<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access serial console of another device thru Checkpoint Appliance USB port in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49266#M3673</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had the need to configure a new Cisco 3750 switch at a remote site with minimal hands-on&amp;nbsp;help.&amp;nbsp; &amp;nbsp;I had remote ssh access to an R80.20 3100 appliance on site and wondered if could use the 3750 console cable plugged into the 3100 to access the 3750 switch console.&lt;/P&gt;&lt;P&gt;I arranged for the mini-USB end of the 3750 console&amp;nbsp;cable to be plugged into the Cisco 3750 mini-USB console port and the other end to be plugged into the Checkpoint 3100 appliance Type-A USB&amp;nbsp; port.&lt;/P&gt;&lt;P&gt;Running the dmesg command in expert mode I could see that the GAIA kernel&amp;nbsp;had created a serial device file after the cable was connected:&lt;/P&gt;&lt;PRE&gt;[Expert@sta-fw01:0]# &lt;STRONG&gt;dmesg | tail -30&lt;/STRONG&gt;&lt;BR /&gt;usb 1-1.2: new full speed USB device using ehci_hcd and address 3
usb 1-1.2: configuration #1 chosen from 1 choice
drivers/usb/class/cdc-acm.c: This device cannot do calls on its own. It is no modem.
cdc_acm 1-1.2:1.0: &lt;FONT color="#FF0000"&gt;ttyACM0&lt;/FONT&gt;: USB ACM device
usbcore: registered new driver cdc_acm
drivers/usb/class/cdc-acm.c: v0.25:USB Abstract Control Model driver for USB modems and ISDN adapters&lt;/PRE&gt;&lt;P&gt;Using the cat command I could see that I had good serial connectivity to the switch:&lt;/P&gt;&lt;PRE&gt;[Expert@sta-fw01:0]# &lt;STRONG&gt;cat &amp;lt; /dev/ttyACM0&lt;/STRONG&gt; 
Apr  3 01:26:06.726: %USB_CON&lt;BR /&gt;Switch&amp;gt;&lt;/PRE&gt;&lt;P&gt;Now I just needed to find a terminal emulation program in GAIA that would give me an interactive connection over the serial port to the switch.&amp;nbsp; &amp;nbsp;I searched for tip, minicom and several others to no avail, and then I discovered that GAIA comes with the picocom terminal emulation program installed.&lt;/P&gt;&lt;P&gt;I just ran the command: &lt;STRONG&gt;picocom /dev/ttyACM0&lt;/STRONG&gt;&amp;nbsp; and bingo I had an interactive connection over the USB serial cable to the switch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;[Expert@sta-fw01:0]# &lt;STRONG&gt;picocom /dev/ttyACM0&lt;/STRONG&gt; 
picocom v2.1
port is        : /dev/ttyACM0
flowcontrol    : none
baudrate is    : 9600
parity is      : none
databits are   : 8
stopbits are   : 1
escape is      : C-a
local echo is  : no
noinit is      : no
noreset is     : no
nolock is      : no
send_cmd is    : sz -vv
receive_cmd is : rz -vv -E
imap is        : 
omap is        : 
emap is        : crcrlf,delbs,

Type [C-a] [C-h] to see available commands

Terminal ready

Apr  3 01:42:26.784: %LINK-3-U
Switch&amp;gt;&lt;BR /&gt;Switch&amp;gt; &lt;STRONG&gt;en&lt;/STRONG&gt;&lt;BR /&gt;Switch#&lt;BR /&gt;Switch# &lt;STRONG&gt;show ver | inc Cisco&lt;/STRONG&gt;&lt;BR /&gt;Cisco IOS Software, C3750E Software (C3750E-UNIVERSALK9-M), Version 15.2(1)E2, RELEASE SOFTWARE (fc1)&lt;BR /&gt;...&lt;BR /&gt;...&lt;BR /&gt;...&lt;BR /&gt;Switch#&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;Once connected via picocom, Ctrl-a Ctrl-h displays a helpful list of escape sequences like Ctrl-a Ctrl-x to end the session:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;*** Picocom commands (all prefixed by [C-a])

