The settings (.exp) file of the firewall appliance which you export is encoded. To decode it to a readable text file, you can issue the command below under the Terminal application in any standard Linux:
base64 -d -i sonicwall-TZ_400-6_2_3_0-10n.exp | sed 's/&/n/g' > config.txt
Note: The content may be not quite user friendly but useful if you know the parameter names you are looking for.


links: https://sourceforge.net/projects/sonicreader/files/Binaries/
http://www.computer-server-repair.com/get-all-sonicwall-settings-in-a-human-readable-format/
- Export the settings from System > Settings
- Open the file in notepad++ remove the two &’s at the end of the file.
- Save and Close.
- Open CMD as administrator and navigate to the location of the file.
- Run certutil -decode originalFile.exp decodedFile.txt changing out the file names with the appropriate ones.
- You should see a message “decode command completed successfully” printed to CMD.
- Open decoded file in Notepad++
- Cntrl + F to open Find and replace
- Set mode to extended in the bottom left
- Replace All “&” with “\n”
0 comentários:
Postar um comentário