ClearPass CLI Guide
ClearPass CLI Guide
6.10.x
Revision 01 | September 2021 ClearPass Policy Manager 6.10.x | CLI Reference Guide
Chapter 1
Command Line Interface
Refer to the following sections to perform configuration tasks using the Policy Manager Command Line
Interface (CLI):
n Cluster Commands
n Select any command from the left navigation menu.
n Miscellaneous Commands
n Network Commands
n Service Commands
n Show Commands
n SSH Timed Account Lockout Commands
n System Commands
Cluster Commands
Select any command from the left navigation menu.
cluster diagnostics
cluster diagnostics
-s [-6]
-c [-6]
-p
-d
-r
Description
Use the cluster diagnostics command to run diagnostics on a Policy Manager cluster. This command supports
both IPv4 and IPv6 management port addresses and uses port number 7432 to collect diagnostics data.
Cluster diagnostics for both IPv4 and Ipv6 environments also include metrics for how much time was taken to
establish a database connection to the publisher, and how much time was taken for HTTPS API calls to the
publisher. These Publisher database connection check and HTTPS connection check to host duration metrics
are in hour:min:sec.microsec format.
The command syntax for an IPv4 management address is:
n On subscriber: appadmin# cluster diagnostics -c
n On publisher: appadmin# cluster diagnostics -s
Parameter Description
ClearPass Policy Manager 6.10.x | CLI Reference Guide Command Line Interface | 3
Parameter Description
-p Runs pgmetrics.
Example
[appadmin]# cluster diagnostics -c 192.0.2.21
Enter Cluster Password for 192.0.2.21
Command History
Version Modification
cluster drop-subscriber
cluster drop-subscriber [-f] [-i <IP address>] -s
Description
Use the drop-subscriber command to remove a specific subscriber node from the cluster.
This command does not support Stateless Address Auto-configuration (SLAAC) IPv6 addresses.
Parameter Description
-i <IP Address> Specify the Management IP address of the node. If this IP address is
not specified and the current node is a subscriber, Policy Manager
drops the current node.
NOTE: The IP address of the subscriber to be dropped must be
passed in the correct format. The IP address format depends on the
cluster communication mode: If the mode is ipv4, use the
subscriber's IPv4 address, otherwise if the mode is ipv6, use the
subscriber's IPv6 address. To verify which cluster communication
mode is configured, use the cluster list command.
Example
The following example removes the IP address 192.0.2.1 from the cluster:
Command History
Version Modification
cluster list
Use the cluster list command to list all the nodes in the cluster, and show whether cluster high availability is
enabled or disabled. The cluster list command also indicates the cluster communication mode (IPv4 or IPv6),
and indicates whether a standby publisher and failover wait time been defined.
Description
cluster list
Description
The following example lists all the nodes in a cluster:
[appadmin]# cluster list
[appadmin@v6-7152-6192]# cluster list
Cluster Commuication Mode: ipv4
Cluster high-availability : ENABLED, Failover wait-time : 8, Standby Publisher : 198.51.100.7
Publisher : Management port IP=198.51.100.3 IPv6=2001:DB8:200:7::150 Data port
IP=203.0.113.190 [local machine]
Subscriber : Management port IP=198.51.100.5 IPv6=2001:DB8:200:7::152 Data port
IP=203.0.113.192
Subscriber : Management port IP=198.51.100.7 IPv6=2001:DB8:200:7::153 Data port
IP=203.0.113.194
When running this command, do not close the shell or interrupt the command execution.
Description
The following example promotes a subscriber to publisher status:
[appadmin]# cluster make-publisher
********************************************************
* WARNING: Executing this command will promote the *
* current machine (which must be a subscriber in the *
* cluster) to the cluster publisher. Do not close the *
* shell or interrupt this command execution. *
********************************************************
Continue? [y|n]: y
cluster make-subscriber
Run the cluster make-subscriber command on a standalone publisher to make the standalone node a
subscriber node and add it to the cluster.
This command does not support Stateless Address Auto-configuration (SLAAC) IPv6 addresses.
Description
cluster make-subscriber -i <IP-address> [-l] [-b] [-V]
The following table describes the required and optional parameters for the make-subscriber command:
-b Instructs Policy Manager to skip making a backup of the publisher before you make it a
subscriber.
-l Restores the local log database after this operation. This parameter is optional.
Description
The following example converts the node with IP address 192.xxx.1.1 to a subscriber node and restores the
local log database:
cluster reset-database
Use the reset-database command to reset the local database and erase its configuration.
Running this command erases the Policy Manager configuration and resets the database to its default
configuration—all the configured data will be lost.
When running this command, do not close the shell or interrupt the command execution.
Description
cluster reset-database
Description
The following example reset the database:
[appadmin]# cluster reset-database
**********************************************************
* WARNING: Running this command will erase the Policy Manager *
* configuration and leave the database with default *
* configuration. You will lose all the configured data. *
* Do not close the shell or interrupt this command *
* execution. *
*********************************************************
Continue? [y|n]: y
cluster set-communication-mode
Click the drop-down list and select either ipv4 or ipv6 as the mode of commuication for all cluster operations.
If the value of this parameter is set to ipv6, all database and API calls will use IPv6 addresses for cluster
communication. If the value is set to ipv4, it will use IPv4 for database and API calls instead. The default value
of the cluster communication mode will depend on the IP address configured on the appliance during
installation or upgrade. If the appliance has only an IPv6 address, the default cluster communication mode will
be IPv6. If the appliance has both IPv4 and IPv6 addresses configured, or if only an IPv4 address is configured,
then the default cluster communication mode will be IPv4.
Whenever the cluster communication mode is changed, it performs the following validations:
n Configuration checks to verify an IP address in the correct format is configured for the interface.
n Certificate checks to verify the database certificates have the correct IP address in the SAN field.
n Certificate checks to verify the HTTPS certificates have the correct IP address in the SAN field.
Description
The following example lists all the nodes in a cluster:
[appadmin]# cluster set-communication-mode ipv4
********************************************************
* *
* WARNING: Executing this command will change *
* the format of the IP address used for all *
* cluster communications and can cause *
* the cluster to go out of sync. *
* *
* Please reset certificates on all nodes *
* and reboot each node to ensure cluster is in sync. *
* *
* Do not close the shell or interrupt this command *
* execution. *
* *
********************************************************
Continue? [y|n]: y
cluster set-cluster-passwd
Use the cluster set-cluster-passwd command to change the cluster password on all nodes in the cluster.
You may only issue this command from the publisher.
