Command Line Interface Reference Guide R77 CP CLI
User Manual:
Open the PDF directly: View PDF .
Page Count: 145
14 September 2016
Command Line Interface
R77
Classification: [Protected]
Reference Guide
© 2016 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html
for a list of relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the latest
functional improvements, stability fixes, security enhancements and protection against new and
evolving attacks.
Latest Documentation
The latest version of this document is at:
http://supportcontent.checkpoint.com/documentation_download?ID=24833
To learn more, visit the Check Point Support Center http://supportcenter.checkpoint.com.
For more about this release, see the R77 home page
http://supportcontent.checkpoint.com/solutions?id=sk104859.
Revision History
Date
Description
13 September 2016
Updated sample script for Adding a Rule (on page 17)
10 March 2016
Updated fwm getpcap (on page 94)
25 February 2016
Updated fw monitor Filters (on page 80)
6 August 2014
Updated fwm dbload (on page 93) and cplic check (on
page 31)
10 June 2014
Corrected example for the cp_merge list_policy (on page
42) command
6 June 2014
Cover changed to be relevant for all R77 versions
9 December 2013
•
Added Running CLI Commands in Automation Scripts (on
page 10)
•
General updates
27 August 2013
First release of this document
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Command Line Interface R77
Reference Guide.
Contents
Important Information................................................................................................... 3
CLI Commands for Software Blades ............................................................................. 9
CLI Commands in Other Guides ................................................................................ 9
Running CLI Commands in Automation Scripts .......................................................... 10
Introduction to Automation Scripts ......................................................................... 10
Creating a Domain Management Server ........................................................................10
Working with dbedit ................................................................................................ 11
Introduction to dbedit ....................................................................................................11
Using Automation Scripts ..............................................................................................12
Create or Modify Policy Objects (Hosts, Networks) ........................................................13
Changing a Rule Base ....................................................................................................17
Pushing the Security Policy to Security Gateways .........................................................19
Error Codes in dbedit.....................................................................................................20
Using XML to Export Settings for a Domain Management Server ........................... 20
Security Management Server and Firewall Commands .............................................. 21
comp_init_policy ..................................................................................................... 22
cp_admin_convert .................................................................................................. 22
cpca_client .............................................................................................................. 22
cpca_client create_cert .................................................................................................22
cpca_client revoke_cert ................................................................................................23
cpca_client lscert ..........................................................................................................23
cpca_client init_certs ....................................................................................................24
cpca_client set_mgmt_tool ...........................................................................................24
cpca_client set_sign_hash ............................................................................................25
cpca_client search.........................................................................................................25
cpca_client get_crldp ....................................................................................................26
cpca_client get_pubkey .................................................................................................26
cpca_client double_sign ................................................................................................26
cp_conf.................................................................................................................... 26
cp_conf sic.....................................................................................................................27
cp_conf admin ...............................................................................................................27
cp_conf ca .....................................................................................................................27
cp_conf finger ...............................................................................................................28
cp_conf lic .....................................................................................................................28
cp_conf client ................................................................................................................28
cp_conf ha .....................................................................................................................29
cp_conf snmp ................................................................................................................29
cp_conf auto ..................................................................................................................29
cp_conf sxl ....................................................................................................................30
cpconfig ................................................................................................................... 30
cpinfo ...................................................................................................................... 30
cplic ......................................................................................................................... 31
cplic check .....................................................................................................................31
cplic db_add ..................................................................................................................32
cplic db_print ................................................................................................................33
cplic db_rm ...................................................................................................................33
cplic del .........................................................................................................................34
cplic del