands
# (config local realm_name) cookie {persistent {enable | disable} | verify-ip {enable | disable}
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
If the validate-authorized-user command is disabled and a default-group-name is configured, the default-group-name is used as
the group name for non-existent users.
Specifies the amount of time a session can be inactive before being logged out.
482 of 604
ProxySG Command Line Interface Reference
Enables/disables the forwarding of BASIC credentials of the authenticated user to the origin content server or for proxy
authentication. Flush the entries for a realm if the server-authentication value is changed to ensure that the server-
authentication value is immediately applied.
When validate-authorized-user is enabled, an authorization (not authentication) request verifies that the user exists in the local
user list. If the user does not exist in the list, the authorization request fails (authentication requests always require the user to
exist).
When validate-authorized-user is disabled, no user existence check is made for an authorization request. If the user does not
exist, the authorization request succeeds.
Specifies the virtual URL to use for this realm. If no URL is specified the global transparent proxy virtual URL is used.
Example
# (config) security local edit-realm testlocal
# (config local testlocal) server-authentication proxy
ok
See Also
n "# (config) security local-user-list" on the next page
483 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security local-user-list {subcommand}
Subcommands
# (config) security local-user-list clear [force]
Clears all local user lists. Lists referenced by local realms and the default local user list are recreated but empty. Specify force
to clear realms without a prompt for confirmation.
Specifies the default local user list. The default list is populated during password file uploads. The default list is also the default
list used by local realms when they are created
Deletes the specified local user list. The default list and any lists used by local realms cannot be deleted. Specify force to
delete the list without a prompt for confirmation.
Returns to # (config) mode.
Example
# (config) security local-user-list default append-to-default enable
ok
484 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config) security local-user-list" on the previous page
485 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security local-user-list edit local_user_list
Subcommands
# (config local-user-list local_user_list) disable-all
Clears all groups from the list. The users remain but do not belong to any groups.
The length of time a user account is locked out after too many failed password attempts. The default is 3600.
Number of failed attempts to login to an ProxySG appliance before the user account is locked. The default is 60 attempts.
486 of 604
ProxySG Command Line Interface Reference
Length of seconds to wait after the last failed attempt before resetting the failed counter to zero.
Clears all users from the list. The groups remain but do not have any users.
Edits the specified user in the local user list. Changes the prompt to "# (config local-user-list user local_user_name)" on the
next page.
Example
# (config) security local-user-list edit testlul
#(config local-user-list testlul) user create testuser
ok
# (config local-user-list testlul) user edit testuser
# (config local-user-list testlul testuser) enable
ok
See Also
n "# (config) security local" on page 481
487 of 604
ProxySG Command Line Interface Reference
Syntax
# (config local-user-list local_user_list) user edit user_name
Subcommands
# (config local-user-list local_user_list user_name) {disable | enable}
Example
See the example in "# (config local-user-list local_user_list)" on page 486.
See Also
n "# (config) security local" on page 481
488 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security management {subcommand}
Subcommands
# (config) security management cli-timeout minutes
Specifies the length of an administrative CLI session before the administrator is required to re-enter credentials. The default is
15 minutes (900 seconds). Acceptable values are between 1 and 1440 minutes (60 seconds to 86400 seconds).
Specifies the realm to display in the Management Console challenge. The default value is the IP address of the ProxySG
appliance.
Disables the specified web interface realm displayed in the Management Console challenge.
Specifies the length of an administrative Management Console session before the administrator is required to re-enter
credentials. The default is 15 minutes (900 seconds). Accepted values are between 1 and 1440 minutes (60 seconds to 86400
seconds).
Example
# (config) security management web-timeout 20
ok
489 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security novell-sso {subcommand}
Subcommands
# (config) security novell-sso create-realm realm_name
Edits the specified realm. Changes prompt to "# (config security novell-sso realm_name)" on the facing page
Displays the configuration of all Novell SSO realms or of the specified realm.
See Also
n "# (config security novell-sso realm_name)" on the facing page
490 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security novell-sso edit-realm realm_name
Subcommands
# (config novell-sso realm_name) alternate-agent {host hostname | port port_number}
Sets the alternate private key password. Entering the command without a password opens the password prompt followed by a
confirmation prompt.
Sets the alternate public certificate password. Entering the command without a password opens the password prompt followed
by a confirmation prompt.
Sets the alternate private key password. Entering the command without a password opens the password prompt followed by a
confirmation prompt.
Sets the alternate public certificate password. Entering the command without a password opens the password prompt followed
by a confirmation prompt.
Specifies the realm name, which can be self, and username for authorization. No clears the realm and username.
# (config novell-sso realm_name) cookie {persistent {disable | enable} | verify-ip {disable | enable}}
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
491 of 604
ProxySG Command Line Interface Reference
Specifies the day of the week for full searches to occurs and the time of the day (UTC time) to search.
Specifies the amount of time a session can be inactive before being logged out.
# (config novell-sso realm_name) ldap monitor-server {add LDAP_host [LDAP_port] | clear | remove LDAP_
host [LDAP_port]}
Add an LDAP host to list of servers to be monitored, clear the list, or remove a specific LDAP host from the list of servers to be
monitored.
Specifies the name of the LDAP server for Novell directory attributes.
Enables or disables SSL between the ProxySG and the BCAAA service.
The time allotted for each request attempt. The default is 60 seconds.
492 of 604
ProxySG Command Line Interface Reference
Tests the Novell SSO and BCAAA configuration to ensure that the appliance can successfully map an IP address to a user in
your Novell Directory.
Specifies the virtual URL to use for this realm. If no URL is specified the global transparent proxy virtual URL is used.
See Also
n "# (config) security novell-sso" on page 490
493 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security password {subcommand}
Subcommands
# (config) security password [password]
Password required to enter the console. If you do not specify the password with the command, the CLI prompts you to enter
the password.
Example
# (config) security password
Enter password: *****
Confirm password: *****
ok
See Also
n "# (config) security enable-password" on page 457
494 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security password-display {subcommand}
Subcommands
# (config) security password-display {encrypted | none}
Specifies the format to display passwords in show config output. Specify encrypted to display encrypted passwords. Specify
none to display no passwords.
Example
# (config) security password-display view
Password display mode: Encrypted
Password encryption keyring: configuration-passwords-key
495 of 604
ProxySG Command Line Interface Reference
The Policy Substitution realm is used typically for best-effort user discovery, mainly for logging and subsequent reporting
purposes, without the need to authenticate the user. Be aware that if you use Policy Substitution realms to provide granular
policy on a user, it might not be very secure because the information used to identify the user can be forged.
Syntax
# (config) security policy-substitution {subcommands}
Subcommands
# (config) security policy-substitution create-realm realm_name
Edits the specified realm. Changes the prompt to "# (config policy-substitution realm_name)" on the facing page.
See Also
n "# (config policy-substitution realm_name)" on the facing page
496 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security policy-substitution edit-realm realm_name
Subcommands
# (config policy-substitution realm_name) authorization-realm-name realm_name
This option is only required if you are associating an authorization realm with the Policy Substitution realm.
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
The authenticated group name for use in a policy substitution realm. This command identifies the string to be used in an HTTP
header, for use in a child proxy in proxy chain configurations. The parent proxy would look for a HTTP header string and through
policy actions, make policy decisions based on a user’s group.
This command has no impact when used in a policy substitution realm that includes an authorization realm. For more
information on Policy Substitution realms, refer to the Content Policy Language Reference.
The full username as created through policy substitutions. The construction rule is made up any of the substitutions whose
values are available at client logon, listed in “CPL Substitutions” in the Content Policy Language Reference.
497 of 604
ProxySG Command Line Interface Reference
Note: The username and full username attributes are character strings that contain policy
substitutions. When authentication is required for the transaction, these character strings are
processed by the policy substitution mechanism, using the current transaction as input. The
resulting string is stored in the user object in the transaction, and becomes the user’s identity.
To create full usernames for various uses in Policy Substitution realms, refer to the Content
Policy Language Reference.
The username as created through policy substitutions. The username is only required if you are using an authorization realm.
The construction rule is made up any of the policy substitutions whose values are available at client logon, listed in “CPL
Substitutions,” in the Content Policy Language Reference.
Note: The username and full username attributes are character strings that contain policy
substitutions. When authentication is required for the transaction, these character strings are
processed by the policy substitution mechanism, using the current transaction as input. The
resulting string is stored in the user object in the transaction, and becomes the user’s identity.
To create usernames for the various uses of Policy Substitution realms, refer to the Content
Policy Language Reference.
Specifies the amount of time a session can be inactive before being logged out.
498 of 604
ProxySG Command Line Interface Reference
Specifies the virtual URL to use for this realm. If no URL is specified the global transparent proxy virtual URL is used.
Example
# (config) security policy-substitution edit-realm PS1
# (config policy-substitution PS1) authorization-realm-name LDAP1
# (config policy-substitution PS1) username $(netbios.messenger-username)
# (config policy-substitution PS1) identification full-username cn=$(netbios.messenger-
username),cn=users,dc=$(netbios.computer-domain),dc=company,dc=com
See Also
n "# (config) security policy-substitution" on page 496
499 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security private-key-display {subcommand}
If this occurs, set a passphrase for the session using # (config) security private-key-display passphrase
[passphrase]
In FIPS mode, do not specify the passphrase value in subcommands. The CLI will prompt you to enter the passphrase
instead. See the "Example" on the facing page below.
Subcommands
# (config) security private-key-display aes128-cbc passphrase [passphrase]
Displays private keys, encrypted using AES128-CBC encryption, and sets the passphrase to use for encryption. The
passphrase must be at least eight characters in length.
Displays private keys, encrypted using AES256-CBC encryption, and sets the passphrase to use for encryption. The
passphrase must be at least eight characters in length.
Sets the passphrase to use for encrypting the display of keyrings in "# show configuration" on page 102 output and # (config
ssh-client client-keys) view private output. The passphrase must be at least eight characters in length.
In addition to the # (config) security private-key-display aes* commands (described in the "Passphrase Syntax and
Notes" above section above), this passphrase is used for encrypting/decrypting imported private keys within the current
terminal session if the #(config ssh-client client-keys) inline command does not specify a passphrase.
