
6ETEP CLI User Guide
Contents
FIPS Mode Failures and Zeroization ...........................................................................................123
Other Operating Boundaries........................................................................................................123
Exiting FIPS Mode.......................................................................................................................123
Chapter 8: Command Reference ........................................................................................... 125
CLI Overview......................................................................................................................................125
Format Conventions ....................................................................................................................125
Tips on Command Usage ............................................................................................................126
Commands......................................................................................................................................... 127
autoneg........................................................................................................................................128
backup-policy-set.........................................................................................................................130
banner-config...............................................................................................................................131
clear-certificates ..........................................................................................................................131
clear-known-hosts .......................................................................................................................132
clear-policies................................................................................................................................ 133
clear-policy-set ............................................................................................................................133
cli-inactivity-timer .........................................................................................................................134
configure......................................................................................................................................135
date..............................................................................................................................................135
debug-shell ..................................................................................................................................136
deploy-policy-set..........................................................................................................................137
dfbit-ignore...................................................................................................................................138
dhcprelay ..................................................................................................................................... 139
disable-trusted-hosts ...................................................................................................................140
exit ............................................................................................................................................... 141
filesystem-download ....................................................................................................................141
filesystem-reset ...........................................................................................................................143
fips-mode-enable.........................................................................................................................144
help..............................................................................................................................................145
ike-params-set.............................................................................................................................145
ike-sa-dh-group ...........................................................................................................................146
ike-sa-lifetime .............................................................................................................................. 146
ike-sa-presharedkey ....................................................................................................................147
ip..................................................................................................................................................148
ip6................................................................................................................................................150
ipsec-config .................................................................................................................................151
ipsec-sa-lifetime...........................................................................................................................152
ipsec-sa-pfs .................................................................................................................................152
ipv6Traffic ....................................................................................................................................153
layer2-p2p....................................................................................................................................154
license .........................................................................................................................................155
local-interface ..............................................................................................................................156
local-site-policies .........................................................................................................................157
logon-banner-enable ...................................................................................................................157
management-interface.................................................................................................................158
network-tools ...............................................................................................................................158
password .....................................................................................................................................159
password-enforcement ................................................................................................................160
password-modify .........................................................................................................................161
ping..............................................................................................................................................161
ping6............................................................................................................................................163
policies......................................................................................................................................... 165
policy-action.................................................................................................................................165