system - a family of system commands

system discard-session-if-engine-error enable

Enable interrupting session in case of Anti-Virus engine error.

system discard-session-if-engine-error disable

Disable interrupting session in case of Anti-Virus engine error.

show system discard-session-if-engine-error

Show enabled/disabled status of session interruption in case of Anti-Virus engine error.

Example output:

ngfw> show system discard-session-if-engine-error
{
  "ngfw-system:system": {
    "discard-session-if-engine-error": {
      "enable": true
    }
  }
}

system siem

Go to SIEM system configuration submenu.

system siem> enable

Enable export of events to SIEM system.

system siem> no enable

Disable export of events to SIEM system By default, event export to a SIEM system is disabled.

system user-logs-address <address>

Set IPv4 address of SIEM system collector.

system user-logs-protocol (tcp|udp|tls|https)

Set SIEM system connection protocol.

show system user-logs-address

Show IP address of SIEM system collector.

Example output:

ngfw> show system user-logs-address
user-logs-address 10.0.0.2:7890

show system user-logs-protocol

Show SIEM system connection protocol.

show system status-user-logs-server

Show SIEM system connection status.

Example output:

ngfw> show system status-user-logs-server
{
  "ngfw-system:system": {
    "siem": {
      "state": "notconnect"
    }
  }
}

system siem-local-storage

Go to configuration submenu for local storage of CEF messages.

system siem-local-storage> state <state>

Set state of local recording of CEF messages.

Possible states:

Example:

ngfw> system siem-local-storage> state enabled-if-failed-to-send

system siem-local-storage> [no] log-entry-lifetime <lifetime>

Set the time limit for trying to send the log to the SIEM system server, in minutes. If the recording status is enabled-if-failed-to-send and the log has not been sent to the SIEM system server within the specified time, the sending is considered failed and the log is recorded locally.

Example:

ngfw> system siem-local-storage> log-entry-lifetime 86400

Set default value:

ngfw> system siem-local-storage> no log-entry-lifetime

system siem-local-storage> [no] directory-size <size>

Set maximum size of event log storage directory, in bytes. When current size exceeds this value, some older files are deleted.

Example:

ngfw> system siem-local-storage> directory-size 1000000000

Set default value:

ngfw> system siem-local-storage> no directory-size

show system siem-local-storage

Show configuration of local recording of CEF messages. This command outputs data in JSON format.

Example output:

ngfw> show system siem-local-storage
{
  "ngfw-siem-local-storage:siem-local-storage": {    "settings": {
      "state": "disabled",
      "log-entry-lifetime": 0    }  }
}

show system security-events-files [<file_regex>]

Show names and sizes in bytes of files to which CEF messages were saved, optionally filtered by file name. Regular expressions can be used in the filter.

Examples:

Show all files:

ngfw> show system security-events-files
cef-logs-overflow-2025-02-03-16-00_0.log                  536 bytes
/var/security-events/cef-logs-2025-02-03-16-00_0.log      536 bytes

Show files with name containing overflow:

ngfw> show system security-events-files overflow
cef-logs-overflow-2025-02-03-16-00_0.log                  536 bytes

show system security-events [file <file_regex>] [filter <log_regex>]

Show locally saved CEF messages optionally filtered file and log text.

Examples:

Показать все журналы из всех файлов:

ngfw> show system security-events
./failed-to-send/cef-logs-overflow-2025-02-03-15-00_0.log:CEF:0|Kaspersky|NGFW|...
./failed-to-send/cef-logs-overflow-2025-02-03-15-00_0.log:CEF:0|Kaspersky|NGFW|...
./cef-logs-2025-02-03-15-00_0.log:CEF:0|Kaspersky|NGFW|...

Show logs from files with name containing cef-logs-2025:

ngfw> show system security-events file cef-logs-2025
./cef-logs-2025-02-03-15-00_0.log:CEF:0|Kaspersky|NGFW|...

Show messages containing 15:23:46:

ngfw> show system security-events filter 15:23:46
./failed-to-send/cef-logs-overflow-2025-02-03-15-00_0.log:CEF:0|Kaspersky|NGFW|1.0.0.0|Firewall|Session start|Unknown|rt=2025-02-23T15:23:46 dtz=+03:00...

clear system security-events-files [<file_regex>]

Delete files into which CEF messages were saved, optionally filtered by file name.

Examples:

Delete all files:

ngfw> clear system security-events-files
Deleted 2 files

Delete files with name containing overflow:

ngfw> clear system security-events-files overflow
Deleted 1 file

system packet-tracer enable

Enable packet logging.

system packet-tracer disable

Disable packet logging.

show system packet-tracer

Show status of packet logging subsystem.

system hostname <hostname>

Set hostname.

Example:

system hostname ngfw

show system hostname

Show current hostname.

system timezone <timezone-id>

Change system time zone by specifying new time zone ID. You can use the show system timezone-list command to output the IDs of the existing timezones.