*** [C-x] : Exit picocom
*** [C-q] : Exit without reseting serial port
*** [C-b] : Set baudrate
*** [C-u] : Increase baudrate (baud-up)
*** [C-d] : Decrease baudrate (baud-down)
*** [C-i] : Change number of databits
*** [C-j] : Change number of stopbits
*** [C-f] : Change flow-control mode
*** [C-y] : Change parity mode
*** [C-p] : Pulse DTR
*** [C-t] : Toggle DTR
*** [C-|] : Send break
*** [C-c] : Toggle local echo
*** [C-s] : Send file
*** [C-r] : Receive file
*** [C-v] : Show port settings&amp;nbsp;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyways, I thought others may find this helpful for remote configuration of devices with a USB console port in a pinch.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The same method could be used to remotely configure a Checkpoint Appliance manually using isomorphic USB GAIA installation and the config_system command for the first time configuration.&lt;/P&gt;&lt;P&gt;Al&lt;/P&gt;</description>
    <pubDate>Sun, 31 Mar 2019 03:41:11 GMT</pubDate>
    <dc:creator>Al_Marti</dc:creator>
    <dc:date>2019-03-31T03:41:11Z</dc:date>
    <item>
      <title>Access serial console of another device thru Checkpoint Appliance USB port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49266#M3673</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had the need to configure a new Cisco 3750 switch at a remote site with minimal hands-on&amp;nbsp;help.&amp;nbsp; &amp;nbsp;I had remote ssh access to an R80.20 3100 appliance on site and wondered if could use the 3750 console cable plugged into the 3100 to access the 3750 switch console.&lt;/P&gt;&lt;P&gt;I arranged for the mini-USB end of the 3750 console&amp;nbsp;cable to be plugged into the Cisco 3750 mini-USB console port and the other end to be plugged into the Checkpoint 3100 appliance Type-A USB&amp;nbsp; port.&lt;/P&gt;&lt;P&gt;Running the dmesg command in expert mode I could see that the GAIA kernel&amp;nbsp;had created a serial device file after the cable was connected:&lt;/P&gt;&lt;PRE&gt;[Expert@sta-fw01:0]# &lt;STRONG&gt;dmesg | tail -30&lt;/STRONG&gt;&lt;BR /&gt;usb 1-1.2: new full speed USB device using ehci_hcd and address 3
usb 1-1.2: configuration #1 chosen from 1 choice
drivers/usb/class/cdc-acm.c: This device cannot do calls on its own. It is no modem.
cdc_acm 1-1.2:1.0: &lt;FONT color="#FF0000"&gt;ttyACM0&lt;/FONT&gt;: USB ACM device
usbcore: registered new driver cdc_acm
drivers/usb/class/cdc-acm.c: v0.25:USB Abstract Control Model driver for USB modems and ISDN adapters&lt;/PRE&gt;&lt;P&gt;Using the cat command I could see that I had good serial connectivity to the switch:&lt;/P&gt;&lt;PRE&gt;[Expert@sta-fw01:0]# &lt;STRONG&gt;cat &amp;lt; /dev/ttyACM0&lt;/STRONG&gt; 
Apr  3 01:26:06.726: %USB_CON&lt;BR /&gt;Switch&amp;gt;&lt;/PRE&gt;&lt;P&gt;Now I just needed to find a terminal emulation program in GAIA that would give me an interactive connection over the serial port to the switch.&amp;nbsp; &amp;nbsp;I searched for tip, minicom and several others to no avail, and then I discovered that GAIA comes with the picocom terminal emulation program installed.&lt;/P&gt;&lt;P&gt;I just ran the command: &lt;STRONG&gt;picocom /dev/ttyACM0&lt;/STRONG&gt;&amp;nbsp; and bingo I had an interactive connection over the USB serial cable to the switch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;[Expert@sta-fw01:0]# &lt;STRONG&gt;picocom /dev/ttyACM0&lt;/STRONG&gt; 
picocom v2.1
port is        : /dev/ttyACM0
flowcontrol    : none
baudrate is    : 9600
parity is      : none
databits are   : 8
stopbits are   : 1
escape is      : C-a
local echo is  : no
noinit is      : no
noreset is     : no
nolock is      : no
send_cmd is    : sz -vv
receive_cmd is : rz -vv -E
imap is        : 
omap is        : 
emap is        : crcrlf,delbs,

Type [C-a] [C-h] to see available commands

Terminal ready

Apr  3 01:42:26.784: %LINK-3-U
Switch&amp;gt;&lt;BR /&gt;Switch&amp;gt; &lt;STRONG&gt;en&lt;/STRONG&gt;&lt;BR /&gt;Switch#&lt;BR /&gt;Switch# &lt;STRONG&gt;show ver | inc Cisco&lt;/STRONG&gt;&lt;BR /&gt;Cisco IOS Software, C3750E Software (C3750E-UNIVERSALK9-M), Version 15.2(1)E2, RELEASE SOFTWARE (fc1)&lt;BR /&gt;...&lt;BR /&gt;...&lt;BR /&gt;...&lt;BR /&gt;Switch#&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;Once connected via picocom, Ctrl-a Ctrl-h displays a helpful list of escape sequences like Ctrl-a Ctrl-x to end the session:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;*** Picocom commands (all prefixed by [C-a])