500 of 604
ProxySG Command Line Interface Reference
Displays private keys in plaintext. Symantec recommends that you do not use this command.
Example
# (config) security private-key-display passphrase
Passphrase: ********
#(config)
501 of 604
ProxySG Command Line Interface Reference
Some RADIUS servers support one-time passwords. One-time passwords are passwords that become invalid as soon as
they are used. The passwords are often generated by a token or program, although pre-printed lists are also used. Using one-
time passwords ensures that the password cannot be used in a replay attack.
The ProxySG appliance’s one-time password support works with products such as Secure Computing SafeWord synchronous
and asynchronous tokens and RSA SecurID tokens.
The ProxySG supports RADIUS servers that use challenge/response as part of the authentication process. SafeWord
asynchronous tokens use challenge/response to provide authentication. SecurID tokens use challenge/response to initialize or
change PINs.
Syntax
# (config) security radius {subcommands}
Subcommands
# (config) security radius attributes
Configures RADIUS attributes. Changes the prompt to "# (config radius attributes)" on page 504.
Edits the specified realm. Changes the prompt to "# (config radius realm_name)" on page 506.
502 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config radius attributes)" on the next page
503 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security radius attributes
Subcommands
# (config radius attributes) add {radius-attribute radius_type (1-255) attribute_name [integer | ipv4
| ipv6] | [[string | tag-string | octet-string | tag-octet-string] max_length (1-247)] |[[enum | tag-
enum] =string max_length (1-253) {(1-253)=string max_length (1-253)}]
Note: To change the configuration of an existing RADIUS attribute, you must remove it from
the system and add it again with the new configuration:
1. Back up the ProxySG policy and install a new blank policy.
2. If the attribute is in use in the RADIUS session monitor, remove the attribute from the
session monitor using the # (config session-monitor attributes) remove command.
3. Remove the attribute from RADIUS configuration using the # (config radius
attributes) remove command.
4. Add the attribute with new configuration using the # (config radius attributes) add
command.
5. (If the attribute was previously in the RADIUS session monitor configuration) Restart the
appliance and then add the attribute to the session monitor using the #(config session-monitor
attributes) add command.
6. Restore the policy you backed up in step 1.
To verify the configured RADIUS attributes, issue the # (config radius attributes) view
command.
# (config radius attributes) add vendor_id vendor_type (1-255) attribute_name [integer | ipv4 | ipv6]
| [[string | tag-string | octet-string | tag-octet-string] max_length (1-247)] |[[enum | tag-enum] =
string max_length (1-253) {(1-253)=string max_length (1-253)}]
504 of 604
ProxySG Command Line Interface Reference
See Also
n "# (config) security radius" on page 502
505 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security radius edit-realm realm_name
Subcommands
# (config radius realm_name) alternate-server encrypted-secret encrypted_secret
Specifies the alternate server secret in encrypted format. Note that you must create the encrypted secret before executing the
host [port] command.
Specifies the alternate server secret. Note that you must create the secret before executing the host [port] command
# (config radius realm_name) cookie {persistent {disable | enable} | verify-ip {disable | enable}
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
Specifies the amount of time a session can be inactive before being logged out.
Allows you to challenge the user after log out and define the log out page display time.
506 of 604
ProxySG Command Line Interface Reference
Allows you to use one-time passwords for authentication. The default is disabled.
Sets the refresh time for credential, rejected credentials cache, and surrogates.
Specifies the number of authentication retry attempts. This is the number of attempts permitted before marking a server offline.
The client maintains an average response time from the server; the retry interval is initially twice the average. If that retry
packet fails, then the next packet waits twice as long again. This increases until it reaches the timeout value. The default
number of retries is 10.
Enables/disables the forwarding of BASIC credentials of the authenticated user to the origin content server or for proxy
authentication. Flush the entries for a realm if the server-authentication value is changed to ensure that the server-
authentication value is immediately applied.
507 of 604
ProxySG Command Line Interface Reference
Tests the RADIUS configuration to ensure that the appliance can successfully authenticate a user in your RADIUS realm. If
the test succeeds, the CLI displays a list of groups to which the user belongs.
Specifies the RADIUS request timeout. This is the number of seconds the ProxySG appliance allows for each request attempt
before giving up on a server and trying another server. Within a timeout multiple packets can be sent to the server, in case the
network is busy and packets are lost. The default request timeout is 10 seconds.
Allows you to select the character set you need. A character set is a MIME charset name. Any of the standard charset names
for encodings commonly supported by Web browsers can be used. The default is Unicode:UTF8.
Specifies the virtual URL to use for this realm. If no URL is specified the global transparent proxy virtual URL is used.
Example
# (config) security radius edit-realm testradius
# (config radius testradius) server-retry 8
ok
# (config radius testradius) server-authentication proxy
ok
# (config radius testradius) exit
See Also
n "# (config) security radius" on page 502
508 of 604
ProxySG Command Line Interface Reference
n whether to verify the IP address of the client requesting against the original request
The storage options are global, applying to all form exceptions you use. The global allow redirects configuration option can be
overridden on a finer granularity in policy using the authenticate.redirect_stored_requests(yes|no) action.
Syntax
# (config) security request-storage {subcommands}
Subcommands
# (config) security request-storage allow-redirects {disable | enable}
Sets the amount of time before the stored request expires. The default is 300 seconds (five minutes).
Sets the maximum POST request size during authentication. The default is 50 megabytes.
Enables or disables the verify-ip option. The default is to enable the ProxySG appliance to verify the IP address against the
original request.
See Also
n "# (config) security authentication-forms" on page 443
509 of 604
ProxySG Command Line Interface Reference
n Identity providers (IDPs), which are identity stores. For example, an IDP may have a back-end directory of users.
Note: ADFS 1.0 ships with Windows Server 2008. If you want to use the SAML
realm with AD FS, you must download AD FS 2.0 from the Microsoft website and
install it.
o CA SiteMinder® R12
n Service providers (SPs), which provide access to applications or services to users. It is the entity against which users
authenticate. SGOS supports SAML authentication in which the ProxySG appliance acts as the SP.
Syntax
# (config) security saml {subcommand}
Subcommands
# (config) security saml attributes
Configures SAML attributes. Changes the prompt to "# (config saml attributes)" on page 512.
Creates a realm.
Edits the specified realm. Changes the prompt to "# (config saml realm_name)" on page 514.
510 of 604
ProxySG Command Line Interface Reference
Shows running system information for all SAML realms or the specified SAML realm.
Example
# (config) security saml view realm1
Realm name: realm1
Display name: realm1
Federated IDP entity ID:
Federated IDP POST URL:
Federated IDP Redirect URL:
Federated IDP CCL: appliance-ccl
...
See Also
n "# (config saml attributes)" on the next page
511 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security saml attributes
Subcommands
# (config saml attributes) add attribute_name
Edits the specified SAML attribute. Changes the prompt to "# (config saml attributes attribute_name)" on the facing page.
See Also
n "# (config) security saml" on page 510
512 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security saml attributes
Subcommands
# (config saml attributes attribute_name) data type {case-ignore-string | case-exact-string}
See Also
n "# (config) security saml" on page 510
513 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security saml edit-realm realm_name
Subcommands
# (config saml realm_name) authorization ignore-user-list {add | clear | remove}
Adds a username to a list of users to ignore when determining authorization, clear the list, or remove a username from the list.
Specifies whether to not authorize with the current realm, use a different realm for authorization, or authorize with the current
realm.
Specifies the username attribute on the search result object— either the FQDN or the LDAP attribute name.
Sets the username for authorization: Determine the username by LDAP search, use the user’s full username or FQDN, or
specify the username.
514 of 604
ProxySG Command Line Interface Reference
Specifies the attribute that represents the user's email address and retrieves the value of the attribute.
Note: Map the SAML email address attribute to the relevant field on the IDP. For example, if
your IDP is Shibboleth, map the emailAddress attribute to the mail field.
# (config saml realm_name) federated-idp {ccl ccl_name | entity-id entity_id | import-metadata URL |
slo-post-endpoint URL | sso-post-endpoint URL | sso-redirect-endpoint URL}
Configures the following settings for the IDP with which the realm is federated:
n the URL from which the IDP metadata is downloaded/imported; the URL is not stored, but it is used to import metadata
when the command is issued
Specifies the number of seconds a session can be inactive before it is logged out.
515 of 604
ProxySG Command Line Interface Reference
Disables or enables challenging after logout. For example, if this setting is enabled and a user logs out of a web site, the user
must enter credentials again the next time they access the web site.
Specifies the number of seconds to display the logout page after logging out.
Specifies a number of seconds after the current time, after which assertions are invalid. The default value is 20.
Specifies a number of seconds before the current time, before which assertions are invalid. The default value is 10.
Disables or enables the requirement that all incoming assertions are encrypted.
516 of 604
ProxySG Command Line Interface Reference
Example
> example
# example
# (config) example
See Also
n "# (config) security saml" on page 510
517 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security sequence {subcommands}
Subcommands
# (config) security sequence create-realm realm_name
Edits the specified realm. Changes the prompt to "# (config sequence realm_name)" on the facing page.
Example
# (config) security sequence edit-realm testsequence
# (config sequence testsequence) IWA-only-once disable
ok
# (config sequence testsequence) realm clear
ok
See Also
n "# (config sequence realm_name)" on the facing page
518 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security sequence edit-realm realm_sequence_name
Subcommands
# (config sequence realm_name) display-name display_name
Specifies whether or not to challenge for credentials for the IWA realm one or multiple times.
# (config sequence realm_name) realm {add | demote | promote | remove} {realm_name | clear}
Adds/demotes/promotes/removes a realm from the realm sequence, or clears all realms from the realm sequence.
Specifies that the next realm on the list should be attempted if authentication in the previous realm has failed with a permitted
error. The default value is to not attempt the next realm and fall out of the sequence.
Specifies the virtual URL to use for this realm sequence. If no URL is specified the global transparent proxy virtual URL is
used.