Example:

system timezone Europe/Moscow

show system timezone

Show current system time zone.

show system timezone-list [(<offset>|<text1>)] [<text2>] ...

Show list of all time zones optionally filtered by offset in hours (or in HH:MM format) and/or a fragment of time zone name (description). You can specify only one offset and any number of filters by time zone name (description).

Examples:

  1. Show only time zones in Europe with an offset of +3 hours:
    show system timezone-list 3 europe
    
  2. Show all time zones with an offset of -4 hours:
    show system timezone-list -4
    
  3. Show all time zones with an offset of +5 hours and 30 minutes:
    show system timezone-list 5:30
    
  4. Show all time zones in Africa:
    show system timezone-list africa
    

system reboot

Restart Kaspersky NGFW device.

system password

Change the root user password.

system shutdown

Shut down Kaspersky NGFW device.

system integrity-check

Run Kaspersky NGFW integrity check.

Example:

ngfw> system integrity-check
[========================================] 100.0%
Integrity check passed successfully

system shell

Go to the operating system shell.

system factory-reset

Factory reset of Kaspersky NGFW device with user confirmation. As a result, the current firmware version is loaded with the factory configuration and all data modified since the current firmware version was installed is reset (including database updates).

system factory-reset force

Factory reset of Kaspersky NGFW device without user confirmation. As a result, the current firmware version is loaded with the factory configuration and all data modified since the current firmware version was installed is reset (including database updates).

show system info

List system information of the Kaspersky NGFW device.

Example output:

ngfw> show system info
{
  "ngfw-system:system": {
    "info": {
      "version": "1.0.0.0",
      "debug": true,
      "device-model": "KX-8",
      "hostname": "NGFW",
      "uptime": "0d, 0h, 3min",
      "last-reboot": "Thu Jul 11 12:20:58 2024 MSK",
      "system-time": "Thu Jul 11 12:21:44 2024 MSK"
    }
  }
}

show system databases-info

List the version (release date) of databases for each component.

Example output:

ngfw> show system databases-info
{
  "ngfw-system:system": {
    "databases-info": {
      "status": "ok",
      "components-versions": [
        {
          "name": "APU",
          "version": "2025-06-02T07:48Z",
          "description": "Antiphishing URLs for URL reputation checker"
        },
        {
          "name": "APUD",
          "version": "2024-11-27T11:54Z",
          "description": "Antiphishing domains for DNS security"
        },
        {
          "name": "CASB",
          "version": "2025-06-02T09:29Z",
          "description": "Signatures for DPI"
        },
        {
          "name": "CDB2",
          "version": "2025-06-02T07:56Z",
          "description": "Certificate reputation DB"
        },
        {
          "name": "EMU64L",
          "version": "2025-06-02T12:35Z",
          "description": "Emulator for Object AV"
        },
        {
          "name": "IDSNGFW",
          "version": "2025-03-20T10:58Z",
          "description": "Signatures for IDPS"
        },
        {
          "name": "KDB64L",
          "version": "2025-06-02T12:35Z",
          "description": "AV signatures for Object AV"
        },
        {
          "name": "KDSCRL",
          "version": "2021-09-27T11:12Z",
          "description": "Kaspersky Digital Signature Certificate Revocation List"
        },
        {
          "name": "KSN",
          "version": "2025-06-02T07:34Z",
          "description": "KSN configuration file"
        },
        {
          "name": "UDSFW",
          "version": "2024-09-11T07:51Z",
          "description": "Hashes of malware for stream AV"
        },
        {
          "name": "Updater",
          "version": "2025-05-28T06:59Z",
          "description": "Updater configuration file"
        },
        {
          "name": "WA",
          "version": "2025-06-02T07:02Z",
          "description": "AV engine and SSL/TLS exclusions configuration file"
        },
        {
          "name": "WCCE",
          "version": "",
          "description": "Web Categories for Web Control"
        },
        {
          "name": "WMDF",
          "version": "2024-11-27T11:56Z",
          "description": "Malware domains for DNS security"
        },
        {
          "name": "WMUF",
          "version": "2025-06-02T07:49Z",
          "description": "Malware URLs for URL reputation checker"
        },
        {
          "name": "WMUFIP",
          "version": "2024-11-27T11:24Z",
          "description": "Malware IP for DNS security"
        }
      ]
    }
  }
}

show system databases-status

Show service information for Anti-Virus databases.

Example output:

ngfw> show system databases-status
{
  "ngfw-system:system": {
    "databases-status": {
      "last-successfull-update-time": 1748934471,
      "release-time": 1748932080,
      "build-time": 1748924568,
      "primary-index-time": 1748934600,
      "state": 4,
      "load-result": 0,
      "record-count": 27534375
    }
  }
}

show system status

List information about the status of the key processes of the Kaspersky NGFW device. The JSON output indicates the general status of the device (the device-status field) and the statuses of individual processes (the services-statuses field).

