|
Table Of Contents
Using the Command-Line Interface
Displaying VPN Client Statistics
Using the Command-Line Interface
This chapter describes common operations using the command-line interface and contains the following sections:
• Displaying a List of Commands
• Disconnecting the VPN Client
• Displaying VPN Client Statistics
Displaying a List of Commands
To display a list of available VPN client commands, locate the directory that contains the VPN client software and enter the vpnclient command at the command line prompt.
The following example shows the command and the information that is displayed:
%vpnclient
Cisco Systems VPN Client Version 3.7 (Rel)
Copyright (C) 1998-2002 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Linux
Running on: Linux 2.4.18-3 #1 Thu Apr 18 07:37:53 EDT 2002 i686
Usage:
vpnclient connect <profile> [user <username>] [eraseuserpwd | pwd
<password>] [nocertpwd]
vpnclient disconnect
vpnclient stat [reset] [traffic] [tunnel] [route] [repeat]
vpnclient notify
Establishing a Connection
This section describes how to establish a VPN connection using the vpnclient connect command and optional command parameters.
Note If you are connecting to a VPN device by using Telnet or SSH, check to see if the device allows split tunneling. If it does not, you lose connectivity to your VPN device after making a VPN connection.
To establish a connection, enter the following command:
vpnclient connect <profile> [user <username>] [eraseuserpwd | pwd <password>] [nocertpwd]
The parameters for the vpnclient connect command are described in Table 4-2.
Table 4-1 Parameters for the vpnclient connect Command
Parameter Description<profile> (required)
The name of the user profile configured for this connection entry (.pcf file). Enter the profile name without the .pcf file extension. If your profile name contains spaces, enclose it in double quotation marks on the command line.
user <username> (optional)
The username configured for this connection entry. If you use this option with the pwd option, the username prompt is surpressed in authentication dialog box.
{ eraseuserpassword | pwd <password> } (optional)
•eraseuserpassword erases the user password that is saved on the VPN client workstation, forcing the VPN client to prompt you for a password each time you establish a connection.
•pwd <password> surpresses the password prompt in the authentication dialog box.
nocertpwd (optional)
Suppresses the prompt for a certificate password and assumes that the password is blank. If you use this option, you cannot set a password for your certificate. For more information, see the "Certificate Passwords" section.
Note If your user profile is configured with the SaveUserPassword keyword set to the default, the password is saved locally.
For more information on profiles, see "User Profiles.".
Authentication Prompts
Depending on the parameters that have been configured in your user profile, you are prompted for the following passwords:
•Group password
•User name
•User password
•Certificate password
If your VPN client has been configured to use SecurID or RADIUS authentication, you are also prompted for those passwords.
See your administrator for any security information.
Rekeying Issues
When the connection is established, the VPN Client window stays in the foreground to allow the VPN client to be reauthenticated during a rekey by the VPN device. To send the VPN client window to the background, press Ctrl-Z and enter the bg command at the command line prompt.
If the VPN device you are connecting to is configured to support rekeying and you send the VPN client window to the background, the tunnel disconnects when the first rekey occurs.
The VPN client responds to rekey triggers based on time, not data. If you want VPN client connections rekeyed, you must configure the concentrator so that the IKE proposal is set to rekey every 1800 seconds and IPSec parameters are set to rekey every 600 seconds.
DNS Server Settings
You can configure the concentrator to send the IP addresses of DNS servers to the VPN client to use during tunnel sessions.
If the client receives the DNS server settings, it copies the file /etc/resolv.conf to a backup file /etc/resolv.conf.vpnbackup. When the tunnel closes, the original contents of /etc/resolv.conf are restored.
Note Refer to the configuration guide for your VPN device for information on DNS server settings.
Disconnecting the VPN Client
This section describes methods for disconnecting the VPN client.
To disconnect from your session, use one of the following methods:
•Enter the following command:
vpnclient disconnect
The following example shows the command that disconnects you from your secure connection and the prompt that appears when you are not connected.
vpnclient disconnect
Disconnecting the IPSEC link.
Your IPSec link is not connected.
•Press Crtl-C while you are in the VPN Client window.
Displaying VPN Client Statistics
This section describes the VPN client statistics command vpnclient stat and its optional parameters.