Setting the cluster password changes the appadmin password for all the nodes in the cluster
Description
cluster set-cluster-passwd
Description
The following example changes the cluster password on the publisher:
[appadmin]# cluster set-cluster-passwd
cluster set-cluster-passwd
Continue? [y|n]: y
Description
cluster set-standby-publisher [-i <IP Address>]|[-t <Failover wait time>]
-t <Failover wait time> Specify the time (in minutes) that the standby publisher must wait before it assumes the
role of publisher after the primary publisher becomes unreachable. This parameter
prevents the standby publisher from taking over when the publisher is temporarily
unavailable during a restart. The default failover wait time is 10 minutes.
Description
The following example defines a standby publisher and sets the failover wait time to five minutes:
[appadmin]# cluster set-standby-publisher -i 10.21.4.33 -t 5
failover time = 5
cluster sync-cluster-passwd
Use the cluster sync-cluster-passwd command to synchronize the cluster (appadmin) password currently
set on the publisher with all the subscriber nodes in the cluster.
Synchronizing the cluster password changes the appadmin password for all the nodes in the
cluster
Description
cluster sync-cluster-passwd
Description
The following example synchronizes the cluster password:
[appadmin]# cluster sync-cluster-passwd
Continue? [y|n]: y
Description
Use the cluster list command to list all the nodes in the cluster, and show whether cluster high availability is
enabled or disabled. The cluster list command also indicates the cluster communication mode (IPv4 or IPv6),
and indicates whether a standby publisher and failover wait time been defined.
Example
The following example lists all the nodes in a cluster:
Command History
Version Modification
cluster make-publisher
cluster make-publisher
Description
Use the cluster make-publisher command to promote a specific subscriber to be the publisher in the same
cluster.
Before you promote a subscriber to publisher, add the HTTPS server certificate of the subscriber to the Trust list and
ensure sure all the servers in the cluster have this certificate in the Trust list. This step is not required if the HTTPS
server certificates for all the servers in the cluster are signed by a certificate authority (CA)
When running this command, do not close the shell or interrupt the command execution.
Command History
Version Modification
cluster make-subscriber
cluster make-subscriber -i <ip-address> [-l] [-b] [-V]
Description
Run the cluster make-subscriber command on a standalone publisher to make the standalone node a
subscriber node and add it to the cluster.
This command does not support Stateless Address Auto-configuration (SLAAC) IPv6 addresses.
Parameter Description
-l Restores the local log database after this operation. This parameter
is optional.
Example
The following example converts the node with IP address 192.0.2.1 to a subscriber node and restores the local
log database:
Version Modification
cluster reset-database
cluster reset-database
Description
Use the reset-database command to reset the local database and erase its configuration.
Running this command erases the Policy Manager configuration and resets the database to its default
configuration—all the configured data will be lost.
When running this command, do not close the shell or interrupt the command execution.
Example
The following example resets the database:
Command History
Version Modification
cluster set-cluster-passwd
cluster set-cluster-passwd <password>
Setting the cluster password changes the appadmin password for all the nodes in the cluster
Parameter Description
Example
The following example changes the cluster password on the publisher:
Command History
Version Modification
cluster set-standby-publisher
cluster set-standby-publisher [-i <IP Address>]|[-t <Failover wait time>]
Description
Use the cluster set-standby-publisher command to set a standby publisher for cluster high availability. You
may only issue this command from the publisher.
If a cluster is configured with a standby publisher, add the HTTPS server certificate of the standby publisher to the
Trust list and ensure sure all the servers in the cluster have this certificate in the Trust list. This step is not required if
the HTTPS server certificates for all the servers in the cluster are signed by a certificate authority (CA)
Parameter Description
-t <Failover wait time> Specify the time (in minutes) that the standby publisher must wait
before it assumes the role of publisher after the primary publisher
becomes unreachable. This parameter prevents the standby
publisher from taking over when the publisher is temporarily
unavailable during a restart. The default failover wait time is 10
minutes.
Example
The following example defines a standby publisher and sets the failover wait time to five minutes:
Command History
Version Modification
cluster sync-cluster-passwd
cluster sync-cluster-passwd
Description
Use the cluster sync-cluster-passwd command to synchronize the cluster (appadmin) password currently
set on the publisher with all the subscriber nodes in the cluster.
Synchronizing the cluster password changes the appadmin password for all the nodes in the
cluster
Example
The following example synchronizes the cluster password:
Command History
Version Modification
configure date
configure date -p <ntp_server1> [-a <key-index> -v <key-value> -t <encryption-type>] [-s <ntp_
server2> [-a <key-index> -v <key-value> -t <encryption-type>]] [-z <timezone>]
Description
Use the configure date command to specify the cluster's primary and secondary NTP (Network Time
Protocol) servers, the key index, key value, encryption type, and optionally, the time zone for the publisher.
The Audit Viewer (Monitoring > Audit Viewer) tracks NTP configuration changes.
The following table describes the parameters for the configure date command:
Parameter Description
-p <ntp_server1> Specify the primary NTP server name or IP address. Policy Manager
can support up to five NTP servers; one primary server, and up to
four secondary servers. Users should be aware that ClearPass can
time sync with any of the configured NTP servers in any order. It
does not need to prefer the primary NTP server first and then the
secondary as per configuration.
NOTE: You can specify a destination node with an IPv6 address
enabled.
-a <key-index> The Key Index (also referred to as the Key ID) is a number that
specifies the index for key values.
The key-index value can be from 1 to 65534 inclusive.
Typically an NTP client and server have to trust the same key index
and key value pair for authentication to succeed.
-v <key-value> The Key Value is a form of shared secret, which both the client and
server use for authenticating NTP messages. The Key Value can be:
n Up to 20-character printable ASCII string
n Up to 40-character hex value
When entering an ASCII string for the Key Value, note that it cannot
contain the following characters:
n & (ampersand)
n ; (semicolon)
n `(grave accent)
n | (pipe)
n < (left angle bracket)
n > (right angle bracket)
n ( (left parenthesis)
n ) (right parenthesis)
Finally, the Key Value ASCII string must start and end with one of
the following characters:
n - (hyphen)
n ' (apostrophe)
n " (quote)
Examples
The following example configures the key-index, key-value, and encryption type for the primary and secondary
NTP servers:
This example synchronizes with the primary NTP server. Note that in this example, the key-value is a hex code.
Using a hex code for the key-value is supported only in the CLI, not in the user interface.