519 of 604
ProxySG Command Line Interface Reference
Example
See the example in "# (config security sequence)" on page 518.
See Also
n "# (config security sequence)" on page 518
520 of 604
ProxySG Command Line Interface Reference
Custom header and cookie response attributes associated with OnAuthAccept and OnAccessAccept attributes are obtained
from the policy server and forwarded to the ProxySG appliance. They can (as an option) be included in requests forwarded by
the appliance.
Within the ProxySG appliance, BCAAA acts as its agent to communicate with the SiteMinder server. The ProxySG appliance
provides the user information to be validated to BCAAA, and receives the session token and other information from BCAAA.
Each SiteMinder realm used causes the creation of a BCAAA process on the Windows host computer running BCAAA. A
single host computer can support multiple realms (from the same or different ProxySG appliances); the number depends on the
capacity of the BCAAA host computer and the amount of activity in the realms.
Note: Each (active) SiteMinder realm on the ProxySG appliance should reference a different
agent on the Policy Server.
Configuration of the ProxySG appliance’s realm must be coordinated with configuration of the SiteMinder policy server. Each
must be configured to be aware of the other. In addition, certain SiteMinder responses must be configured so that BCAAA gets
the information the ProxySG appliance needs.
Syntax
# (config) security siteminder {subcommand}
Subcommands
# (config) security siteminder create-realm realm_name
521 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security top-level-domains {subcommand}
Subcommands
# (config) security top-level-domains add-domain domain_name
Example
# (config) security top-level-domains add-domain domain1
ok
522 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security transparent-proxy-auth method {subcommand}
Subcommands
# (config) security transparent-proxy-auth method {ip | cookie}
Enables or disables meta-refresh style redirects with Internet Explorer. Some browsers have a hard-coded limit on the number
of server redirects that they follow for a given request. For example, if you are browsing a website that performs several
redirects, the redirects added by the ProxySG appliance authentication subsystem can exceed the browser’s limit. The end
result is that the browser will refuse to load the webpage, because it will not follow all of the redirects. You can use the
security transparent-proxy-auth meta-refresh enable command to allow the ProxySG appliance to perform redirects
for authentication without exceeding the browser’s limit. When this CLI setting is enabled, the ProxySG appliance redirects the
browser by sending an HTTP 200 response with a meta-refresh header, rather than by sending an HTTP 302 or 307 response.
Example
# (config) security transparent-proxy-auth method cookie
ok
523 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security windows-domains {subcommand}
Subcommands
# (config security windows-domains) create domain_name_alias
Edits the specified domain's SNMP trap settings. Changes the prompt to "# (config security windows-domains domain_name_
alias)" on page 526.
Enabled by default, this setting caches the group-name-to-SID mapping for each group of interest to prevent excessive delays
during policy compilation. If your deployment has a large number of trusted domains, leave this option enabled; a delay still
exists during initial policy compilation at boot time, but not during subsequent policy compilations.
524 of 604
ProxySG Command Line Interface Reference
Specifies the protocol over which to send an LDAP ping for domain controller discovery.
Enables or disables AD site awareness. By default, the setting is enabled. If disabled, a site name will not be returned for the
domain, even if one exists.
Specifies whether to use the SMB2 protocol for connecting to the Active Directory server. Disable this setting if the server still
uses the SMB1 protocol.
Example
#(config) security windows-domains
#(config security windows-domains) hostname HQ1
#(config security windows-domains) create cal
#(config security windows-domains) join cal corp.example.com administrator
testpass
See Also
n "# (config security windows-domains domain_name_alias)" on the next page
525 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security windows-domains edit domain_name_alias
Subcommands
# (config windows-domains domain_name_alias) snmp auth-traps [enable | disable]
Configures Average schannel latency last three minutes threshold (in milliseconds).
Configures Average schannel latency last five minutes threshold (in milliseconds).
526 of 604
ProxySG Command Line Interface Reference
527 of 604
ProxySG Command Line Interface Reference
Example
# (config windows-domains my_domain) snmp auth enable
ok
See Also
n "# (config security windows-domains)" on page 524
528 of 604
ProxySG Command Line Interface Reference
Syntax
> CLI {subcommand}
Subcommands
# (config) security windows-sso create-realm realm_name
Edits the specified realm. Changes the prompt to "# (config windows-sso realm_name)" on the next page.
Displays the configuration of the specified realm or all Windows SSO realms.
See Also
n "# (config windows-sso realm_name)" on the next page
529 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security windows-sso edit-realm realm_name
Subcommands
# (config windows-sso realm_name) alternate-agent {host hostname | port port_number}
Specifies or clears the realm name, which can be self, and username for authorization
# (config windows-sso realm_name) cookie {persistent {disable | enable}| verify-ip {disable | enable}}
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
Specifies the amount of time a session can be inactive before being logged out.
530 of 604
ProxySG Command Line Interface Reference
Enables or disables SSL between the ProxySG appliance and the BCAAA service.
Selects the method of querying: client, domain controller, or both. The default is domain controller.
Tests the Windows SSO and BCAAA configuration to ensure that the ProxySG appliance can successfully map an IP address
to a user in your Active Directory.
The time allotted for each request attempt. The default is 60 seconds.
Specifies the virtual URL to use for this realm. If no URL is specified the global transparent proxy virtual URL is used.
Example
# (config windows-sso test2) ssotype query-client-dc
ok
See Also
n "# (config) security windows-sso" on page 529
531 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security username {subcommand}
Subcommands
# (config) security username username
Example
# (config) security username QATest
ok
532 of 604
ProxySG Command Line Interface Reference
The XML messages are based on SOAP 1.2. The XML responder service accepts XML requests from the ProxySG appliance,
communicates with an authentication or authorization server, and responds with the result. When the realm is used to
authenticate users, it challenges for Basic credentials. The username and password are then sent to the XML responder to
authenticate and authorize the user.
The XML realm can place the username and password in the HTTP headers of the request or in the body of the XML POST
request. If the credentials are placed in the HTTP headers, the Web server must do the authentication and the XML service
just handles authorization. If credentials are placed in the XML request body, the XML service handles both authentication and
authorization.
Syntax
# (config) security xml {subcommand}
Subcommands
# (config) security xml create-realm realm_name
Edits the specified realm. Changes the prompt to "# (config xml realm_name)" on the next page.
See Also
n "# (config xml realm_name)" on the next page
533 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) security xml edit [realm_name]
Subcommands
# (config xml realm_name) alternate-responder {host | port}
Specifies the alternate responder path for authentication and authorization requests.
Specifies the default group name, username, and realm for authorization.
# (config xml realm_name) cookie {persistent {enable | disable} | verify-ip {enable | disable}
Specifies whether to enable persistent or session cookies, and whether to verify the IP address of the cookie.
Specifies the amount of time a session can be inactive before being logged out.
534 of 604
ProxySG Command Line Interface Reference
Allows you to challenge the user after log out and define the log out page display time.
Allows you to use one-time passwords for authentication. The default is disabled.
Specifies the primary responder path for authentication and authorization requests.
Sets the refresh time for authorization, credential, rejected credentials cache, and surrogates.
Specifies the number of times for the system to retry a request. The default is not to retry a request.
Enables/disables the forwarding of BASIC credentials of the authenticated user to the origin content server or for proxy
authentication. Flush the entries for a realm if the server-authentication value is changed to ensure that the server-
authentication value is immediately applied.
535 of 604
ProxySG Command Line Interface Reference
Specifies the XML request timeout. This is the number of seconds the ProxySG appliance allows for each request attempt
before giving up on a server and trying another server. Within a timeout multiple packets can be sent to the server, in case the
network is busy and packets are lost. The default request timeout is 10 seconds
Specifies the virtual URL to use for this realm. If no URL is specified the global transparent proxy virtual URL is used.
# (config xml realm_name) xml {credentials {header | request} | request-interested {enable | disable}
| username username_parameter}
Specifies the user credential location and the username parameter. The username parameter is passed in the request when
this realm is used for authentication or authorization.
Example
# (config) security xml edit-realm xml14
# (config xml xml14) display-name
ok
# (config xml xml14) server-authentication origin
ok
See Also
n "# (config) security xml" on page 533
536 of 604
ProxySG Command Line Interface Reference
# (config users)
Synopsis
Manage user log ins, logouts and refresh data.
Syntax
# (config) security users
# (config users)
Subcommands
# (config users) authorization-refresh {ip-addresses prefix [realm_name] | realms [realm_name]| users
glob_user_name [realm_name]}
Refreshes authorization data for the specified IP address, realm (or all realms), or user.
n '[x-y]': match any character in the character range from 'x' to 'y'
Refreshes credential data for the specified IP address, realm (or all realms), or user.
# (config users) log-out {ip-addresses prefix [realm_name] | realms [realm_name] | users glob_user_
name [realm_name]}
Logs out the specified IP address, realm (or all realms), or user.
537 of 604
ProxySG Command Line Interface Reference
Refreshes surrogate data for the specified IP address, realm (or all realms), or user.
# (config users) view detailed {ip-addresses prefix [realm_name] | realms [realm_name] | users glob_
user_name [realm_name]}
# (config users) view {ip-addresses prefix [realm_name] | realms [realm_name] | users glob_user_name
[realm_name]}
Example
# (config) security users
# (config users) surrogates-refresh ip-addresses 10.25.36.0/24
See Also
n "# (config) security" on page 436
538 of 604
ProxySG Command Line Interface Reference
# (config) security-policy
Synopsis
Configure Security Policy service settings.
Syntax
# (config) security-policy
# (config security-policy)
Subcommands
# (config security-policy) disable
Downloads the latest data. The CLI displays the download progress and status. If the database is already up-to-date, the
appliance does not download it again. To cancel the download in progress, press and hold CTRL+C.
Downloads the latest data in the background. You can continue to use the CLI while the download is in progress. If the
database is already up-to-date, the appliance does not download it again.
Ignore any existing data (even if the database is already up-to-date) and force a fresh download of the entire database. The
download occurs in the background, and you can continue to use the CLI while download is in progress.
