Hirschmann EAGLE 20 Reference Manual

Command line interface (cli) industrial ethernet firewall
Hide thumbs Also See for EAGLE 20:

Advertisement

Reference Manual
Command Line Interface (CLI)
Industrial Ethernet Firewall
EAGLE
EAGLE 20
EAGLE 20
1
2
1
2
P
FAULT
P
FAULT
STATUS
STATUS
LS/DA
LS/DA
1
2
V.24
1
2
V.24
R
R
k
k
1
1
USB
USB
2
2
g
g
V.24
V.24
Copyright (c) 2007-2010 Hirschmann Automation and Control GmbH
EXAMPLE
EXAMPLE
EXAMPLE
EXAMPLE
NOTE: Enter '?' for Command Help.
that are valid for the particular mode.
For the syntax of a particular command form, please
consult the documentation.
*(Hirschmann Eagle) >
CLI EAGLE 20
Release 5.0 08/2010
EAGLE 20
EAGLE 20
1
2
1
2
P
FAULT
P
FAULT
STATUS
STATUS
LS/DA
LS/DA
1
2
V.24
1
2
V.24
R
R
k
k
1
1
USB
USB
2
2
g
g
V.24
V.24
All rights reserved
EAGLE Release SDV-05.0.00
(Build date 2010-08-08 08:08)
System Name:
EAGLE20 Name
Netw. Mode :
transparent
Mgmt-IP
:
a.b.c.d
Base-MAC
:
00:11:22:33:44:55
System Time:
SUN AUG 08 08:08:08 2010
Command help displays all options

Technical Support

HAC.Support@Belden.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the EAGLE 20 and is the answer not in the manual?

Questions and answers

Summary of Contents for Hirschmann EAGLE 20

  • Page 1: Technical Support

    LS/DA LS/DA LS/DA V.24 V.24 V.24 V.24 V.24 V.24 V.24 V.24 Copyright (c) 2007-2010 Hirschmann Automation and Control GmbH All rights reserved EAGLE Release SDV-05.0.00 (Build date 2010-08-08 08:08) System Name: EAGLE20 Name Netw. Mode : transparent Mgmt-IP a.b.c.d Base-MAC...
  • Page 2 In addition, we refer to the conditions of use specified in the license contract. You can get the latest version of this manual on the Internet at the Hirschmann product site (www.beldensolutions.com). Printed in Germany Hirschmann Automation and Control GmbH Stuttgarter Str.
  • Page 3: Table Of Contents

    3.2.2 Command tree 3.2.3 Structure of a command Properties of the CLI 3.3.1 Input prompt 3.3.2 Key combinations 3.3.3 Data entry elements 3.3.4 Line length Examples Change timeout default setting Login Banner Further Support CLI EAGLE 20 Release 5.0 08/2010...
  • Page 4 CLI EAGLE 20 Release 5.0 08/2010...
  • Page 5: About This Manual

    Configuration of multiple devices simultaneously. Graphical interface with network layouts. Auto-topology discovery. Event log. Event handling. Client / Server structure. Browser interface ActiveX control for SCADA integration SNMP/OPC gateway CLI EAGLE 20 Release 5.0 08/2010...
  • Page 6: Key

    The designations used in this manual have the following meanings: List Work step Subheading Link Indicates a cross-reference with a stored link Note: A note emphasizes an important fact or draws your attention to a dependency. ASCII representation in user interface Courier CLI EAGLE 20 Release 5.0 08/2010...
  • Page 7: Introduction

    The IP address ranges before and after the Firewall are located in the same subnetwork. In the state on delivery, you can access the device via address 192.168.1.1/24 without configuring the IP address. CLI EAGLE 20 Release 5.0 08/2010...
  • Page 8: User Interfaces

    IT devices. As an experienced user or administrator, you have knowledge about the basics and about using secure shell (SSH) connections. The “Command Line Interface” reference manual gives you step-by-step in- formation on using the Command Line Interface (CLI) and its commands. CLI EAGLE 20 Release 5.0 08/2010...
  • Page 9 The commands in the Command Line Interface of the EAGLE 20 Firewall can be divided into the following areas: Authentication Delete Copy Denial of Service Device Status Interface Logging NAT (Network Address Translation) Network Packet Filter Profiles Signal contact SNMP Trap (Simple Network Management Protocol)
  • Page 10: Access To Cli