Command History
Version Modification
configure dns
configure dns -p <dnsserver> [-s <dnsserver>] [-t <dnsserver>] [-n <attempts>] [-o <timeout>]
Parameter Description
-p <dnsserver> Define the primary DNS server, where <dnsserver> is the IPv4 or
IPv6 address of a DNS server.
-s <dnsserver> (Optional) Define the second DNS server, where <dnsserver> is the
IPv4 or IPv6 address of a DNS server.
-t <dnsserver> (Optional) Define the third DNS server, where <dnsserver> is the
IPv4 or IPv6 address of a DNS server.
-n <attempts> (Optional) Specify the maximum number of attempts. The value can
be from 1 to 5, and the default is 2.
Examples
The following example configures a single primary DNS server.
The following example configures the primary and secondary DNS servers with the maximum number of
attempts set at 5, and with a 30 second timeout. You can configure an IPv6 address as described in this
example.
Command History
Version Modification
configure fips-mode
configure fips-mode [0|1]
Running this command erases the ClearPass Policy Manager configuration settings and returns the database to the
default configuration. All configured data will be lost. This command also shuts down all running applications and
reboots the system.
Parameter Description
Example
The following example disables FIPS mode:
Command History
Version Modification
configure hostname
configure hostname <hostname>
Description
Use the configure hostname command to configure the host name of the Policy Manager server. When
configuring a host name that includes a period character ( . ), the substring before the first period character
must be unique for each device. This is because a hostname field that includes a period character is interpreted
to be a Fully Qualified Domain Name (FQDN), in which case the substring before the first period character is the
hostname.
Valid hostname configurations:
Parameter Description
Example
The following example configures a hostname:
Command History
Version Modification
configure ip
configure ip <mgmt|data> <ip_address> netmask <netmask address> gateway <gateway address>
Description
Use the configure ip command to configure the IPv4 address of the management interface or the data
interface, netmask, and gateway address.
Parameter Description
ip <mgmt|data> <IP address> Specify the network interface type: management port interface or
data point interface.
<ip address> specifies the IPv4 address of the host.
gateway <gateway address> Specify the IP address for the network gateway.
Example
The following example configures the IP address for the data interface, the netmask for that address, and the
gateway address:
Version Modification
configure ip6
configure ip6 <mgmt|data> <IPv6 address>/<PrefixLen> gateway <gateway address>
Description
Use the configure ip6 command to configure the IPv6 management or data interface, IPv6
address/PrefixLength, and the gateway address.
Policy Manager uses Stateless Address Auto-Configuration (SLAAC) to obtain IPv6 addresses when IPv6 router-
advertisements are enabled. If a Policy Manager instance is configured with an IPv4 and an IPv6 address (dual-
stack), then after upgrade the static IPv6 address is retained and, if IPv6 router-advertisements are enabled, a
SLAAC IPv6 address will also be obtained. If no static IPv6 is configured, addresses obtained by SLAAC are
shown in the server details on the Administration > Server Manager > Server Configuration page.
If a Policy Manager sever's network settings are configured to have only an IPv6 address for the management
port, the Admin Server service and Async network service service connect to an IPv6 address for an
external server's hostname, even if that hostname resolves to both an IPv4 and IPv6 address (dual-stack). If
the Policy Manager management port has a IPv4 address, then the IPv4 address of the external server will be
preferred for connectivity by the Admin server and Async network service services.
During bootstrap configuration, anycast, multicast, and site-local addresses (Unique Local Addresses) are not
allowed as management or data port interface address.
Parameter Description
<prefixLen> Enter the prefix length. The prefix length in IPv6 is the equivalent of the subnet
mask in IPv4.
Example
The following example configures the IPv6 management or data interface, IPv6 address/PrefixLength, and
gateway address:
Version Modification
configure mtu
configure mtu <mgmt|data> <mtu-value>
Description
Use the configure mtu command to set the MTU (Maximum Transmission Unit) for the management and
data port interfaces.
Running this command can cause the Policy Manager server to lose network connectivity.
Parameter Description
<MTU value> Specify the MTU value in bytes. The default value is 1500 bytes.
Examples
The following example configures the MTU management interface:
Use the show ip command to display the settings of the MTU management and data port interfaces:
[appadmin]# show ip
===========================================
Device Type : Management Port
-------------------------------------------
IPv4 Address : 10.2.xx.86
===========================================
Command History
Version Modification
configure port
configure port <direction> <protocol> <port> <action>
Parameter Description
<direction> Specify the access control rule direction. Allowed values are:
n input
n output
<port>
Specify the port number (1-65535)
<action>
Select filtering action
Allowed values are:
n accept
n reject
Example
The following example configures the Policy Manager server to block SSH conection requests to the Policy
Manager server by rejecting SSH connections to port 22.
Command History
Version Modification
configure timezone
configure timezone
Description
Use the configure timezone command to interactively configure the time zone. The Policy Manager
command-line interface prompts you to enter a continent or ocean, a country, and for countries with more
than one time zone, also the region where your Policy Manager server is located.
Example
The following example interactively configures the time zone for a Policy Manager server in the United
States/Pacific time zone:
Related Commands
Command Description
Command History
Version Modification
Network Commands
Select any command from the left navigation menu.
network ip
network ip
add <mgmt|data|greN|vlanN> [-i <id>] <[-s <SrcAddr>] [-d <DestAddr>]> [-g <ViaAddr>]
del [-i <id>]
list
reset
Description
Use the network ip command to add, delete, or list custom routes to the data or management interface
routing table for IPv4 networks. Note that network IP routing commands are disabled for ClearPass cloud
deployments (such as deployments hosted in Azure or AWS) because:
n The network IP assignments are managed by the cloud networking vendor.
n The process through which the cloud deployment DHCP and IP assignments are not managed by ClearPass,
so there is no way to define static IP addresses
n The routing configuration defined in the cloud deployment will no longer be valid if the system renews its IP
address in the next DHCP refresh cycle.
add <mgmt | data| greN |vlanN> Add a custom route by specifying the management interface, data
interface, the name of the GRE tunnel, or the VLAN number.
n <greN>: N identifies the GRE tunnel number ranging from
1,2,3...N.
n <vlanN>: N identifies the VLAN number.
-i <id> Specify the ID of the network IP rule. If this ID is not specified, the
system generates an ID automatically.
NOTE: This ID determines the priority in the ordered list of rules in
the routing table.
-g <ViaAddr> Specify the via or gateway IPv4 address through which the network
traffic should flow. A valid IP address is allowed. This parameter is
optional.
del -i <id> Delete the network IPv4 route with the specified route ID.
reset Reset the routing table to the factory default settings. All custom
routes are removed.