Ignores any existing data (even if the database is already up-to-date) and force a fresh download of the entire database. To
cancel the download, press and hold CTRL+C.
539 of 604
ProxySG Command Line Interface Reference
Example
# (config) security-policy
# (config security-policy) download get-now
This may take a few minutes. Please wait...
downloading database..
See Also
n “Configuring Threat Protection” chapter in SGOS Administration Guide
540 of 604
ProxySG Command Line Interface Reference
# (config serial-console)
Synopsis
Configure the serial console.
Syntax
# (config) serial-console
# (config serial-console)
Subcommands
# (config serial-console) inline pre-authentication-terms terms EOF
541 of 604
ProxySG Command Line Interface Reference
# (config) show
See "# show" on page 97.
# (config ssh-client)
Synopsis
Configure ciphers, client keys, HMACs, and known hosts for outbound SSH connections. Also, view all SSH client
information.
Syntax
# (config) ssh-client
# (config ssh-client)
Subcommands
# (config ssh-client) ciphers
Manage SSH client ciphers. Changes the prompt to "# (config ssh-client ciphers)" on the facing page.
Manage SSH client keys. Changes the prompt to "# (config ssh-client client-keys)" on page 545.
Manage SSH client HMACs. Changes the prompt to "# (config ssh-client hmacs)" on page 546.
Manage SSH client known hosts. Changes the prompt to "# (config ssh-client known-hosts)" on page 548.
View all SSH client information. See "# (config ssh-client) view" on page 550.
542 of 604
ProxySG Command Line Interface Reference
As a best practice, make sure that the remote SSH server and the appliance share at least one cipher in common.
Syntax
# (config) ssh-client
# (config ssh-client)
# (config ssh-client) ciphers
Subcommands
# (config ssh-client ciphers) add cipher_name [ordinal_position]
Adds a new SSH cipher to the current list. The cipher-name must be one of the names listed under choices in the view output.
The optional ordinal-position argument puts the cipher at that position in the list. Without the ordinal_position argument, the
cipher is added to the end of the list. Using the ordinal-position argument avoids needing to use the promote command to put
the addition at a position other than the end of the list. The ciphers you add here are added to the current list.
Demotes the specified SSH cipher to a position lower in the current cipher list. The shift_value is the number of positions to
move the cipher on the list; if a shift_value isn’t specified, the cipher is demoted one position. Demoting a cipher puts it lower
on the list, making it less preferred than the ciphers higher on the list. The appliance “hints” the preferred selection of the
ciphers by the order of the list.
Promotes the specified SSH cipher to a position higher in the current cipher list. Promoting a cipher puts it higher on the list,
making it more preferred than the ciphers lower on the list.
Removes an SSH cipher from the current list. The cipher_name must be one of the names listed under current in the view
output.
Resets the current SSH ciphers selection to the default set of ciphers; use the view command to see the default cipher list.
543 of 604
ProxySG Command Line Interface Reference
Sets the list of SSH ciphers in the specified order, where cipher_list is a comma-separated list. If you have a long list of
ciphers, specifying the order of the ciphers in a single command can be easier then promoting or demoting individual ciphers.
Names in the cipher_list must be available under choices in the view output. The ciphers you set here replace the current list.
Displays the currently selected SSH ciphers, the default set of ciphers, and the available choices of ciphers. Fewer ciphers are
available or selected if the appliance is in FIPS mode.
Note: The event log indicates when any ciphers are added or removed.
544 of 604
ProxySG Command Line Interface Reference
n Ed25519
When you use the create or inline subcommand, you create a SSH client key pair: the public key is shared with the remote
SSH server, and the private key is stored on the ProxySG appliance. You can create no more than one key of each type. If you
attempt to create more than one key of a type, you receive the error % Key of this type already exists.
Syntax
# (config) ssh-client
# (config ssh-client)
# (config ssh-client) client-keys
Subcommands
# (config ssh-client client-keys) create ecdsa {nistp256 | nistp384 | nistp521}
Creates a ECDSA key with the specified curve. The keys are stored in the SSH keyring.
Creates an Ed25519 key. The keys are stored in the SSH keyring.
Creates a RSA key with the specified bit size. The keys are stored in the SSH keyring.
545 of 604
ProxySG Command Line Interface Reference
Imports a private key of the specified type. The import format can be PEM (PKCS1), PKCS8, or the OpenSSH format. The
keys are stored in the SSH keyring.
If the private key is encrypted and the appliance is not in FIPS mode, you must specify the passphrase parameter; otherwise,
the #(config) security private-key-display passphrase value is used. If that passphrase was not set earlier
in the current terminal session, the CLI prompts you for a passphrase after you enter the private key and EOF marker.
Displays configured private keys, or the specified type of private key, in the OpenSSH format. You must enter a passphrase
that consists of at least eight characters. The passphrase will be used to encrypt the view output.
Displays all configured public keys, or only the specified key type.
Example
# (config ssh-client client-keys) view
E5y79mZbroKHMZK1zHHSrS/oT3kNAGVsiHtT2fizntcWP0B+iKQoqu9y+EXRjkmSo88fs/SEl+qOwW+wML3kziR2GcHv8hShIE/ju6
n+i9HJo2zGSj9SBfRBjdYydvC/rNL+0r8ebAAfk0jbuVaG9aNK+C6DPZgVcKbp2m4kQEpT+pU+R5euXbHO8EaVzMECVF14wZoGxwv0
HqYh2Mo5ktvfkFqh4LxNHCQ3TXL7P0/tD9gr5ebQ9oEP3q+scWR3lD3EV0Rgkl7ucyHqpg4126T1GPNzI9BT+41fz/uK7uej
Syntax
# (config) ssh-client
546 of 604
ProxySG Command Line Interface Reference
# (config ssh-client)
# (config ssh-client) hmacs
Subcommands
# (config ssh-client hmacs) add hmac_name [ordinal_position]
Adds a new SSH HMAC algorithm to the current list. The hmac-name must be one of the names listed under choices in the
view output. The optional ordinal_position argument will place the HMAC at that position in the list. Without the ordinal-position
argument, the HMAC will be added to the end of the list. Using the ordinal_position argument avoids needing to use the
promote command to put the addition at a position other than the end of the list.
Demotes the specified SSH HMAC algorithm to a position lower in the current HMAC list. The shift-value is the number of
positions to move the HMAC on the list; if a shift_value isn’t specified, the HMAC is demoted one position. Demoting an
HMAC puts it lower on the list, making it less preferred than the HMACs higher on the list. The appliance “hints” the preferred
selection of the HMACs by the order of the list.
Promotes the specified SSH HMAC algorithm to a position higher in the current HMAC list. Promoting an HMAC places it
higher on the list, making it more preferred than the HMACs lower on the list.
Removes an SSH HMAC algorithm from the current list. The hmac_name must be one of the names listed under current in the
view output.
Resets current SSH HMAC list to the default set of HMAC algorithms; use the view command to see the default HMAC list.
Sets list of SSH HMAC algorithms in the specified order, where hmac_list is a comma-separated list.. If you have a long list of
HMACs, specifying the order of the algorithms in a single command can be easier then promoting or demoting individual
HMACs. Names in the hmac_list must be available under choices in the view output.
Displays the SSH HMAC algorithms currently configured, the default set of HMAC algorithms, and the available choices of
HMAC algorithms. Fewer HMACs are selected or available if the appliance is in FIPS mode.
547 of 604
ProxySG Command Line Interface Reference
Note: The event log indicates when any HMACs are added or removed.
Syntax
# (config) ssh-client
# (config ssh-client)
# (config ssh-client) known-hosts
Subcommands
# (config ssh-client known-hosts) add "host_key_entry"
Adds a known host entry. When you add a new entry, it is:
n Assigned an ID number. For example, the first entry you add is assigned ID 1.
n Appended to the end of the known hosts list. For example, if you add a second entry, it is assigned ID 2.
Because the host_key_entry includes spaces, enclose it within quotation marks for the CLI to accept it as a single entry.
Note: Add host key entries in the following format: marker comma_separated_list_of_
host_pattern(s) key_type key #comment If the entry does not comply with this format,
fields might contain incorrect values or be empty. The marker is optional, but if specified it must
be @revoked or @cert-authority. The comment is optional but helpful for identifying hosts. In
addition, the following example shows abbreviated host keys. When you specify host keys in
CLI commands on a production appliance, you must include keys in their entirety.
Clears all entries from the known hosts list and resets the ID counter.
548 of 604
ProxySG Command Line Interface Reference
n ID_number : Specifies the ID number of the entry to remove. To determine the ID number for an existing known host
entry, issue the view command.
n complete_matching_line : Specifies the complete entry to remove. The line must match; partial string matches do not
remove any hosts.
When you use the # (config ssh-client known-hosts) remove command, its ID number is not reassigned to subsequent
additions or entries that are lower on the list. Refer to the Example section for details.
Obtain keys from a remote host. Specify either the hostname or IP address, and a port number. If you do not specify a port, the
default 22 is used. Specify force to add the host key without the CLI prompting you for confirmation.
Displays the known hosts list. If no entries have been added, or if the list was cleared, the CLI responds Known hosts file
is empty. Specifying a regex pattern displays a filtered view of the known hosts list based on the specified regular
expression.
n To enter regex that includes a backslash, use an escaping backslash. For example, to match on decimal characters
using \d, type \\d.
Examples
Display all host key entries stored on the appliance:
Remove the entry with the revoked certificate and verify it is removed. Note that the ID counter is not reset:
549 of 604
ProxySG Command Line Interface Reference
Add an entry with a valid certificate and verify it is added. Note that the new entry is appended to the list:
Add known host entries and verify that they are added. Note that the ID counter is reset:
Syntax
# (config) ssh-client
550 of 604
ProxySG Command Line Interface Reference
# (config ssh-client)
# (config ssh-client) view {subcommands}
Subcommands
# (config ssh-client) view ciphers
551 of 604
ProxySG Command Line Interface Reference
# (config) ssh-console
Synopsis
Configures the SSH host and client keys. This CLI command also sets global options, such as the welcome banner for all
SSH Consoles on the system.