Example output:

ngfw> show system status
{
  "ngfw-system:system": {
    "status": {
      "device-status": "ok",
      "services-statuses": [
        {
          "name": "security engines",
          "status": "active"
        },
        {
          "name": "syslog-ng@default",
          "status": "active"
        },
        {
          "name": "dumping",
          "status": "inactive"
        },
        {
          "name": "vpp",
          "status": "active"
        },
        {
          "name": "ngfw-snmp",
          "status": "active"
        },
        {
          "name": "dbus",
          "status": "active"
        },
        {
          "name": "snmpd",
          "status": "inactive(admin)"
        },
        {
          "name": "chrony",
          "status": "active"
        },
        {
          "name": "ngfw-status",
          "status": "active"
        },
        {
          "name": "getty@tty1",
          "status": "active"
        },
        {
          "name": "knbe-agent",
          "status": "active"
        },
        {
          "name": "systemd-logind",
          "status": "active"
        },
        {
          "name": "systemd-networkd",
          "status": "active"
        },
        {
          "name": "sshd",
          "status": "active"
        },
        {
          "name": "systemd-journald",
          "status": "active"
        },
        {
          "name": "systemd-resolved",
          "status": "active"
        },
        {
          "name": "systemd-udevd",
          "status": "active"
        },
        {
          "name": "auditd",
          "status": "active"
        }
      ]
    }
  }
}

[no] system account ban-settings enable

Enable (or disable, if no) temporary blocking of password authentication for user accounts that failed several authentication attempts in a row.

system account ban-settings threshold <threshold>

Set number of failed password authentication attempts after which blocking is enforced.

system account ban-settings duration <duration>

Set blocking duration in seconds.

show system account

Show the configuration of the user account control system.

[no] system ssh tcp-keep-alive

Enable (or disable, if no) the sending of TCP keepalive messages for SSH sessions.

system ssh client-alive-interval <interval>

Set ClientAliveInterval for SSH.

system ssh client-alive-count-max <count>

Set ClientAliveСountMax for SSH.

[no] system ssh password-auth

Enable (or disable, if no) password authentication over SSH.

show system ssh

Show SSH configuration.

system ntp enable

Enable synchronization with time servers.

no system ntp enable

Disable synchronization with time servers.

show system ntp enable

Show time servers synchronization status.

Example output:

ngfw> show system ntp enable
{
  "ngfw-ntp:chrony": {
    "enable": false
  }
}

system ntp add (server|pool) <address> [prefer] [key [id <key-id>] [type (md5|sha1|sha256)] [value <key-value>]]

Add new time servers. Arguments:

Example commands:

Add server pool:

no system ntp add <address>

Remove configured time server.

system ntp add-key id <key-id> [type (md5|sha1|sha256)] value <key-value>

Add new authentication key. Subsequently, this key can be used when adding a time server using the system ntp add command. Arguments:

system ntp replace key id <key-id> [type (md5|sha1|sha256)] value <key-value>

Replace authentication key with the specified ID, if exists. Arguments:

no system ntp key <key-id>

Delete authentication key with the specified identification number. Trying to delete a key that is used by some time servers results in an error.

system ntp vrf <vrf-name>

Use virtual router (Virtual Routing and Forwarding; VRF) <vrf-name> for the route to configured time servers.

no system ntp vrf

Use the default Management routing and forwarding table for the route to configured time servers.

show system ntp vrf

Show the name of the used virtual router (Virtual Routing and Forwarding; VRF).

Example output:

ngfw> show system ntp vrf
Management

show system ntp servers

Output information about configured time servers.

Example output:

ngfw> show system ntp servers
{
  "ngfw-ntp:chrony": {
    "ntp-server": [
      {
        "address": "1.2.3.4",
        "preferred": false,
        "server-type": "server"
      },
      {
        "address": "5.6.7.8",
        "preferred": true,
        "server-type": "server"
      },
      {
        "address": "8.9.10.11",
        "preferred": false,
        "server-type": "server",
        "key-number": 1
      }
    ]
  }
}

show system ntp synced-server

Output information about the time server with which the system is currently synchronized.

Example output:

Reference ID    : C16A5D74 (vigil.intelfx.name)
Stratum         : 3
Ref time (UTC)  : Mon Feb 10 06:47:58 2025
System time     : 0.000000043 seconds slow of NTP time
Last offset     : -0.000079599 seconds
RMS offset      : 0.000144497 seconds
Frequency       : 13.838 ppm slow
Residual freq   : -0.023 ppm
Skew            : 0.555 ppm
Root delay      : 0.004848466 seconds
Root dispersion : 0.000670573 seconds
Update interval : 1.2 seconds
Leap status     : Normal

show system time

Display the current time in the local time zone.