Example:
The following example adds a custom route:
Command Description
network ip6 Add, delete, or list custom routes to the data or management
interface routing table for IPv6 networks.
Command History
Version Modification
network ip6
network ip6
add <mgmt|data|greN|vlanN> [-i <id>] <[-s <SrcAddr>] [-d <DestAddr>]> [-g <ViaAddr>]
del [-i <id>]
list
reset
Description
Add, delete, or list custom routes to the data or management interface routing table for IPv6 networks. Note
that network IP routing commands are disabled for ClearPass cloud deployments (such as deployments hosted
in Azure or AWS) because:
n The network IP assignments are managed by the cloud networking vendor.
n The process through which the cloud deployment DHCP and IP assignments are not managed by ClearPass,
so there is no way to define static IP addresses
n The routing configuration defined in the cloud deployment will no longer be valid if the system renews its IP
address in the next DHCP refresh cycle.
Parameter Description
add <mgmt | data| greN |vlanN> Add a custom route by specifying the management interface, data
interface, the name of the GRE tunnel, or the VLAN number.
n <greN>: N identifies the GRE tunnel number ranging from
1,2,3...N.
n <vlanN>: N identifies the VLAN number.
-i <id> Specify the ID of the network IP rule. If this ID is not specified, the
system generates an ID automatically.
NOTE: This ID determines the priority in the ordered list of rules in
the routing table.
-g <ViaAddr> Specify the via or gateway IPv6 address through which the network
traffic should flow. A valid IP address is allowed. This parameter is
optional.
del -i <id> Delete the network IPv6 route with the specified route ID.
reset Reset the routing table to the factory default settings. All custom
routes are removed.
Example:
The following example adds a custom route:
Related Commands
Command Description
Version Modification
network ping
network ping [-i <SrcIPv6Addr>] [-t] <host>
Description
Test the reachability of the host on an IPv4 network
Parameter Description
-i <SrcIPv6Addr> The originating IPv4 address for the ping. This parameter is optional.
Example
The following example pings an IPv4 network host to test its reachability:
[appadmin]# network ping6 –i 192.0.2.11 –t or.us.example.com
Related Commands
Command Description
Command History
Version Modification
network ping6
network ping6 [-i <SrcIPv6Addr>] [-t] <host>
Parameter Description
-i <SrcIPv6Addr> The originating IPv6 address for the ping. This parameter is optional.
Example
The following example pings an IPv6 network host to test its reachability:
[appadmin]# network ping6 –i f2001:db8:: –t ca.us.example.com
Related Commands
Command Description
Command History
Version Modification
network reset
network reset data|mgmt [v4|v6]
Description
Use the network reset command to reset the network data and management ports. You can use this
command to reset both IPv4 and IPv6 addresses. Before resetting an IPv4 address for the port, ensure than an
IPv6 address is set for the port and that the cluster communication mode is set to IPv6. Conversely, before
resetting an IPv6 address for the port, ensure that an IPv4 address is set for it and that the cluster
communication mode is set to IPv4. Before Policy Manager resets an IPv4 or IPv6 address, it displays the
warning message "This command erases network management port configuration and reconfigures the
network. This might cause the system to lose network connectivity and require you to log in again."
Parameter Description
Examples
The following example resets the IPv4 network data port.
Command History
Version Modification
network traceroute
network traceroute <host>
Description
Print the route taken to reach the IPv6 network host.
Example
The following example prints the route taken to reach the network host:
Related Commands
Command Description
network traceroute6 Print the route taken to reach the IPv6 network host.
Version Modification
network traceroute6
network traceroute6 <host>
Description
Print the route taken to reach the IPv6 network host.
Example
The following example prints the route taken to reach the network host:
Related Commands
Command Description
network traceroute Print the route taken to reach the IPv4 network host.
Command History
Version Modification
network nslookup
network nslookup [-q <query-option>] <host>
Description
Use the network nslookup command to get the IP address of the host using DNS.
Examples
The following example obtains the IPv4 address of the host or domain using DNS:
The following examples perform network nslookups for a destination with an IPv6 address:
Command History
Version Modification
Miscellaneous Commands
Select any command from the left navigation menu.
ad auth
ad auth -u <username> -n <NetBIOS domain name>
Parameter Description
-n <domain NetBIOS name> Specifies the domain name. This field is optional.
Description
[appadmin]# ad auth -u jbrown -n sanfranedu
You are prompted to enter the password. If the username and password you provide in this command are
correct, the following message is displayed:
This message indicates that NT LAN Manager (NTLM) authentication (NTLM being the mechanism that
Policy Manager uses to authenticate users) has succeeded.
Command History
Version Modification
ad netjoin
ad netjoin <domain-controller.domain-name> [domain NetBIOS name] [domain REALM name]
[ou=<object container>]
Description
Use the ad netjoin command to join the host to the domain.
Parameter Description
<domain-controller. domain-name> Specify the complete Fully Qualified Domain Name (FQDN) of the
domain controller, including its hostname.
For example, if atlas.org is the Domain FQDN and DC01.atlas.org is
one of its domain controllers, then this argument would be correctly
expressed as DC01.atlas.org
This field is mandatory.
[domain NetBIOS name] Specify the NetBIOS name of the domain (optional argument).
[domain REALM name] You can specify this argument if the derived REALM is different from
the actual. This is an optional argument.
[ou=<object container>] If the computer account must be created in a different OU, this
argument specifies the Object Container .
For example 'ou=Domain Computer' OR 'ou=Domain
Computer+Linux Hosts'.
Note the usage of the separator '+' to specify the OU hierarchy.
Example
The following example joins the host to the domain:
Command History
Version Modification
ad netleave
ad netleave <domain NetBIOS name> [-f]
Description
Use the ad netleave command to remove the host from the domain.
Parameter Description
<domain NetBIOS name> Specifies the host to be joined to the domain. This field is
mandatory.
Example
The following example removes the host from the domain examplecollege.edu.
Version Modification
ad passwd-server
ad passwd-server
Description
Use the ad passwd-server command to do the following tasks:
n Set the Active Directory password servers.
n List the configured Active Directory password servers.
n Reset the Active Directory password servers.
When an Active Directory password server is updated in the domain server configuration, the RADIUS service is
restarted.
Parameter Description
list -n <domain NetBIOS name> List the configured password servers for the specified
domain name.
reset -n <domain NetBIOS name> Reset the password servers for the specified domain name.
Example
The following example sets a password server for the domain examplecollege.edu.
Command History
Version Modification
Description
Use the ad testjoin command to test if the ad netjoin command succeeded. This command also tests
whether Policy Manager is a member of the Active Directory domain.