To create and edit additional SSH console services, see "# (config ssh_console)" on page 357.
Syntax
# (config) ssh-console
# (config ssh-console)
Subcommands
# (config ssh-console) ciphers
Creates an SSHv2 host key pair with an RSA key of the specified bit size for the SSH console, whether or not rsa is specified.
If no bit size is specified, the default size of 2048 bits is used.
Creates an SSHv2 host key pair with an ECSDSA key with the specified curve for the SSH console. If no curve is specified,
nist521 is used.
Creates an SSHv2 host key pair with an Ed25519 key for the SSH console.
Deletes the client key with the specified username and key ID.
Deletes all host key pairs. If you delete all host key pairs using this command, you will be unable to log in to the ProxySG via
SSH again (the current SSH session is unaffected). To access the appliance via SSH again, create a host key pair using the
Management Console (Configuration > Authentication > SSH Inbound Connections).
552 of 604
ProxySG Command Line Interface Reference
Deletes the specified SSHv2 host key pair. If the key type is not specifed, all SSHv2 host keys are deleted.
Manages SSH HMAC (Hash-based Message Authentication Code) algorithms. See "# (config ssh-console) hmacs" on
page 557.
Resets current SSH host key algorithm list to the default. The default list is available in the view output.
Sets list of SSH host key algorithms in the specified order, where host_key_algorithms_list is a comma-separated list. Names
in the list must be available under choices in the view output.
Displays the SSH host key algorithms currently configured, the default set of algorithms, and the available choices of
algorithms. Fewer algorithms are selected or available if the appliance is in FIPS mode. (true?)
Add the specified client keys, host keys, or banner for those logging to the ProxySG appliance using SSHv2.
You cannot specify a passphrase in the host-key commands while the appliance is in FIPS mode. You can specify a
passphrase if the appliance is not in FIPS mode and the key being added is encrypted. If the appliance is in FIPS mode and a
passphrase was specified previously, users are prompted for the passphrase; for best security, the CLI does not display the
password when entered.
Resets current SSH key exchange algorithm list to the default. The default list is available in the view output.
553 of 604
ProxySG Command Line Interface Reference
Sets list of SSH key exchange algorithms in the specified order, where key_exchange_algorithms_list is a comma-
separated list. Names in the list must be available under choices in the view output.
Displays the SSH key exchange algorithms currently configured, the default set of algorithms, and the available choices of
algorithms. Fewer algorithms are selected or available if the appliance is in FIPS mode. (true?)
# (config ssh-console) view {client-key {bubblebabble username [key_id]| hex username [key_id] |
randomart username [key_id]} | director-client-key | management-center-client-key | host-public-key
[sshv2 [ecdsa | ec25519 | rsa]]| user-list | versions-enabled}
Example
# (config ssh-console) view versions-enabled
SSHv2 is enabled.
See Also
n "# (config ssh_console)" on page 357
554 of 604
ProxySG Command Line Interface Reference
After an upgrade or downgrade, the current list of ciphers —as shown in view subcommand output—may change. If you modify
the current list using the add, remove, and set subcommands, the changes persist after system upgrades, downgrades, and
reboots; however, the current list will not be identical to the list prior to upgrade/downgrade if the system must consider
deprecated ciphers. To understand the behavior after upgrade/downgrade:
n Ciphers that were previously added explicitly (using the add subcommand) are added to the current list if they are
supported after upgrade/downgrade. They are not added if they are deprecated in the current version.
n Ciphers that were previously removed explicitly (using the remove subcommand) are removed from the current list even
if they are supported in the current version.
n Ciphers that were neither added nor removed explicitly are added to the current list if supported in the current version
and removed from the list if deprecated. If you upgrade to a release that supports only ciphers that you previously
removed, resulting in an empty current list, the appliance warns you that the list is empty and event-logs the
occurrence.
For example, if you upgrade to a version of SGOS in which an added cipher is deprecated, the cipher is removed from the
current list. Downgrading to the previous SGOS version adds the cipher back to the current list.
Note: The event log indicates when any ciphers are added or removed.
Syntax
# (config) ssh-console
# (config ssh-console)
Subcommands
# (config ssh-console) ciphers add cipher_name [ordinal-position]
Adds a new SSH cipher to the current list. The cipher_name must be one of the names listed under choices in the ciphers
view output. The optional ordinal-position argument puts the cipher at that position in the list. Without the ordinal-
position argument, the cipher is added to the end of the list. The ciphers you add here are appended to the current list.
555 of 604
ProxySG Command Line Interface Reference
Removes an SSH cipher from the current list. The cipher_name must be one of the names listed under current in the ciphers
view output.
Resets the current SSH ciphers selection to the default set of ciphers; use the ciphers view command to see the default cipher
list.
Sets the list of SSH ciphers in the specified order, where cipher_list is a comma-separated list. Names in the cipher_list must
be one of the names listed under choices in the ciphers view output. The ciphers you set here replace the current list.
Displays the currently selected SSH ciphers, the default set of ciphers, and the available choices of ciphers. Fewer ciphers are
available or selected if the appliance is in FIPS mode.
Example
# (config ssh-console) ciphers view
current: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr, aes128-ctr
default: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr, aes128-ctr
choices: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr, aes128-ctr, rijndael-
cbc@lysator.liu.se,arcfour256,arcfour128,arcfour,cast128-cbc, blowfish-cbc,aes256-cbc,aes192-cbc,3des-
cbc,aes128-cbc
See Also
n FIPS Mode WebGuide
556 of 604
ProxySG Command Line Interface Reference
After an upgrade or downgrade, the current list of HMACs —as shown in view subcommand output—may change. If you modify
the current list using the add, remove, and set subcommands, the changes persist after system upgrades, downgrades, and
reboots; however, the current list will not be identical to the list prior to upgrade/downgrade if the system must consider
deprecated HMACs. To understand the behavior after upgrade/downgrade:
n HMACs that were previously added explicitly (using the add subcommand) are added to the current list if they are
supported after upgrade/downgrade. They are not added if they are deprecated in the current version.
n HMACs that were previously removed explicitly (using the remove subcommand) are removed from the current list
even if they are supported in the current version.
n HMACs that were neither added nor removed explicitly are added to the current list if supported in the current version
and removed from the list if deprecated.
n If you upgrade to a release that supports only HMACs that you previously removed, resulting in an empty current list,
the appliance warns you that the list is empty and event-logs the occurrence.
For example, if you upgrade to a version of SGOS in which an added HMAC is deprecated, the HMAC is removed from the
current list. Downgrading to the previous SGOS version adds the HMAC back to the current list.
Note: The event log indicates when any HMACs are added or removed.
Syntax
# (config) ssh-console
# (config ssh-console)
Subcommands
# (config ssh-console) hmacs add hmac_name [ordinal-position]
Adds a new SSH HMAC algorithm to the current list. The hmac_name must be one of the names listed under choices in the
hmacs view output. The optional ordinal-position argument will place the HMAC at that position in the list. Without the
ordinal-position argument, the HMAC will be added to the end of the list. Using the ordinal-position argument avoids
needing to use the promote command to put the addition at a position other than the end of the list.
557 of 604
ProxySG Command Line Interface Reference
Removes an SSH HMAC algorithm from the current list. The hmac_name must be one of the names listed under current in the
hmacs view output.
Resets current SSH HMAC list to the default set of HMAC algorithms; use the hmacs view command to see the default
HMAC list.
Sets the list of SSH HMACs in the specified order, where hmac_list is a comma-separated list. Names in the hmac_list must
be available under choices in the hmacs view output.
Displays the SSH HMAC algorithms currently configured, the default set of HMAC algorithms, and the available choices of
HMAC algorithms. Fewer HMACs are selected or available if the appliance is in FIPS mode.
Example
# (config ssh-console) hmacs view
current: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-
128-etm@openssh.com,umac-64-etm@openssh.com,umac-128@openssh.com,umac-64@openssh.com,hmac-sha2-
512,hmac-sha2-256,hmac-sha1
default: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-
128-etm@openssh.com,umac-64-etm@openssh.com,umac-128@openssh.com,umac-64@openssh.com,hmac-sha2-
512,hmac-sha2-256,hmac-sha1
choices: hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com, hmac-sha1-etm@openssh.com,umac-
128-etm@openssh.com,umac-64-etm@openssh.com,umac-128@openssh.com,umac-64@openssh.com,hmac-sha2-
512,hmac-sha2-256,hmac-sha1,hmac-md5-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-
etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-
sha1-96,hmac-md5-96
See Also
n FIPS Mode WebGuide
558 of 604
ProxySG Command Line Interface Reference
# (config) ssl
Synopsis
Use this command to configure HTTPS termination, including managing certificates, both self-signed and those from a
Certificate Signing Authority (CSA).
n Configure a keyring
Note: You must use a serial or SSH connection to execute these commands.
Syntax
# (config) ssl
Subcommands
# (config ssl) ccr-renegotiation-list {clear | max-entries number | view}
n max-entries number: Specifies the maximum number of entries allowed in the list. The maximum value is 10000, the
minimum is 0, and the default is 1000.
Creates a certificate. The CLI prompts you to enter values for the following attributes:
559 of 604
ProxySG Command Line Interface Reference
n city name/locality
n organization name
n organization unit
n common name
n email address
n challenge password
n company name
n digest type
Press ENTER to specify no value. Default values are in square brackets [].
# (config ssl) create fips {ccl list_name | keyring {no-show keyring_id [key_length] | show keyring_id
[key_length] | show-director keyring_id [key_length]} | ssl-device-profile device_profile_name
[keyring]}
Note: Version 7.2 does not support FIPS mode. See the Release Notes for information.
Creates an HSM. The device profile is the client certificate belonging to the appliance; the HSM uses this certificate to
authenticate the appliance.
Creates an HSM keygroup in the same namespace as an HSM keyring. Membership may only be HSM keyrings.