*** [C-x] : Exit picocom
*** [C-q] : Exit without reseting serial port
*** [C-b] : Set baudrate
*** [C-u] : Increase baudrate (baud-up)
*** [C-d] : Decrease baudrate (baud-down)
*** [C-i] : Change number of databits
*** [C-j] : Change number of stopbits
*** [C-f] : Change flow-control mode
*** [C-y] : Change parity mode
*** [C-p] : Pulse DTR
*** [C-t] : Toggle DTR
*** [C-|] : Send break
*** [C-c] : Toggle local echo
*** [C-s] : Send file
*** [C-r] : Receive file
*** [C-v] : Show port settings&amp;nbsp;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyways, I thought others may find this helpful for remote configuration of devices with a USB console port in a pinch.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The same method could be used to remotely configure a Checkpoint Appliance manually using isomorphic USB GAIA installation and the config_system command for the first time configuration.&lt;/P&gt;&lt;P&gt;Al&lt;/P&gt;</description>
      <pubDate>Sun, 31 Mar 2019 03:41:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49266#M3673</guid>
      <dc:creator>Al_Marti</dc:creator>
      <dc:date>2019-03-31T03:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: Access console of another device thru Checkpoint Appliance USB port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49268#M3674</link>
      <description>&lt;P&gt;Nice, had no idea that was possible.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 05:12:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49268#M3674</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-30T05:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Access console of another device thru Checkpoint Appliance USB port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49276#M3675</link>
      <description>&lt;P&gt;This is great! Thank you for sharing.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 12:50:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49276#M3675</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-30T12:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: Access console of another device thru Checkpoint Appliance USB port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49307#M3681</link>
      <description>Have you also tried a rollover cable from the serial port of the CP to the console port of the cisco? (Rollover means 1-8, 2-7, 3-6 etc)&lt;BR /&gt;I know this works the other way around from Cisco routers with the aux port, just connect to the IP of the router with telnet on port 2001, you only need to make sure to make some proper adjustments to the aux port, like 'transport input all' and 'no-exec'.</description>
      <pubDate>Sat, 30 Mar 2019 19:09:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49307#M3681</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-03-30T19:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: Access console of another device thru Checkpoint Appliance USB port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49309#M3682</link>
      <description>&lt;P&gt;Nice hack!&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 21:10:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49309#M3682</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-03-30T21:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Access console of another device thru Checkpoint Appliance USB port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49310#M3683</link>
      <description>picocom is only available from 80.20 (and up?), I tried on R77.30 and R80.10 but only R80.20 has picocom aboard.</description>
      <pubDate>Sat, 30 Mar 2019 21:32:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/49310#M3683</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-03-30T21:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: Access console of another device thru Checkpoint Appliance USB port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/134952#M20311</link>
      <description>&lt;P&gt;&lt;A href="https://archives.fedoraproject.org/pub/archive/epel/5/i386/picocom-1.6-1.el5.i386.rpm" target="_blank"&gt;https://archives.fedoraproject.org/pub/archive/epel/5/i386/picocom-1.6-1.el5.i386.rpm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;work on 77.30&lt;/P&gt;</description>
      <pubDate>Fri, 26 Nov 2021 04:54:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/134952#M20311</guid>
      <dc:creator>Arkadiy_Korotin</dc:creator>
      <dc:date>2021-11-26T04:54:39Z</dc:date>
    </item>
    <item>
      <title>Re: Access console of another device thru Checkpoint Appliance USB port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/134953#M20312</link>
      <description>&lt;P data-unlink="true"&gt;https://archives.fedoraproject.org/pub/archive/epel/5/i386/picocom-1.6-1.el5.i386.rpm&amp;nbsp;&lt;/P&gt;&lt;P&gt;work on 77.30&lt;/P&gt;</description>
      <pubDate>Fri, 26 Nov 2021 05:08:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/134953#M20312</guid>
      <dc:creator>Arkadiy_Korotin</dc:creator>
      <dc:date>2021-11-26T05:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: Access console of another device thru Checkpoint Appliance USB port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/194370#M36160</link>
      <description>&lt;P&gt;Until R81.10&lt;BR /&gt;Unfortunately, it has been removed from R81.20 &lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2023 05:39:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-serial-console-of-another-device-thru-Checkpoint/m-p/194370#M36160</guid>
      <dc:creator>Zolo</dc:creator>
      <dc:date>2023-10-06T05:39:04Z</dc:date>
    </item>
  </channel>
</rss>