Parameter Description
<domain NetBIOS name> Specifies the host to be joined to the domain. This field is
mandatory.
Example
The following example tests if the ad testjoin command succeeded:
Command History
Version Modification
alias
alias <name>=<command>
Description
Use the alias command to create or remove aliases.
Parameter Description
Examples
This example set the alias sh for the show command:
Command History
Version Modification
backup
backup [-f <filename>] [-c] [-l] [-r] [-w] [-P]
Description
Use the backup command to create a backup of Policy Manager configuration data. If no arguments are
entered, the system automatically generates a filename and backs up the configuration to this file.
Parameter Description
[-f <filename>] Specify the backup target by defining a file name. If not specified,
Policy Manager automatically generates a file name.
-w Back up only the most recent records from the log database (the
last one week).
Example
[appadmin]# backup -f PolicyManager-data.tar.gz
Continue? [y|Y]: y
Command History
Version Modification
Description
Use the dump certchain command to remove the certificate chain of any SSL-secured server.
Parameter Description
Example
The following example dumps the certificate chain of an SSL-secured server:
Command History
Version Modification
dump logs
dump logs
-f <output-file-name> [-s yyyy-mm-dd] [-e yyyy-mm-dd] [-n <days>] [-t <log-type>
[<filter>]]
-o [-r] [-v] [-q "yyyy-mm-dd HH:MM"] [-u HH:MM] [-i <tac-case-id>] [-m "<policy-manager-
service>"] [-n <days>] [-h]
-f <output-file-name> -b <scp|sftp> --user=<username> --password=<password> --
host=<hostname> --remote_dir=<directory>
-h
Description
Use the dump logs command to remove Policy Manager application log files. If you are working with Aruba
technical support, you can use the dump logs command to tag a .tar file of log messages with a date, and
server and company information, then upload that file to an Aruba log server.
If you use the dump logs command to schedule the collection of log files, be aware of the following caveats:
n When you schedule log collection, Policy Manager services collects logs in DEBUG mode. After the log files
are collected, the collected services reset from DEBUG mode to their default logging level.
n You can schedule log collection without specifying the debug duration and list of services names. This result
in directly collecting the logs at specified date and time.
n If log levels are not yet changed, you can delete the log collection schedule without using the -z force delete
option.
Parameter Description
-b <scp|sftp> Send collected logs to backup server using the specified protocol:
n scp: send logs using Secure Copy Protocol (SCP)
n sftp: Send logs using Secure File Transfer Protocol (SFTP)
-r Delete the schedule for log collection, use -z option with -r to try force
delete
-v View the schedule for log collection and status of last log collection
-q Start date and time to set Policy Manager services log level to DEBUG
mode
-m ["<policy-manager-service>"] Policy Manager service name to set log level to DEBUG mode
Use the following Policy Manager service names with the<policy-
manager-service> parameter. Note that the service names need to be
entered inside quotation marks, for example, "ClearPass Network
Services"
n ClearPass network services
n Syslog client service
n TACACS+ server
n Admin serve r
n Micros Fidelio FIAS
n AirGroup notification service
n DB change notification server
n Async network services
n Radius server
n RadSec service
n Zone cache
n Policy server
n DB replication service
--user=<username> Specify a user name to authenticate to a remote directory and upload log
files.
--host=<hostname> Specify the host name or IP address of a the server where the log files
will be uploaded
--remote_dir=<directory> Specify the name of the remote directory where the log files will be
uploaded.
-h =
print help with the types of logs available
To upload log files to an Aruba log server to assist with a technical support issue.
[appadmin]#dump logs -f <output-file-name> -b <scp|sftp> --user=username --password=password -
-host=hostname --remote_dir=directory
where:
-b <scp|sftp> : Specify protocol to copy logs archive to remote server
--host = Hostname or IP address of the remote server
--user = Username allowed to copy the file to remote server
--password = Password configured for the Username, allowed on the remote server
--remote_dir = Remote directory to which logs archive will be copied into tmp folder
Examples
The following example uploads log files to an Aruba log server to assist with a technical support issue.
The following example prints help for the available log types:
Command History
Version Modification
dump servercert
dump servercert <hostname:port-number>
Description
[appadmin]# dump servercert ldap.acme.com:636
Use the dump servercert command to remove the server certificate of an SSL-secured server.
Parameter Description
Example
The following example removes the server certificate of the specified SSL-secured server:
Command History
Version Modification
exit
exit
Description
Use the exit command to exit the Policy Manager shell.
Example
The following example exits the shell:
Command History
Version Modification
help
help
Description
Use the help command to display the list of supported Policy Manager commands:
Example
The following example displays the list of supported commands:
[appadmin]# help
ad Domain Controller set of commands
alias Create aliases
backup Backup Policy Manager data
cluster Policy Manager cluster related commands
configure Configure the system parameters
dump Dump Policy Manager information
exit Exit the shell
help Display the list of supported commands
krb Kerberos authentication commands
ldapsearch Search entries in the LDAP repository
network Network troubleshooting commands
quit Exit the shell
restore Restore Policy Manager database
service Control Policy Manager services
show Show configuration details
ssh SSH Lockout related commands
system System commands
Command History
Version Modification
krb auth
krb auth <user@domain>
Parameter Description
Example
The following example performs a kerberos authentication against a kerberos server:
Command History
Version Modification
krb list
krb list
Description
Use the krb list command to list the cached Kerberos tickets.
Example
The following example lists the cached Kerberos tickets:
Command History
Version Modification
Description
Use the Linux ldapsearch command to find objects in an LDAP directory. Note that only the Policy Manager-
specific command line arguments are listed. For other command line arguments, refer to ldapsearch man
pages on the Internet.
Parameter Description
<user@hostname> Specify the user name and fully qualified domain name of the host in
the format username@domain.
Description
The following example finds objects in an LDAP directory:
Version Modification
quit
quit
Description
Use the quit command to exit the Policy Manager command shell.
Example
The following command quits the shell:
[appadmin]# quit
Command History
Version Modification
restore
restore [{<user@hostname>:/}|{http://<hostname>/}]<backup-filename> [-l] [-i] [-b] [-c] [-r]
[-n|-N] [-s]
Description
Use the restore command to restore Policy Manager configuration data from the backup file.
Parameter Description
<user@hostname>:/ Specify a user and a hostname to be used with the <backup-filename> parameter to
specify the filepath of the restore source.
<hostname> Specify hostname to be used with the <backup-filename> parameter to specify the
filepath of the restore source.