560 of 604
ProxySG Command Line Interface Reference
n show: Keyrings created with this attribute are displayed in the show configuration output, meaning that the keyring can
be included as part of a profile or overlay pushed by Director.
n show-director: Keyrings created with this attribute are part of the show configuration output if the CLI connection is
secure (SSH/RSA) and the command is issued from Director.
n no-show: Keyrings created with this attribute are not displayed in the show configuration output and cannot be part of a
profile. The no-show option is provided as additional security for environments where the keys will never be used
outside of the particular ProxySG appliance.
Creates a certificate signing request (CSR). The CLI prompts you to enter values for the following attributes:
n city name/locality
n organization name
n organization unit
n common name
n email address
n challenge password
n company name
n digest type
Press ENTER to specify no value. Default values are in square brackets [].
561 of 604
ProxySG Command Line Interface Reference
Note: You must associate the CSR with a keyring and a digest.
You can create a CSR in one of two ways: interactively or non-interactively.
The default digest is SHA256.
Director uses non-interactive commands in profiles and overlays to create CSRs.
Associates the SSL client with a keyring. Only the default is permitted.
Deletes an existing HSM device. It is an error to delete an HSM if keyrings reference it.
Deletes an existing HSM keyring. It is an error to remove a keyring that is assigned to a keygroup unless the force keyword is
present. If the force keyword is present, all references to the keyring will be removed from any keygroup which references it. It
is an error to remove a keyring if it is referenced in policy or configuration outside of keygroups.
Deletes the specified keylist. Keyrings associated with the keylist are not deleted. If the keylist is used in policy, the keylist
cannot be deleted and generates an error.
562 of 604
ProxySG Command Line Interface Reference
Deletes a keyring. The force option removes the keyring from all keylists using the keyring, and then deletes the keyring.
Edits the specified CCL. Changes the prompt to "# (config ssl ccl list_name)" on page 571.
Edits the specified CRL. Changes the prompt to"# (config ssl crl list_name)" on page 572.
Edits the specified HSM. Changes the prompt to "# (config ssl hsm name)" on page 573.
Edits the specified HSM keygroup. Changes the prompt to "# (config ssl hsm-keygroup name)" on page 574. The keygroup
name “verbose” is reserved for future expansion.
Enables you to configure the keylist parameters; changes the prompt to "# (config ssl keylist keylist_id)" on page 584.
Edits the specified SSL device profile. Changes the prompt to "# (config device-profile profile_name) " on page 569.
Edits the default SSL client. Changes the prompt to "# (config ssl ssl-client ssl_client_name)" on page 582.
Enabling this makes the appliance perform strict secure renegotiation only for all SSL connections.
563 of 604
ProxySG Command Line Interface Reference
Note: By default this feature is disabled. If this feature is enabled, all secure communications
with Symantec servers will fail. If you enable this setting, the ProxySG appliance performs
strict secure renegotiation only for all SSL connections.
Note: Using the inline certificate command, you can associate a certificate chain with a
keyring. You must paste all associated intermediate certificates after the server certificate. The
maximum character count for importing a certificate chain and associating it with a keyring is
7999.
# (config ssl) inline fips keyring {no-show keyring_id [password | "" eof_marker | show keyring_id
[password | "" eof_marker | show-director keyring_id [password | "" eof_marker}
Installs a FIPS compliant keyring with unshowable, showable, or director showable key pairs.
Adds an HSM keyring. The certificate chain for the key is entered inline. A test sign operation will be performed to make sure
that the key matches the certificate chain and all certificates will be checked to make sure that their CA flag is set. For
example:
564 of 604
ProxySG Command Line Interface Reference
The keyring must have the same key label as that known by the HSM. In the example, hsmlabel is used. When the appliance
sees the indicated eof tag, it will cease processing, and present the data.
Imports a keylist. Each keyring ID must be listed on independent lines. If a keylist with the same name already exists, it will be
replaced with the new information.
# (config ssl) inline keyring {show | show-director | no-show} keyring_id [password] eof
n show: Private keys associated with keyrings created with this attribute can be displayed in the CLI or included as part of
a profile or overlay pushed by Director.
n show-director: Keyrings created with this attribute are part of the show configuration output if the CLI connection is
secure (SSH/RSA) and the command is issued from Director.
n no-show: Keyrings created with this attribute are not displayed in the show configuration output and cannot be part of a
profile. The no-show option is provided as additional security for environments where the keys will never be used
outside of the particular ProxySG appliance.
n password: The password for the keyring. eof: End-of-file marker. This can be anything, as long as it doesn’t also appear
in the inline text. (If the eof appears in the inline text, the inline command completes at that point.)
Configures the intermediate certificate cache. Changes the prompt to"# (config ssl icc)" on page 575.
Configures OCSP. Changes the prompt to"# (config ssl oscp)" on page 577.
Specifies the CCL to be used for the client. The default is all.
565 of 604
ProxySG Command Line Interface Reference
After verifying SafeNet Java HSM connectivity, you must add the issuer keyring to the HSM keyring,
Enables or disables the sending of OCSP stapled responses from the ProxySG SSL forward proxy. The default value is
enable.
When this feature is enabled, if an OCS presents a certificate to the ProxySG appliance that is not signed by a trusted
Certificate Authority (CA), the ProxySG appliance presents the browser with a certificate that is signed by its untrusted issuer
keyring. A warning message is displayed to the user, and they can decide to ignore the warning and visit the website or cancel
the request. The default value is disable.
Specifies the CCL to be used for the server. The default is browser-trusted.
Specifies the keyring used for signing emulated server certificates when preserving an untrusted OCS certificate. The default
value is default-untrusted.
566 of 604
ProxySG Command Line Interface Reference
Verify that the HSM keyring that has been generated on the SafeNet Java HSM can successfully communicate with the
appliance. If the HSM keyring is not accepted, use the error code to determine the cause, and verify that it has been properly
added.
Show HSM device(s); shows status, including uptime, downtime, and so on.
Lists configured HSM keygroup(s); also shows status (included for each key in the group).
Lists configured HSM key(s); also shows status (including uptime, downtime, and so on).
Displays the keypair. To view the keypair in an encrypted format, specify aes128-cbc or aes128-cbc before the keyringID. You
are then prompted for the challenge entered when the keyring was created.
n keyring_id: Displays the certificate subject, serial number, issuer, and all keylists that the specified keyring is a
member of.
567 of 604
ProxySG Command Line Interface Reference
n unreferenced: Lists all the keyrings that are not referenced anywhere else in the configuration or in policy.
To display all keyrings with expired certificates, use # (config ssl) view keyring expiring-in 0.
Displays a summary for all CA-certificate or external-certificate commands, or for the certificate name specified.
Example
# (config) ssl
# (config ssl) create certificate keyring-id cn bluecoat challenge test c US state CA company bluecoat
digest sha256
See Also
n "# (config ssl ssl-client ssl_client_name)" on page 582
568 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) ssl
# (config ssl)
# (config ssl) edit ssl-device-profile profile_name
Subcommands
# (config ssl device-profile profile_name) ccl {ccl_name | all}
Associates the specified cipher suite(s) with the current SSL device profile. Pressing ENTER without specifying cipher suites
displays a list of available ciphers and a prompt to select ciphers.
You can use interactive mode or non-interactive mode. Interactive mode does not support specifying cipher suites. Symantec
Director uses non-interactive commands in profiles and overlays to create cipher suites.
If specifying cipher suites, type them in a space-separated list such as AES128-GCM-SHA256 DHE-DSS-AES256-SHA256.
Refer to TECH247556 for an overview of cipher suites shipped with the appliance:
http://www.symantec.com/docs/TECH247556
569 of 604
ProxySG Command Line Interface Reference
Configures SSL client protocol version or versions. Changing the SSL protocol version or versions will reset the list of available
cipher suites.
Example
# (config device-profile test1) view
Name: test1
Usable for: client
Keyring:
CCL: browser-trusted
Device-id: $(subject.CN)
Cipher suite: tls_aes_256_gcm_sha384 tls_chacha20_poly1305_sha256 tls_aes_128_gcm_sha256 tls_aes_128_
ccm_8_sha256 tls_aes_128_ccm_sha256 ecdhe-rsa-aes256-sha384 ecdhe-rsa-aes128-sha256 ecdhe-rsa-aes256-
gcm-sha384 ecdhe-rsa-aes128-gcm-sha256 ecdhe-rsa-aes128-sha ecdhe-rsa-aes256-sha aes128-sha256 aes256-
sha256 aes128-gcm-sha256 aes256-gcm-sha384 aes128-sha aes256-sha dhe-rsa-aes128-sha dhe-rsa-aes256-sha
dhe-rsa-aes128-gcm-sha256 dhe-rsa-aes256-gcm-sha384
Protocol: tlsv1.1 tlsv1.2 tlsv1.3
Verify-peer: enabled
See Also
n "# (config) ssl" on page 559
570 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) ssl
# (config ssl)
# (config ssl) edit ccl list_name
Subcommands
# (config ssl ccl list_name) add ca_certificate_name
Adds a CA certificate to this list. (The CA certificate must first be imported in "# (config) ssl" on page 559 mode.)
Example
# (config) ssl
# (config ssl) edit ccl list1
# (config ssl ccl list1) add CACert1
ok
See Also
n "# (config) ssl" on page 559
571 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) ssl
# (config ssl)
# (config ssl) edit ccl list_name
Subcommands
# (config ssl crl list_name) exit
Specifies the network path to download the specified Certificate Revocation List.
Example
# (config) ssl
# (config ssl) edit ccl list1
# (config ssl ccl list1) add CACert1
ok
See Also
n "# (config) ssl" on page 559
572 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) ssl
# (config ssl)
# (config ssl) edit hsm name
Subcommands
# (config ssl hsm name) device-profile profile
Example
# (config ssl) edit hsm test
# (config ssl hsm test) device-profile default
ok
See Also
n "# (config) ssl" on page 559
573 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) ssl
# (config ssl)
# (config ssl) edit hsm name
Subcommands
# (config ssl hsm-keygroup name) add keyring_name
Adds a keyring to the keygroup. You cannot add the same keyring more than once or add an hsm-keygroup, “regular” keyring,
or “regular” keylist to the keygroup.