    If the required programs are not already installed on your PC, please in- stall them. CLI via SSH (Secure Shell) Start the PuTTY program on your computer. PuTTY appears with the login screen (see fig. CLI EAGLE 20 Release 5.0 08/2010...
  • Page 11 When you first login to your device, towards the end of the connection setup, PuTTY displays a security alert message and gives you the option of checking the fingerprint of the key. CLI EAGLE 20 Release 5.0 08/2010...
  • Page 12 CLI appears on the screen with a window for entering the user name. Up to five users can access the Command Line Interface at the same time. login as: admin admin@a.b.c.d's password: Figure 3: Login window in CLI CLI EAGLE 20 Release 5.0 08/2010...
  • Page 13 The start screen appears. Note: This device is a security-relevant product. For your own security, change the password during the first startup procedure. Copyright (c) 2007-2010 Hirschmann Automation and Control GmbH All rights reserved EAGLE Release SDV-05.0.00 (Build date 2010-08-08 08:08)
  • Page 14: Cli Via The V.24 Port

    Connect the device to a terminal via V.24 or to a “COM” port of your PC using terminal emulation based on VT100, and press any key. After the connection has been made successfully, a window for entering the user name appears on the screen. CLI EAGLE 20 Release 5.0 08/2010...
  • Page 15 Copyright (c) 2007-2010 Hirschmann Automation and Control GmbH All rights reserved Eagle Release SDV-05.0.00 (Build date 2010-08-08 08:08) System Name: EAGLE-000000 Netw. Mode : transparent Mgmt-IP a.b.c.d Base-MAC 00:11:22:33:44:55 System Time: SUN AUG 08 08:08:08 2010 (Hirschmann Eagle) User: Figure 6: Logging in to the Command Line Interface program Enter a user name.
  • Page 16 (setting on terminal: 9,600 baud) to the V.24 interface. Press any key on your terminal keyboard a number of times until the login screen indicates the CLI mode. CLI EAGLE 20 Release 5.0 08/2010...
  • Page 17: Using The Cli

    Mode-based command hierarchy In the CLI, the commands are grouped in the related modes, according to the type of the command. Every command mode supports specific Hirschmann software commands. The commands available to you as a user at a specific time depend on the mode in which you are currently working.
  • Page 18 When you login to CLI, you first enter the User Exec mode. The User Exec mode contains a limited range of commands. Command prompt: (Hirschmann Eagle) > Privileged Exec mode To access the entire range of commands, you enter the Privileged Exec mode.
  • Page 19 Exit this session. ping Send ICMP echo packets to a specified IP address. show Display device options and settings. traceroute Trace route to a specified host. Figure 9: Commands in the User Exec mode CLI EAGLE 20 Release 5.0 08/2010...
  • Page 20: Cli Eagle

    Activate or delete configuration profiles. reboot Reset the device (cold start). save Save configuration. Set device parameters. show Display device options and settings. traceroute Trace route to a specified host. Figure 10: Commands in the Privileged Exec mode CLI EAGLE 20 Release 5.0 08/2010...
  • Page 21: Executing Commands

    Note: You will find information on the line feed of the help texts below (see on page 28 „Line length“). Executing commands 3.2.1 Syntax analysis After you login to the CLI session, you enter the User Exec mode. The (Hirschmann Eagle)> prompt is displayed on the screen. CLI EAGLE 20 Release 5.0 08/2010...
  • Page 22: Command Tree

    The user wants to execute the show system info command, but enters this command with a misspelling and presses the <Enter> key. The CLI then outputs an error message: !(Hirschmann Eagle) >show system ino Error[1]: Invalid command 'ino' 3.2.2 Command tree The commands in CLI are organized into a tree structure.
  • Page 23 The IP address is an address allocated by the network administrator. Here it is important not to have duplicate addresses in one network area. The MAC addresses are assigned by the hardware manufacturer. They are unique worldwide. CLI EAGLE 20 Release 5.0 08/2010...
  • Page 24 The command does not re- quire any other parameters, and can be executed with <Enter>. Example 2: signal-contact monitor aca-removal Command for displaying the removal of the AutoConfiguration Adapter. (Hirschmann Eagle) (config)#signal-contact monitor aca-removal enable Enable the option. disable (default) Disable the option.
  • Page 25: Properties Of The Cli