-b Do not backup the current configuration data before the restore operation starts.
-l If it exists in the backup file, restore the Policy Manager log database. This field is
optional.
-i Ignores version mismatch errors and attempts data migration. This field is optional.
-n Retain local node configuration data, such as certificates, after the restore operation
(default).
-N Do not retain local node configuration data after the restore operation.
-s Restore cluster server/node entries from the backup file. Node entries are in a
disabled state upon restore. This field is optional.
Example
The following example restores Policy Manager configuration data from the backup file:
Command History
Version Modification
ssh lockout
ssh lockout
count <n>
duration <N mins>
mode <basic|advanced>
reset
Description
Configure the SSH timed lockout feature. This feature provides an administrator with the ability to configure
the number of successive unsuccessful authentication attempts for administrators attempting to authenticate
remotely. The SSH timed account lockout feature configuration persists across reboots, updates and upgrades.
The account lock status persists across reboots.
When the defined number of unsuccessful authentication attempts has been met, the CLI account is locked
and administrators cannot log in to the system via the CLI until one of the following conditions are met:
n The offending remote administrator cannot successfully authenticate until an action is taken by a local
administrator (the administrator issues the ssh unlock command).
Parameter Description
count The maximum failed SSH password login attempts before the
account attempting the logins is locked out. Supported values are 1-
1000. The default value is 5 attempts.
duration The number of minutes account will remain locked after the account
exceeds the maximum number of SSH login attempts. Supported
values are 1-10080. The default value is 15 minutes.
mode <basic|advanced> mode <basic|advanced> command sets the mode for this feature.
In basic mode, login failures via SSH public key methods are not
counted towards the account lockout, while in advanced mode, login
failures via SSH public key failures are counted towards the account
lockout.
Related Commands
Command Description
Command History
Version Modification
Service Commands
Select any command from the left navigation menu.
service
service <action> <service-name>
Description
Use the service <action> <service-name> command to control the specified Policy Manager service.
n cpass-igssyslog-server
n cpass-igslogger-server
n cpass-igslogrepo-server
n cpass-ipsec-service
n cpass-zone-cache-server
n cpass-policy-server
n cpass-radius-server
n cpass-radsec
n cpass-repl-server
n cpass-statsd-server
n cpass-sysmon-server
n cpass-system-auxiliary-server
n cpass-tacacs-server
n cpass-vip
n fias_server
Example
The following example lists all Policy Manager services:
Command History
Version Modification
show all-timezones
show all-timezones
Description
View all available time zones.
Example
The following displays an example of the show all-timezones command output.
Related Commands
Command Description
Command History
Version Modification
show date
show date
Description
View the system date, time, and time zone information.
Command History
Version Modification
show domain
Use the show domain command to view the Active Directory Domain controller information.
The show domain command is operational only when the current Policy Manager server is joined to an Active
Directory domain.
Description
show domain
Example
The following displays an example of the show domain command output:
Command History
Version Modification
Description
show dns
Example
The following example of show dns command output displays the DNS servers configured for the current
Policy Manager server:
===========================================
Command History
Version Modification
show fipsmode
show fipsmode
Description
Determine whether FIPS (Federal Information Processing Standard) mode is enabled or disabled.
Example
The following example shows that FIPS mode is enabled:
Version Modification
show hostname
show hostname
Description
View the hostname of the current Policy Manager server.
Example
The following displays an example of the show hostname command:
Command History
Version Modification
show ip
show ip
Description
View the IPv4, IPv6, and DNS information of the host.
Example
The following example of the show ip command displays the IPv4, IPv6, and DNS information of the host:
[appadmin]# show ip
===========================================
Device Type : Management Port
-------------------------------------------
IPv4 Address : 192.0.2.15
Subnet Mask : 255.255.255.0
Gateway : 192.0.2.1
IPv6 Address : 2001:db8:1:2:020c:29ff:fe0c:4703
===========================================
Command History
Version Modification
show license
show license
Description
View the Policy Manager license information.
Example
The following displays an example of the show license command output.
Command History
Version Modification
show ntp
show ntp
Description
View the IP addresses of the primary and secondary Network Time Protocol (NTP) servers configured for the
current Policy Manager server. The show ntp command also displays information such as the NTP
Example
The following displays an example of the show ntp command output:
Command History
Version Modification
show sysinfo
show sysinfo
Description
View the node uptime, disk utilization, and memory utilization information.
Example
The following displays an example of the show sysinfo command output.
Version Modification
show ssh
show ssh
Description
View SSH timed lockout settings.
Example
The following displays an example of the show ssh command output for non-default SSH lockout settings.
If the SSH lockout feature is not configured and is currently using all default values, the ssh lockout details
section of the output will show only <not-configured>.
Command Description
Command History
Version Modification
show timezone
show timezone
Description
Use the show timezone command to view the current system time zone.
Example
The following displays an example of the show timezone command output:
Related Commands
Command Description
Command History
Version Modification
show version
show version
Example
The following displays an example of the show version command output:
Command History
Version Modification
System Commands
Select any command from the left navigation menu.
system admin-password-reset
system admin-password-reset
Description
Resets the admin password for the Policy Manager WebUI back to the default setting of eTIPS123.
Command History
Version Modification
system apps-access-reset
system apps-access-reset
Example
The following example resets the access control restrictions for Policy Manager:
Command History
Version Modification
system boot-image
system boot-image {-l}|{-a <version>}
Description
Use the system boot-image command to set system boot image control options.
Parameter Description
Example
The following example lists the system boot images. The index number for each entry is displayed in front of
the image version.
The following example sets the active boot image to the image in index 0
Version Modification
system cleanup
system cleanup <num_days>
Description
Use the system cleanup command to perform a system cleanup operation that purges the following records:
n System and application log files
n Past authentication records
n Audit records
n Expired guest accounts
n Past auto and manual backups
n Stored reports
Parameter Description
<num_days> This is the cleanup interval that specifies the number of days to
retain the data. This field is mandatory.
Example
The following example performs a system cleanup operation that retains records for four days:
********************************************************
* *
* WARNING: This command will perform system cleanup *
* operation that will result in purging of: *
* [*] system and application log files *
* [*] past authentication records *
* [*] audit records *
* [*] expired guest accounts *
* [*] past auto and manual backups *
* [*] endpoints *
* [*] stored reports etc... *
* *
********************************************************
Are you sure you want to continue? [y|n]: y
INFO - Starting system cleanup
INFO - Purging diagnostic dumps
INFO - Detected empty core directory
INFO - Performing system cleanup tasks
INFO - Purging platform logs
INFO - Purging application logs
Command History
Version Modification
system create-api-client
system create-api-client <Client_ID> <Client_Secret>
Description
Create a new API client.