Example
# (config ssl) edit hsm test
# (config ssl hsm test) device-profile default
ok
See Also
n "# (config) ssl" on page 559
574 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) ssl
# (config ssl)
# (config ssl) intermediate-cert-cache
Subcommands
# (config ssl icc) clear-cache
Clears the intermediate CA certificates that are currently stored on the appliance.
Simultaneously disables the caching of intermediate CA certificates and clears the existing cache on the ProxySG appliance.
Display details about the certificates that have been cached on the appliance.
Displays the current status of the intermediate certificate cache, including usage statistics and the number of stored
intermediate CA certificates.
Example
# (config) ssl
# (config ssl) intermediate-cert-cache
# (config ssl icc) enable
575 of 604
ProxySG Command Line Interface Reference
ok
# (config ssl icc) view status
Intermediate Certificate
Caching: enabled
Number of cached certificates: 4
Number of new certificates: 2
Number of cache hits: 14
# (config ssl icc) clear-cache
ok
See Also
n "# (config) ssl" on page 559
576 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) ssl
# (config ssl)
# (config ssl) oscp
Subcommands
# (config ssl ocsp) create responder_name
Edits the specified responder. Changes the prompt to "# (config ocsp responder_name)" on page 579.
577 of 604
ProxySG Command Line Interface Reference
Example
See the example for "# (config ocsp responder_name)" on the facing page.
See Also
n "# (config) ssl" on page 559
578 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) ssl
# (config ssl)
# (config ssl) oscp
Subcommands
# (config ocsp responder_name) exit
Enables or disables use of a nonce control in an OCSP request. When enabled, a nonce (unique digits sequence) is included
as one of the requestExtensions in each OCSP request. Default is disable.
Configures the OCSP request to contain a signature along with certificates to help the OCSP responder verify this signature.
They keyring must already exist and have a certificate.
Specifies whether the OCSP request must contain a signature along with certificates to help the OCSP responder verify this
signature. They keyring must already exist and ave a certificate. By default, invalid responder certificate dates cause the
subject certificate verification to fail.
Specifies whether to ignore the enforcement of purpose field in the responder certificate. Default is enable.
Specifies whether to ignore connection failures and timeouts to the OCSP server. Default is disable.
579 of 604
ProxySG Command Line Interface Reference
Specifies whether to treat “unknown” revocation status for a certificate as an error. By default, unknown status is an error and
causes subject certification verification to fail.
Specifies whether to bypass, during responder certificate verification, any untrusted certificate errors. For example, a missing
issuer certificate or a missing self-signed certificate. By default, any untrusted certificate failure is an error and causes the
subject certificate verification to fail.
Sets the name of the CCL. This is the list of CA names which is associated with the certificate to be checked for revocation. It
may either be a server or client certificate, or a certificate that is used for verifying system images.
Sets the SSL device profile. The device profile is a unique set of SSL cipher-suites, protocols and keyrings used when the
ProxySG appliance makes HTTPS connections with an OCSP responder. The default value is the pre-created device profile
named “default.”
Configures the time to live (TTL) value. This value determines how long a response remains in the cache. The auto option
indicates that the response is cached until nextUpdate. If nextUpdate is not present the response is not cached. The number_
of_days variable indicates that the nextUpdate field in the response is to be overridden and that the response is to be cached
for the indicated number of days. Default is auto.
580 of 604
ProxySG Command Line Interface Reference
Example
# (config ssl oscp) create responder1
ok
# (config ssl oscp) edit responder1
# (config ssl oscp responder1)
# (config ocsp responder1) use-forwarding enable
ok
See Also
n "# (config ssl oscp)" on page 577
581 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) ssl
# (config ssl)
# (config ssl) edit ssl-client ssl_client_name
Subcommands
# (config ssl ssl-client ssl_client_name) ccl {ccl_name | all}
Associates the specified cipher suite(s) with the default SSL client. Pressing ENTER without specifying cipher suites displays
a list of available ciphers and a prompt to select ciphers.
You can use interactive mode or non-interactive mode. Interactive mode does not support specifying cipher suites. Symantec
Director uses non-interactive commands in profiles and overlays to create cipher suites.
If specifying cipher suites, type them in a space-separated list such as AES128-GCM-SHA256 DHE-DSS-AES256-SHA256.
Refer to TECH247556 for an overview of cipher suites shipped with the appliance:
http://www.symantec.com/docs/TECH247556
# (config ssl ssl-client ssl_client_name) protocol {sslv3 | tlsv1 | tlsv1.1 | tlsv1.2 | tls1.3}
582 of 604
ProxySG Command Line Interface Reference
Configures SSL client protocol version or versions. Changing the SSL protocol version or versions will reset the list of available
cipher suites.
Example
# (config) ssl
# (config ssl) edit ssl-client default
# (config ssl ssl-client default) cipher-suite AES128-GCM-SHA256 DHE-DSS-AES256-SHA256
ok
# (config ssl ssl-client default) exit
# (config ssl) exit
# (config)
See Also
n "# (config) ssl" on page 559
583 of 604
ProxySG Command Line Interface Reference
Syntax
# (config) ssl
# (config ssl)
# (config ssl) edit keylist keylist_id
Subcommands
# (config ssl keylist keylist_id) add keyring_id
Sets the specified keyring as the default in the keylist. The default keyring is used when clients do not support SNI or when
they send incompatible SNI information.
Sets the extractor pattern for the keyring. The extractor supports substitutions from all attributes of Subject, Issuer,
SubjectAltName, IssuerAltName, SerialNumber, and ServerName certificate fields. The default extractor value is
$(subject.CN); many other subject attributes are recognized, among them OU, O, L, ST, C, and DC. Field indexes can be
used in substitutions on a group name or attribute; for example $(SubjectAltName.DNS.1).
584 of 604
ProxySG Command Line Interface Reference
Displays the keylist extractor as well as the keyring IDs and their respective extractor values. Use verbose to display the
certificate field values of the keylist.
See Also
n "# (config) ssl" on page 559
585 of 604
ProxySG Command Line Interface Reference
# (config) static-routes
Synopsis
Set the network path to download the static routes configuration file.
To use static routes, you must create a routing table and place it on an HTTP server accessible to the device. The routing table
is a text file containing a list of static routes made up of destination IP addresses (IPv4 or IPv6), subnet masks (for IPv4) or
prefix lengths (for IPv6), and gateway IP addresses (IPv4 or IPv6).
When you download a routing table, the table is stored in the device until it is replaced by downloading a new table.
The routing table is a simple text file containing a list of IPv4/IPv6 addresses, subnet masks/prefix lengths, and gateways. A
sample routing table is illustrated below:
fe80::2d0:83ff:fe05:780%0:0 64 00:D0:83:05:07:80
Note that a routing table can contain a combination of IPv4 and IPv6 entries, but the gateway for each destination must be on
the appropriate network type. For example, an IPv6 destination must use an IPv6 gateway. When a routing table is loaded, all
requested addresses are compared to the list, and routed based on the best match.
After the routing table is created, place it on an HTTP server so it can be downloaded to the device. To download the routing
table to the appliance, use "# (config) load" on page 350.
Syntax
# (config) static-routes {subcommands}
Subcommands
# (config) static-routes no path
Sets the network path location of the static route table to the specified URL.
Example
# (config) static-routes path 10.25.36.47/files/routes.txt
ok
586 of 604
ProxySG Command Line Interface Reference
# (config) streaming
Synopsis
Configure global streaming settings as well as settings for each streaming proxy (Windows Media, Real Media, QuickTime,
Flash, Adobe HDS, Apple HLS, and Microsoft Smooth Streaming).
Syntax
# (config) streaming {subcommand}
Subcommands
# (config) streaming adobe-hds http-handoff {disable | enable}
Disables or enables Adobe HDS handoff. Set to enable in order to control and view statistics on Adobe HTTP Dynamic
Streaming streams.
Disables or enables Apple HLS handoff. Set to enable in order to control and view statistics on Apple HTTP Live Streaming S
streams
The IP address range for the ProxySG appliance's multicast-station. Default is from 224.2.128.0 and 224.2.255.255.
Port range for the ProxySG appliance's multicast-station. Default is between 32768 and 65535.
Time to live value for the multicast-station on the ProxySG appliance, expressed in hops. Default is 5; a valid number is
between 1 and 255.
587 of 604
ProxySG Command Line Interface Reference
Limits the total bandwidth used by all connected clients. Changing the setting to no max-client-bandwidth uses the maximum
available bandwidth. Zero (0) is not an accepted value
Limits the concurrent number of client connections. Changing the setting to no max-connections uses the maximum available
bandwidth. Zero (0) is not an accepted value.
Limits the total bandwidth used between the proxy and the gateway. Changing the setting to no max-gateway-bandwidth, uses
the maximum available bandwidth. Zero (0) is not an accepted value.
588 of 604
ProxySG Command Line Interface Reference
Customize a Windows-media Media ASX file hosted on the ProxySG appliance to point to a different IP address or FQDN. If a
host name or IP address isn’t specified, the ASX file is populated with the Management Console IP address. The name is the
name field in the http://appliance_address/MMS/nsc Advanced URL.
If your environment does not use a Layer 4 switch or WCCP, the ProxySG appliance can operate as a proxy for Windows
Media Player 6.4 clients by rewriting the .asx file (which links Web pages to Windows Media ASF files) to point to the
Windows Media streaming media cache rather than the Windows Media server.
n number can be any positive number. It defines the priority of all the asx-rewrite rules. Smaller numbers indicate higher
priority.
n in_addr specifies the hostname. It can have a maximum of one wildcard character.
n cache_proto rewrites the protocol on the ProxySG appliance and can take any of the following forms:
o mmsu (MMS-UDP)
o mmst (MMS-TCP)
o http (HTTP)
n loops specifies the number of times the stream should be played back. 0 means forever.
n date specifies the broadcast alias starting date. To specify multiple starting dates, enter the date as a comma-
separated string. date can take any of the following formats:
589 of 604
ProxySG Command Line Interface Reference
o yyyy-mm-dd
o today
n time specifies the broadcast-alias starting time. To specify multiple starting times within the same date, enter the time
as a comma-separated string. No spaces are permitted. time can take any of the following formats:
o hh:mm
o midnight, 12am, 1am, 2am, 3am, 4am, 5am, 6am, 7am, 8am, 9am, 10am, 11am, noon, 12pm, 1pm, 2pm, 3pm,
4pm, 5pm, 6pm, 7pm, 8pm, 9pm, 10pm, 11pm.
