25.06.2013 Views

CLI Guide - WatchGuard Technologies

CLI Guide - WatchGuard Technologies

CLI Guide - WatchGuard Technologies

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Debugging/troubleshooting commands<br />

TIME_EXCEEDED response from each gateway<br />

along the path to the target device. You can use this<br />

command to troubleshoot network routing and<br />

connectivity.<br />

Arguments<br />

Be sure to type the IP address of the target device,<br />

as shown in the example below.<br />

Example<br />

WG(debug)#traceroute<br />

207.188.12.3<br />

verbose_trace command<br />

WG#debug<br />

WG(debug)# verbose_trace [ on | off ]<br />

Effect<br />

This command enables/disables verbose tracing in<br />

the traffic log. If such is enabled, every firewalldropped<br />

packet will be shown in the traffic log. All<br />

DNS packets will also be shown in the traffic log.<br />

NOTE<br />

If this feature is enabled, there will be an impact to the<br />

overall system performance due to heavy logging activity.<br />

vinstall command<br />

WG#debug<br />

WG(debug)# vinstall <br />

<br />

##This feature allows downgrade from 5.0 to 3.2 or 4.0<br />

##e.g. vinstall 10.10.10.10 my_username my_password<br />

"path/encrypted_fbv.tgz"<br />

## For V10, use non-encrypted file. For others, use<br />

encrypted file.<br />

Effect<br />

This allows you to downgrade to an earlier<br />

software version–from 5.0 to 4.0 or from 5.0 to 3.2.<br />

<strong>WatchGuard</strong> Command Line Interface <strong>Guide</strong> 141

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!