Parameter Description
Example
The following example creates an API client by specifying the client ID and client secret.
Command History
Version Modification
system export-endpoints-csv
system export-endpoints-csv
Description
use this command to export endpoints and endpoint profile details to a zip file that can be downloaded from
Admin UI - Backup files under Administration > Server Manager > Local Shared Folders. When using
an XML file to export or import a very large number of endpoints, performance is sometimes degraded.
When using an XML file to export a very large number of endpoints (> 250 K), performance is sometimes
degraded or the user interface hangs and out-of-memory error messages are logged. Although exporting CSV
Command History
Version Modification
system factory-reset
system factory-reset
Description
The system factory-reset command restores a Policy Manager hardware appliance to factory defaults. This
command is available only to the appadmin user on a physical appliance. It is not available on a virtual
machine.
The system factory-reset command is inherently a destructive one as it wipes out data, including any licenses on
the current partition and any backups currently stored on the server. Hence, the user should create data backups
outside of the target Policy Manager server before running this command. This command is not available on Policy
Manager installations hosted on a cloud services platform such as Amazon Web Services (AWS) or Azure.
Command History
Version Modification
system gen-recovery-key
system gen-recovery-key
Description
Support engineers use this password to generate the recovery key for the Policy Manager server.
Example
The following example generates the recovery key for the system:
Command History
Version Modification
system gen-support-key
system gen-support-key
Description
The system gen-support-key command uses the Support Engineer's email ID to generate a token that the
Support Engineer can use to generate a password that allows privileged access to the Policy Manager server.
Example
The following example generates the support key for the system:
Command History
Version Modification
system install-image
system install-image
{http|https}://<hostname>/<filename>
<user@hostname>:/<filename>
<filename>
This command is not available on Policy Manager installations hosted on a cloud services platform such as Amazon
Web Services (AWS) or Azure.
After successful execution of the system install-image command, the system will reboot and you will return
to the installed image. After successful configuration and reboot, you will be presented with the bootstrap
configuration screen, where you will have to reset all the ClearPass parameters.
Any data present in the second partition prior to the execution of the system install-image command will be wiped
out. Also, no licensing information from where the command is executed is carried forward.
You can apply the system install-image command in the following ways:
Parameter Description
{http|https}://<hostname>/<filename> Install the specified Policy Manager image through HTTP or HTTPS.
< user@hostname>:/<filename> Specify the username and hostname to install the selected file
through SCP (Secure Copy Protocol).
<filename> Install the specified image imported to the Policy Manager server
and available locally (offline install-image).
Example
[appadmin]# system install-image http://cppm.example.com/downloads/6.8.0/CPPM-x86_64-
6.8.0.109568-upgrade.signed.tar
Command History
Version Modification
system morph-vm
system morph-vm C1000V|C2000V|C3000V
When you use the system morph-vm CLI command in Policy Manager 6.7 or later to morph a virtual
appliance (VA) to a larger size, all the licenses are deleted. This issue does not affect configuration data.
After the upgrade, contact Aruba's Technical Assistance Center (TAC) to have the licenses activated
again.
Parameter Description
<vm-version> Select a virtual appliances type. The following options are available:
n C1000V
n C2000V
n C3000V
Example
The following example converts an evaluation virtual appliance to a production C3000V virtual appliance:
Command History
Version Modification
system patch-rollback
system patch-rollback
Before using this command to revert command to revert from 6.10.x to 6.10.0, you must first download the 6.10.0_
source-rollback-package from the Software Updates page and install it .
When issuing the system patch-rollback command, keep in mind the following points:
n Patch-rollback is supported only for Policy Manager versions 6.7 and above.
n The system patch-rollback command reverts only the most recently installed cumulative patch update
within the major version. After the cumulative patch is reverted, the user will be in the patch version that
was installed prior to the patch update.
The system patch-rollback command cannot be used after an upgrade to revert to an earlier major version.
n Although you can only roll back to the last version that was installed, if multiple hotfix patches are included
within the cumulative patch version you are rolling back from, then you can roll back multiple hotfix
patches, one at a time, to a specific hotfix within the current version. To roll back to the previously installed
version, you must first roll back each intervening hotfix patch.
n As best practice, users should always back up all data before proceeding with an update.
n This command can also be used at the cluster level. In this case, system patch-rollback must be run
individually on each appliance in the cluster within 24 hours after the rollback in order to maintain the
cluster status. For patch rollback across a cluster, the appadmin user must go to each Policy Manager server
in the cluster to rollback the last applied patch.
n Any custom skins that are installed in the current version are retained after the rollback to the earlier
version.
n System rollback events are logged in the Event Viewer.
Example
[appadmin]# system patch-rollback
****************************************************************************************
* WARNING: This command is recommended to be executed from local console unless otherwise
instructed by TAC * Execution through SSH console may result in system instability.*
* WARNING: This command will undo software changes done by the currently installed patch.
Configuration
*changes should not be affected by this action.
* As a best practice, please be sure to back-up this system before starting the operation.
*
* Are you sure you want to continue? y
******************************************************************************************
INFO: Preparing for rollback
INFO: 2018022-clearpass-6.8-updates-2 will be rolled back
INFO: This will take a few minutes to complete. Please wait.
For example, if Policy Manager has been installed in the order 6.x.0 > 6.x.1 > 6.x.2, when the appadmin user
executes the system patch-rollback command, the system would revert to a time just before Policy Manager
6.x.2 was installed.
If, in this example, the installed 6.x.2 patch added an rpm-X, system patch-rollback deletes rpm-Y, and
updates rpm-Z to rpm-Z+1 version. Then system patch-rollback deletes rpm-X, adds rpm-Y, and restores
rpm-Z.
Also note that if, for example, a system was at 6.x.0 and cumulative update 6.x.3 is applied, the system can
only be reverted to 6.x.0 because that was the last installed version. It cannot be reverted to 6.x.2.
For more information, refer to the "After You Update: Performing a Patch Rollback" section in the most recent
version of the ClearPass Release Notes.
The system patch-rollback command also removes any configuration and database changes that were done as
part of post-installation during the patch update.
Command History
Version Modification
system refresh-license
system refresh-license
Description
Refresh the license count information.
Example
The following example refreshes the license count information.