Allows the Windows Media module to control the HTTP port when Windows Media streaming content is present. The default is
enabled.
Allows the ProxySG appliance to retransmit dropped packets sent through MMS-UDP for unicast. The default is enabled.
Disables or enables access log compatibility. When log-compatibility is enabled, the ProxySG appliance generates the MMS
log the same way as Windows Media Server does. Three fields are affected when log-compatibility is enabled:
Enables or disables forwarding of the client log to the origin media server.
Limits the concurrent number of client connections. If this variable is set to 0, you effectively lock out all client connections to
the ProxySG appliance. To allow maximum client bandwidth, enter streaming windows-media no max-connections.
590 of 604
ProxySG Command Line Interface Reference
Sets the maximum limit, in kilobits per second (Kbps), for the amount of bandwidth Windows Media uses to send requests to
its gateway. If this variable is set to 0, you effectively prevent the ProxySG appliance from initiating any connections to the
gateway. To allow maximum gateway bandwidth, enter streaming windows-media no max-gateway-bandwidth.
Creates an alias on the ProxySG appliance that reflects the multicast station on the origin content server.
Enables the transmission of forward error correction (FEC) packets from a Windows Media Server to proxied Windows Media
Player clients, when provided. This feature is enabled by default. Disabling the option can lead to a bandwidth gain but may
lead to playback instability on high-latency Internet connections.
# (config) streaming windows-media multicast-station name {alias | url} ip_address port ttl
Enables multicast transmission of Windows Media content from the ProxySG appliance.
n alias can be a unicast alias, a multicast-alias or a broadcast alias, as well as a URL to a live stream source.
n ttl specifies the multicast-station's time-to-live value, expressed in hops (and must be a valid number between 1 and
255). The default ttl is 5.
Deletes the multicast alias rule associated with the specified alias.
591 of 604
ProxySG Command Line Interface Reference
Deletes the unicast alias rule associated with alias. The name of the alias, such as “welcome1” that is created on the ProxySG
appliance and reflects the content specified by the URL. The protocol is specified by the URL if the protocol is mmst, mmsu, or
http. If the protocol is mms, the same protocol as the client is used.
Checks the refresh interval for cached streaming content. hours must be a floating point number to specify refresh interval. 0
means always check for freshness.
Sets the authentication type of the ProxySG appliance indicated by cache_ip_address to BASIC or NTLM.
Creates an alias on the ProxySG appliance that reflects the content specified by the URL. When a client requests the alias
content, the ProxySG appliance uses the URL specified in this command to request the content from the origin streaming
server.
Example
# (config) streaming windows-media http-handoff enable
ok
592 of 604
ProxySG Command Line Interface Reference
# (config) tcp-ip
Synopsis
Configure TCP/IP settings, including TCP/IP Space Communications Protocol Specifications (SCPS).
Syntax
# (config) tcp-ip {subcommand}
Subcommands
# (config) tcp-ip bypass-keep-alive {disable | enable}
Enables or disables keep-alive for bypass connections. Note that this setting does not affect existing connections.
Sets the routing algorithm as hashing. Selects the outbound route within the same group based on source and/or destination IP
address. Use the hashing option, for example, when the ProxySG appliance needs to connect to a secure Web server and the
Web server requires the source IP address to remain unchanged during the lifetime of the secure session. Similarly, other
services that use cookies to maintain session concept across multiple connections might also need to use hash base routing.
The default setting is weighted-round-robin.
The default setting for the tcp-ip routing-algorithm option is weighted-round-robin. This setting is appropriate for all deployments
except where noted in the hashing above.
593 of 604
ProxySG Command Line Interface Reference
Specifies the transmission link bandwidth to be used by the ProxySG appliance for packet metering and window sizing during
SCPS usage. The value is kbps (shown as bits-per-second/1000).
Sets the satellite-facing interface used to communicate with the satellite during a SCPS transmission.
Specifies the time_wait value for a TCP connection before completely closing.
Helps to recover throughput efficiently after packet losses occur and also addresses performance problems due to a single
packet loss during a large transfer over long delay pipes. The feature is enabled (set to normal) by default.
Specifies the TCP window size for satellite communications. The default is 1 MB.
Example
# (config) tcp-ip ip-forwarding enable
ok
# (config) tcp-ip rfc-1323 enable
ok
See Also
n Space Communications Protocol Specifications (SCPS) Deployment Guide
594 of 604
ProxySG Command Line Interface Reference
# (config) threat-protection
Synopsis
In SGOS 6.x, these commands were used to configure the built-in threat protection policy invoked when malware scanning
was enabled on the ProxySG appliance.
% Malware security policy configuration has moved to the Web Visual Policy Manager.
Starting in SGOS 7.x, configure malware scanning via the Content Security Policy component of Policy Services. For details,
refer to the ProxySG Web Visual Manager Reference and the ProxySG Security Best Practices document at MySymantec.
595 of 604
ProxySG Command Line Interface Reference
# (config threat-risk)
Synopsis
Configure the Threat Risk Levels feature.
Syntax
# (config) threat-risk
# (config threat-risk)
Subcommands
# (config threat-risk) disable
Downloads the latest data. The CLI displays the download progress and status. If the database is already up-to-date, the
appliance does not download it again. To cancel the download in progress, press and hold CTRL+C.
Downloads the latest data in the background. You can continue to use the CLI while the download is in progress. If the
database is already up-to-date, the appliance does not download it again.
596 of 604
ProxySG Command Line Interface Reference
Disables forwarding requests (when the request does not have a risk level in the database) to WebPulse.
Specifies an existing forwarding host or group alias to use when forwarding requests to WebPulse. You can only use
forwarding if security is disabled. To disable security, use the # (config threat-risk) service secure disable
command.
Includes the full URL from HTTPS requests, or sends only the path (excluding query strings).
597 of 604
ProxySG Command Line Interface Reference
Specify an existing SOCKS gateway or group alias for the WebPulse protocol.
Example
# (config threat-risk) download get-now
This may take a few minutes. Please wait...
downloading database..
License Type: Subscription
Licensed Until: Thu, 17 Oct 2015 00:00:00 UTC
Service: Enabled
Download method: Direct
Last successful download:
Time: Mon, 1 Apr 2019 20:39:49 UTC
Downloading from: https://subscription.es.bluecoat.com/threatrisk/database
% Successfully loaded database.
% Attempting to copy new database
ok
See Also
n "Analyzing the Threat Risk of a URL" in SGOS Administration Guide
598 of 604
ProxySG Command Line Interface Reference
# (config) timezone
Synopsis
Set the local time zone on the appliance.
Syntax
# (config) timezone {subcommand}
Subcommands
# (config) timezone database-path {url | default}
Sets the local time zone. Use # (config) show timezones to display a list of supported time zones in area/location format.
See Also
n "# (config) clock" on page 239
599 of 604
ProxySG Command Line Interface Reference
# (config ui)
Synopsis
Configure the user interface settings for the appliance.
Syntax
# (config) ui
# (config ui)
Subcommands
# (config ui) default {advanced | solution}
Example
# (config) ui
# (config ui) default advanced
ok
600 of 604
ProxySG Command Line Interface Reference
# (config) upgrade-path
Synopsis
Specify the network path to download system software.
Syntax
# (config) upgrade-path {subcommand}
Note: Command strings that include the special character “?” must be quoted. For example,
the following command will result in an error:
# (config) upgrade-path https://example.com/cgi-bin/download?rid=3399924431
To execute the command correctly, enclose the string in quotes as shown:
# (config) upgrade-path "https://example.com/cgi-bin/download?rid=3399924431"
Subcommands
# (config) upgrade-path url
Specifies the network path to use to download ProxySG system software. The image name must be included in the network
path.
Example
# (config) upgrade-path http://your_server/image_file
ok
601 of 604
ProxySG Command Line Interface Reference
# (config) virtual-ip
Synopsis
Configure the virtual IP addresses on the appliance.
Syntax
# (config) virtual-ip {subcommand}
Subcommands
# (config) virtual-ip address ip_address
Example
# (config) virtual-ip address 192.200.0.55
ok
602 of 604
ProxySG Command Line Interface Reference
# (config) wccp
Synopsis
The ProxySG appliance can be configured to participate in a WCCP (Web Cache Control Protocol) scheme, where a WCCP-
capable router collaborates with a set of WCCP-configured ProxySG appliance to service requests. WCCP is a Cisco-
developed protocol. For more information about WCCP, refer to the SGOS Administration Guide and the WCCP Deployment
Guide.
After you have created the WCCP configuration file, place the file on an HTTP server so it can be downloaded to the ProxySG
appliance. To download the WCCP configuration to the ProxySG appliance, use "# (config) load" on page 350.
Syntax
# (config) wccp {subcommand}
Subcommands
# (config) wccp {disable | enable}
Example
# (config) wccp path 10.25.36.47/files/wccp.txt
ok
See Also
n "WCCP Configuration in SGOS Administration Guide
603 of 604
ProxySG Command Line Interface Reference
# (config webex)
Synopsis
Enable/disable HTTP-handoff to the WebEx proxy, which can deny or allow desktop and file sharing The ProxySGappliance
can be configured to control desktop application and file sharing within a WebEx session. The appliance must be setup with an
active, licensed Symantec WebFilter database. SSL interception is required. For more information about the WebEx proxy,
refer to the SGOS Administration Guide.
Syntax
# (config) webex
# (config webex)
Subcommands
# (config webex) http-handoff enable
Disables the HTTP hand-off to the WebEx proxy; WebEx traffic will be handled by the HTTP proxy
Example
# (config webex) view configuration
WebEx configuration:
HTTP handoff: Enabled
See Also
n "Configuring the WebEx Proxy" in SGOS Administration Guide
604 of 604