Method used to view historical commands on USG firewalls

149

The method used to view historical commands on USG firewalls is as follows:
1. Run the display history-command command to view 10 historical commands.
2. In the diagnosis view, run the display history-command all-users command to view 200 historical commands and the corresponding execution time.

Other related questions:
Method used to view the sequence number on USG firewalls
The sequence numbers of the USG2000, USG5000, and USG6000 are classified into the following types: -Equipment sequence number (ESN) -Component sequence number, indicating the sequence number of each component, including the board sequence number, interface subboard sequence number, optical module sequence number, and power module sequence number For the USG2000 and USG5000, check the sequence number as follows: 1. Check the ESN of the device. display firewall esn Device ESN is: 2102359833Z0C80000xx Alternatively, run the following command: display license Device ESN is: 210235XXXXXXXXXXX //Check the ESN. The file activated is : hda1:/license.dat The time when activated is : 2010/08/31 11:23:45 2. Check the ESN of each slot. display elabel [Board Properties] BoardType=SU2Z23UHT BarCode=210235G425Z0A80000xx //Device ESN Item=0235G425 Description=Secospace USG5100,SU2Z23UHT,USG5150BSR Host,with HS General Security Platform Software Manufactured=2010-08-21 VendorName=HuaweiSymantec [Slot_1] /$[ArchivesInfo Version] /$ArchivesInfoVersion=3.0 [Board Properties] BoardType=SU11FSHLB BarCode=02G194D0A40000xx //ESN of the board in slot 1 Item=0302G194 Description=SRG20,SU11FSHLB,2 Channel G.shdsl Interface Board,3*1 For the USG6000, check the sequence number as follows: 1. Check the ESN of the device. display firewall esn Device ESN is: 2102359833Z0C80000xx 2. Check the ESN of all slots of the NGFW. display esn License ESN: 2102359833Z0C80000xx Slot # Type S/N P/N - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1 SUAZ83UAH 210235G7G70123401230 0235G7G7 2 SUE3E8GF 02G3AC10D5000007 0302G3AC 4 SUE3E4BY 02G3A710D6000007 0302G3A7 8 SUA2E2XSF 02G3C710D6000028 0302G3C7 9 PWR 2102310GQVP0D3000081 02310GQV 10 PWR 2102310GQVP0D3000085 02310GQV 11 RPU 2102359833Z0C800000A 02359833 13 FAN 210212090410D6000034 02120904

Method used to view the BOM code on USG firewalls
On the USG2000, USG5000, and USG6000, the BOM code indicates the material code. You can check the 3rd to 10th places in the device ESN. For example: display firewall esn Device ESN is: 2102359833Z0C80000xx The BOM code of this device is 02359833.

Method used to view the license information on USG firewalls
On the USG2000, USG5000, and USG6000, you can run the display license command to view the license information. display license Device ESN is: 210235XXXXXXXXXXX The file activated is : hda1:/license.dat //Activated license file The time when activated is : 2010/08/31 11:23:45 //System time when the license file is activated. You can determine whether the license file is activated. VFW: 100 SSL VPN Concurrent User : 500 Content Filtering: Enabled GTP: Enabled IPS: Enabled; service expire time: 2012/06/16 Anti Virus : Enabled; service expire time: 2012/06/16 Anti Spam: Enabled; service expire time: 2012/06/16 Pre-defined URL category query: Enabled; service expire time: 2012/06/16 //License expiration time

Method used to view the MAC address of a device on USG firewalls
The method used to view the MAC address of a device on the USG2000, USG5000, and USG6000 is as follows: You cannot view the MAC address of a device on the web UI on USG firewalls. You can run the display arp command in the command line to view the local MAC address and peer MAC address. [USG]display arp IP ADDRESS MAC ADDRESS EXPIRE(M) TYPE INTERFACE VPNINSTANCE VLAN/PVC 1.1.2.2 3400-a3d8-f023 I Vlanif300 100.1.1.1 3400-a3d8-f023 I Vlanif200 6.6.6.6 3400-a3d8-f023 I Vlanif2 192.168.108.111 3400-a3d8-f01f I GE0/0/0 192.168.108.222 3400-a3d8-f01f I GE0/0/0 192.168.108.100 d46a-b330-c311 6 D GE0/0/0 192.168.108.113 3400-a3da-e1b0 12 D GE0/0/0 192.168.108.115 200b-c73b-6300 16 D GE0/0/0 192.168.108.114 200b-c73b-5b00 16 D GE0/0/0 I indicates the MAC address of the interface, and D indicates a dynamic entry obtained using the ARP packet. You can learn the local interface address in I, including the VLANIF interface and L3 interface (WAN interface).

Method used to view the IKE peer information on USG firewalls
The common IPSec maintenance command used on USG firewalls is as follows: Display ike peer //Display the configuration of the IKE peer.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top