Version Modification
system refresh-network
system refresh-network
Description
Refresh the newly added or removed network adapters in Policy Manager so that they are reflected in the
system. This command also enforces network adapter ordering and associates the lower-order MAC address to
eth0 and the next higher-order MAC address to eth1, and so on. Ensure that you have the console session
available.
The system refresh-network command is useful when you bring up a virtual appliance without one or more
of the network interface cards (NICs) and you then add them at a later stage. This command is required when
you delete NICs and add them back into the system (VMware ESXi may generate new MAC addresses as a
result).
For the network refresh to take effect, you must reboot the Policy Manager server.
Example
[appadmin]# system refresh-network
********************************************************
*
WARNING: The command will refresh the network *
adapters which may result in loss of network *
connectivity. *
*
********************************************************
Are you sure you want to continue? [y|Y]: y
INFO: Associating "2001:DB8:441:1020::3" with eth0
INFO: Associating "2001:DB8:441:1022::4" with eth1
INFO: Command execution completed successfully.
INFO: Reboot the system to reflect the changes.
WARNING: System may lose network connectivity after the reboot.
Command History
Version Modification
Description
Restart the Policy Manager system.
Executing this command shuts down all running applications and reboots the system.
Example
The following example restarts the system with a confirmation before proceeding:
Command History
Version Modification
system reset-server-certificate
system reset-server-certificate
Description
Reset the HTTPS(RSA), HTTPS(ECC), RADIUS/EAP or Database Server Certificates, or all of them.
After executing the command, the Policy Manager services are restarted to reflect the changes.
Example
The following example resets resets the HTTPS, RADIUS/EAP and Database Server Certificates.:
******************************************************************
* *
* WARNING: When the command is completed Policy Manager services *
* are restarted to reflect the changes. *
Command History
Version Modification
system shutdown
system shutdown
Description
Shut down the current Policy Manager server.
Executing this command shuts down all running applications and powers off the system.
Example
The following example shuts down the system with a confirmation before proceeding:
Command History
Version Modification
Description
Start a Remote Assistance (RA) session.
Parameter Description
Example
The following example starts a 30-minute remote session on a Policy Manager server with the IP address
198.0.2.14.
Related Commands
Command Description
Command History
Version Modification
system sso-reset
system sso-reset
Command History
Version Modification
system status-rasession
system status-rasession <session_id>
Description
Check the status of a Remote Assistance (RA) session.
Parameter Description
<session_id> The Remote Session ID. This session ID is generated in the output of
the command system start-rasession.
Example
The following example displays the status of an active remote assistance session with the session ID 3001.
Related Commands
Command Description
Command History
Version Modification
system terminate-rasession
system terminate-rasession <session_id>
Parameter Description
<session_id> The Remote Session ID. This session ID is generated in the output of
the command system start-rasession.
Example
The following example terminates a running Remote Assist session with session ID 3001.
Related Commands
Command Description
Command History
Version Modification
system update
system update
-f
-l
Description
The system update command provides options to manage system patch updates.
Parameter Description
This command supports Secure Copy (SCP), HTTPS, HTTP, and local uploads.
Example
The following example of the system update command installs the selected Policy Manager 6.10 patch.
The following example of the system update command lists the patches currently installed on the Policy
Manager server:
Description : ClearPass Policy Manager Cumulative Patch 5 for 6.9.0, 6.9.1, 6.9.2,
6.9.3 and 6.9.4
Packages : tips-,avenda-quick1x,aruba-pgtools,clearpass-guest,cppm-
in,platform-,radsecproxy-,mod_php,php-cli,php-common,php-gd,php-ldap,php-mysql,php-
opcache,php-pdo,php-pgsql,php-process,php-soap,php-xml,php-xmlrpc,updateverify_v4,avenda-
tomcat,mod_jk,oracle-instantclient19.6-basic,oracle-instantclient19.6-
odbc,libsmbclient,samba-client-libs,samba-libs,libwbclient,samba-common,samba-
winbind,samba,samba-common-libs,samba-winbind-clients,samba-client,samba-common-
tools,samba-winbind-modules,dnsmasq,PhantomJS,openssl-perl-aruba-w,openssl-aruba-
w,openssl-libs-aruba-w,pycparser,zulu8.48.0.51-ca-jdk8.0.262
Affects : tips-ntp,platform-system-setup,tips-async-netd,tips-system-monitor
Update : 6.9.0_source-rollback-package
Installed Date : Thu Feb 11 21:50:58 2021
Update : 20210204-snmp-cdp-fix
Installed Date : Sat Feb 13 08:37:43 2021
Update : 20210204-clearpass-6.9-updates-6
Installed Date : Sat Feb 13 08:49:33 2021
4 installed updates.
Command History
Version Modification
system update-luks-key
system update-luks-key
Description
This command allows an administrator to specify the passphrase (key) for LUKS encryption. The LUKS
passphrase has a minimum length of eight characters. When this command is used, the new passphrase
replaces the default LUKS key in ClearPass. Each time Policy Manager is rebooted or a new session is initiated,
the administrator will be prompted to enter the specified LUKS passphrase before access is granted. As part of
this feature, users should be aware that:
If the LUKS passphrase is long, and depending on the size of the console window, the administrator might be
prompted to enter the passphrase on the next line. In this case, the administrator only needs to enter the
remainder of the characters in the next line and does not need to enter the entire passphrase again.
If the system update-luks-key command has been used to specify a LUKS key, then when the Cluster Update
page is used to update to a 6.10.x version, the key must be manually entered in the publisher and in each
subscriber after the reboot stage before the cluster update can proceed.
After a LUKS key has been specified, if the administrator forgets the LUKS key and a reboot of ClearPass Policy
Manager is initiated, the system cannot be recovered. System administrators must be extremely careful to not forget
this key after it is created.
Example
the following example updates the existing LUKS passphrase.
Command History
Version Modification
system upgrade
system upgrade
user@hostname:/<filepath>
http://hostname/<filepath>
<filepath>
-W
-l
-L
Description
The system upgrade command upgrades the Policy Manager system. This command provides you with the
following system upgrade options:
Parameter Description
<user@hostname>:/<filepath> Specify a user name, host name and file path to upgrade to the
specified file on a Linux server
http://<hostname>/<filepath> Specify a host name and file path to upgrade to the specified file on
a Web server
This command supports Secure Copy (SCP), HTTPS, HTTP, and local uploads.
If none of these system upgrade command options are specified, Access Tracker records are backed up, but they
are not restored by default.
For example:
For example:
9. After the upgrade process is complete, restart the appliance by issuing the system restart command.The
Policy Manager restarts and boots up to the most recent version of Policy Manager.
Command History
Version Modification