    Asterisk “*” An asterisk “*” in the first or second position of the input prompt shows you that the settings in the volatile memory and the settings in the non-volatile memory are different. *(Hirschmann Eagle)> CLI EAGLE 20 Release 5.0 08/2010...
  • Page 26: Key Combinations

    Disable serial flow CTRL + Z Return to root command prompt Tab, <SPACE> Command line completion Exit Go to next lower command prompt List choices Table 4: Key combinations in the Command Line Interface CLI EAGLE 20 Release 5.0 08/2010...
  • Page 27: Data Entry Elements

    “Tab” or “Space” is pressed again. If you make a non-unique entry and press “Tab” or “Space” twice, the CLI provides you with a list of options. CLI EAGLE 20 Release 5.0 08/2010...
  • Page 28: Line Length

    “DSA Fingerprint for SSH”, the remainder “df:3b:11” ap- pears on the next line. You can avoid this effect by using a terminal with a line length of 132 charac- ters (see fig. 14). CLI EAGLE 20 Release 5.0 08/2010...
  • Page 29 Figure 13: “Show login” command with a line length of 80 characters CLI EAGLE 20 Release 5.0 08/2010...
  • Page 30 Figure 14: “Show login” command with a line length of 132 characters CLI EAGLE 20 Release 5.0 08/2010...
  • Page 31: Examples

    27 „Data entry elements“). Execute the command with <En- ter>. The command prompt changes from (Hirschmann Eagle)> to (Hirschmann Eagle)#, thus informing you that you are now in the Privileged Exec mode. !*(Hirschmann Eagle) >enable !*(Hirschmann Eagle) # Enter a question mark “?”...
  • Page 32 The “login timeout ssh” command is used to perform this task. After “login timeout ssh” enter a question mark to display the possible parameters for the command. !(Hirschmann Eagle) #login timeout ssh ? <1..120> Enter a number in the given range.
  • Page 33 !(Hirschmann Eagle) #login timeout ssh 120 Execute the command by pressing the <Enter> key. Checking the execution with the Show command Enter “show” to display all the possible show commands. (Hirschmann Eagle) (config)#show authentication Display ordered methods for authentication lists.
  • Page 34: Login Banner

    You can add a fixed line break to the banner with “\n” and a tab with “\t”. These sequences count as 2 characters. !*(Hirschmann Eagle) #login banner <string> Enter a user-defined text, max. 255 characters. !*(Hirschmann Eagle) #login banner EXAMPLE\n\tEXAMPLE\n\t\tEXAM- PLE\n\t\tEXAMPLE !*(Hirschmann Eagle) # CLI EAGLE 20 Release 5.0 08/2010...
  • Page 35 Copyright (c) 2007-2010 Hirschmann Automation and Control GmbH All rights reserved EAGLE Release SDV-05.0.00 (Build date 2010-08-08 08:08) System Name: EAGLE-000000 Netw. Mode : transparent Mgmt-IP a.b.c.d Base-MAC 00:11:22:33:44:55 System Time: SUN AUG 08 08:08:08 2010...
  • Page 36 CLI EAGLE 20 Release 5.0 08/2010...
  • Page 37 Privileged Exec mode PuTTY Router Mode Secure Shell 8, 10, 31 8, 10, 31 State on delivery Tab Completion Technical questions Training courses Transparent Mode User Exec mode User name 13, 15 V.24 8, 14 VT100 CLI EAGLE 20 Release 5.0 08/2010...
  • Page 38 CLI EAGLE 20 Release 5.0 08/2010...
  • Page 39: Further Support

    Further Support Technical Questions and Training Courses In the event of technical queries, please contact your local Hirschmann distributor or Hirschmann office. You can find the addresses of our distributors on the Internet: www.beldensolutions.com. Our support line is also at your disposal: Tel.

Table of Contents