CLI Guide - WatchGuard Technologies
CLI Guide - WatchGuard Technologies
CLI Guide - WatchGuard Technologies
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Debugging/troubleshooting commands<br />
TIME_EXCEEDED response from each gateway<br />
along the path to the target device. You can use this<br />
command to troubleshoot network routing and<br />
connectivity.<br />
Arguments<br />
Be sure to type the IP address of the target device,<br />
as shown in the example below.<br />
Example<br />
WG(debug)#traceroute<br />
207.188.12.3<br />
verbose_trace command<br />
WG#debug<br />
WG(debug)# verbose_trace [ on | off ]<br />
Effect<br />
This command enables/disables verbose tracing in<br />
the traffic log. If such is enabled, every firewalldropped<br />
packet will be shown in the traffic log. All<br />
DNS packets will also be shown in the traffic log.<br />
NOTE<br />
If this feature is enabled, there will be an impact to the<br />
overall system performance due to heavy logging activity.<br />
vinstall command<br />
WG#debug<br />
WG(debug)# vinstall <br />
<br />
##This feature allows downgrade from 5.0 to 3.2 or 4.0<br />
##e.g. vinstall 10.10.10.10 my_username my_password<br />
"path/encrypted_fbv.tgz"<br />
## For V10, use non-encrypted file. For others, use<br />
encrypted file.<br />
Effect<br />
This allows you to downgrade to an earlier<br />
software version–from 5.0 to 4.0 or from 5.0 to 3.2.<br />
<strong>WatchGuard</strong> Command Line Interface <strong>Guide</strong> 141