To generate status information about your connection, enter the following command:
vpnclient stat [reset][traffic][tunnel][route][repeat]
If you enter this command without any of the optional parameters, the vpnclient stat command displays all status information. The optional parameters are described in Table 4-2.
Examples
This section shows examples of output from the different options for the vpnclient stat command.
No Options
The following is a sample output from the vpnclient stat command with no options.
vpnclient stat
IPSec tunnel information.
Client address: 209.154.64.50
Server address: 10.10.32.32
Encryption: 168-bit 3-DES
Authentication: HMAC-MD5
IP Compression: None
NAT passthrough is active on port 5000
VPN traffic summary.
Time connected: 0 day<s>, 00:18.32
Bytes out: 3420
Bytes in: 3538
Packets encrypted: 23
Packets decrypted: 57
Packets bypassed: 102
Packets discarded: 988
Configured routes
Secured Network Destination Netmask Bytes
* 10.10.32.32 255.255.255.255 7638
* 0.0.0.0 0.0.0.0 1899
Reset Option
To reset all connection counters, use the vpnclient stat reset command.
vpnclient stat reset
Tunnel statistics have been reset.
Traffic Option
The following is a sample output from the vpnclient stat command with the traffic option.
vpnclient stat traffic
VPN traffic summary
Time connected: 0 day<s>, 00:30:04
Bytes out: 5460
Bytes in: 6090
Packets encrypted: 39
Packets decrypted: 91
Packets bypassed: 159
Packets discarded: 1608
Tunnel Option
The following is a sample output from the vpnclient stat command with the tunnel option. The vpnclient stat tunnel command shows only tunneling information.
vpnclient stat tunnel
IPSec tunnel information.
Client address: 220.111.22.30
Server address: 10.10.10.1
Encryption: 168-bit 3-DES
Authentication: HMAC-MD5
IP Compression: None
NAT passthrough is active on port 5000
Route Option
The following is a sample output from the vpnclient stat command with the route option.
vpnclient stat route
Configured routes
Secured Network Destination Netmask Bytes
* 10.10.02.02 255.255.255.255 17638
* 0.0.0.0 0.0.0.0 18998
Event Logging
This section provides information on event logging, including how to capture and view logging information.
Enabling Logging
You must be a system administrator or have access to the global profile (vpnclient.ini) to enable logging. The global profile, located in /etc/CiscoSystemsVPNClient/vpnclient.ini, must include the following parameters:
[main]
EnableLog=1
[LOG.IKE]
LogLevel=3
[LOG.CM]
LogLevel=3
[LOG.PPP]
LogLevel=3
[LOG.CVPND]
LogLevel=3
[LOG.CERT]
LogLevel=3
[LOG.IPSEC]
LogLevel=3
For more information about the global profile, refer to the Cisco VPN Client Administrator Guide.
Viewing Log Files
To view logging information, enter the following command:
/usr/local/bin/ipseclog /directory/clientlog.txt
Note If you did not use the default directory /usr/local/bin during installation, you must enter logging commands using your chosen path.
To view logging information in real time, enter the following command after you start the ipseclog:
tail -f /directory/clientlog.txt
The ipseclog does not automatically go to the background. To send the ipseclog to the background, press Ctrl-Z and enter the bg on the command line, or enter the ampersand symbol (&) at the end of the view command, as shown in the following example:
/usr/local/bin/ipseclog /directory/clientlog.txt &
If the ipseclog is in the background, you must send it to the foreground before you end the VPN client application. To send the ipseclog to the foreground, enter fg on the command line.
Client Auto Update Messages
When the VPN client receives an auto-update notification from the VPN remote access device, it logs the notification, but takes no further action. The message logged upon receipt of an auto-update message has the following format:
688 10:14:23.811 08/08/2001 Sev=Info/4 IKE/0x4300005B^M CLIENT_UPDATE_NOTIFICATION: Client Type="linux" Revisions="3.0.5" URL="tftp://x:/y/z"
To receive auto-update messages and other notifications from the network administrator, use the vpnclient notify command.
Posted: Mon Apr 18 08:43:50 PDT 2005
All contents are Copyright © 1992--2005 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.