R3166-R3206-HP High-End Firewalls System Management and Maintenance Configuration Guide-6PW101
i
Contents
Device information ······················································································································································· 1
Displaying device information ········································································································································· 1
Device info ································································································································································ 2
System resource state ··············································································································································· 2
Device interface information ··································································································································· 2
Recent system logs ···················································································································································· 3
System maintenance and debugging ························································································································· 4
System maintenance and debugging ····························································································································· 4
Ping ····················································································································································································· 4
Introduction ······························································································································································· 4
Configuring ping ······················································································································································ 4
Ping configuration example ···································································································································· 5
Tracert ················································································································································································ 6
Introduction ······························································································································································· 6
Configuring tracert ··················································································································································· 7
System debugging ···························································································································································· 8
Introduction to system debugging ··························································································································· 8
Configuring system debugging ······························································································································· 8
Ping and tracert configuration example ························································································································· 9
IP performance optimization configuration ·············································································································· 11
Overview ········································································································································································· 11
Configuring TCP attributes ············································································································································ 11
Configuring TCP MSS for the interface ··············································································································· 11
Enabling the SYN Cookie feature ······················································································································· 12
Enabling protection against Naptha attacks ······································································································ 12
Configuring TCP optional parameters ················································································································· 13
Configuring ICMP to send error packets ····················································································································· 14
Displaying and maintaining IP performance optimization ························································································ 15
File system management ············································································································································ 17
File system management overview ······························································································································· 17
Filename formats ··················································································································································· 17
Performing directory operations ··································································································································· 18
Displaying directory information ························································································································· 18
Displaying the current working directory ············································································································ 18
Changing the current working directory ············································································································· 18
Creating a directory ·············································································································································· 18
Removing a directory ············································································································································ 18
Performing file operations ············································································································································· 19
Displaying file information ··································································································································· 19
Displaying the contents of a file ··························································································································· 19
Renaming a file ······················································································································································ 19
Copying a file ························································································································································ 19
Moving a file ·························································································································································· 19
Deleting a file ························································································································································· 20
Restoring a file from the recycle bin ···················································································································· 20
Emptying the recycle bin ······································································································································ 20
Performing batch operations ········································································································································· 20