Example output for the Europe/Moscow time zone:

Mon Feb 10 06:45:38 2025 MSK

Example output for the Asia/Chita time zone:

Mon Feb 10 12:45:38 2025 +09

show system ntp short-diagnostics

Show brief diagnostic information from chrony.

Example output:

MS Name/IP address         Stratum Poll Reach LastRx Last sample
===============================================================================
^- prod-ntp-4.ntp1.ps5.cano>     2  10   377   989   +184us[  +94us] +/-   24ms
^- prod-ntp-3.ntp4.ps5.cano>     2  10   377    96   +254us[ +254us] +/-   23ms
^- prod-ntp-5.ntp1.ps5.cano>     2  10   377  1007  +4946us[+4857us] +/-   29ms
^- alphyn.canonical.com          2  10   377  1034  +5973us[+5884us] +/-   86ms
^+ 51.250.110.169                2  10   377    90  +5865us[+5865us] +/-   14ms
^- time.cloudflare.com           3   9   377    36  -1442us[-1442us] +/-   20ms
^- time.cloudflare.com           3  10   377   396  -1253us[-1253us] +/-   20ms
^* cdn.edge-2.msk.i6p.eu         3   9   377   399   -280us[ -286us] +/- 7564us

show system ntp diagnostics

Show full diagnostic information from chrony.

Example output:

{
  "ngfw-ntp:chrony": {
    "diagnostics": [
      {
        "pool-name": "pool.ntp.org",
        "servers": [
          {
            "address": "51.250.53.172",
            "sync-status": "NotCombined",
            "stratum": 2,
            "reach": 17,
            "last-rx": 34,
            "last-sample": "+853µs[+745µs] +/- 36ms"
          },
          {
            "address": "91.201.254.110",
            "sync-status": "Combined",
            "stratum": 2,
            "reach": 17,
            "last-rx": 34,
            "last-sample": "-45µs[-147µs] +/- 6454µs"
          },
          {
            "address": "89.109.251.22",
            "sync-status": "CurrentBest",
            "stratum": 1,
            "reach": 17,
            "last-rx": 34,
            "last-sample": "+1204µs[+1093µs] +/- 3497µs"
          },
          {
            "address": "51.250.110.169",
            "sync-status": "Combined",
            "stratum": 2,
            "reach": 17,
            "last-rx": 34,
            "last-sample": "+548µs[+443µs] +/- 8140µs"
          }
        ]
      },
      {
        "sync-status": "Combined",
        "address": "10.3.0.222",
        "stratum": 3,
        "reach": 17,
        "last-rx": 34,
        "last-sample": "-1035µs[-1134µs] +/- 2948µs"
      }
    ]
  }
}

system services

Go to system service configuration submenu.

system services> enable

Enable system service settings.

system services> no enable

Disable system service settings.

system services> vrf <vrf-name>

Use virtual router (Virtual Routing and Forwarding; VRF) <vrf-name> for the route to system services.

system services> no vrf

Use the default routing table for the route to system services.

show system services settings

Show system service settings.

Example output:

ngfw> show system services settings
{
  "ngfw-system:system": {
    "services": {
       "enable": true,
       "vrf-name": "Management"
    }
  }
}

show system restricted

Run a restricted command line mode check and show its results. The results of the check do not affect the current command line mode.

Example output:

{ "restrictedMode": false, "firstBootPassed": true, "deviceReady": true }

where:

show system last-ksc-policy-sync-time

Show last successful synchronization time of policy from the Open Single Management Platform. The time is in the local time zone.

Example output:

ngfw> show system last-ksc-policy-sync-time
Wed Mar 19 18:14:46 2025 MSK

show system idps traffic-dump-files <regex>

Show the names of files in which traffic dumps were saved after triggered IDPS signatures, and the size of the files in bytes; can be filtered by file name using a regular expression.

Example output:

ngfw> show system idps traffic-dump-files
idps-traffic-dump-57600550-33d86c30-3ee0-4df9-aa55-0328d3995de0-1749248417.pcap 128 bytes 2025-06-06 23:20:17
idps-traffic-dump-57600550-075d9079-0fc4-4dcf-92de-2a047372bbf7-1749248400.pcap 128 bytes 2025-06-06 23:20:00
ngfw> show system idps traffic-dump-files .*4df9.*
idps-traffic-dump-57600550-33d86c30-3ee0-4df9-aa55-0328d3995de0-1749248417.pcap 128 bytes 2025-06-06 23:20:17

clear system idps traffic-dump-files <regex>

Delete files in which traffic dumps were saved after triggered IDPS signatures; can be filtered by file name using a regular expression.

Example output:

ngfw> clear system idps traffic-dump-files .*
Deleted 2 files

| Prev | Home | Next |