<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sandblast Threat Emulation SNMP in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/99934#M13197</link>
    <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;we want to check the Pending emulating requests (Output of tecli show emu emu) with SNMP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've compared the output of two snmp walks (one while no&amp;nbsp;Pending emulating requests and one with more than 30&amp;nbsp;Pending emulating requests). But the outpot of both walks was the same.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/SandBlast-Network/Using-SNMP-with-SandBlast-Network/td-p/40637" target="_blank"&gt;https://community.checkpoint.com/t5/SandBlast-Network/Using-SNMP-with-SandBlast-Network/td-p/40637&lt;/A&gt;&lt;/P&gt;&lt;P&gt;tecli show emu emu&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pending emulating requests: 31&lt;BR /&gt;Running virtual machines: 4&lt;BR /&gt;Number of emulated files: 24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone any idea how to check that value or has another idea what OID could be checked get similar information?&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Morris&lt;/P&gt;</description>
    <pubDate>Fri, 23 Oct 2020 09:11:47 GMT</pubDate>
    <dc:creator>morris</dc:creator>
    <dc:date>2020-10-23T09:11:47Z</dc:date>
    <item>
      <title>Sandblast Threat Emulation SNMP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/99934#M13197</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;we want to check the Pending emulating requests (Output of tecli show emu emu) with SNMP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've compared the output of two snmp walks (one while no&amp;nbsp;Pending emulating requests and one with more than 30&amp;nbsp;Pending emulating requests). But the outpot of both walks was the same.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/SandBlast-Network/Using-SNMP-with-SandBlast-Network/td-p/40637" target="_blank"&gt;https://community.checkpoint.com/t5/SandBlast-Network/Using-SNMP-with-SandBlast-Network/td-p/40637&lt;/A&gt;&lt;/P&gt;&lt;P&gt;tecli show emu emu&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pending emulating requests: 31&lt;BR /&gt;Running virtual machines: 4&lt;BR /&gt;Number of emulated files: 24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone any idea how to check that value or has another idea what OID could be checked get similar information?&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Morris&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 09:11:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/99934#M13197</guid>
      <dc:creator>morris</dc:creator>
      <dc:date>2020-10-23T09:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: Sandblast Threat Emulation SNMP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/100073#M13198</link>
      <description>&lt;P&gt;You can extend SNMP as you wish:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk90860&amp;amp;partition=Basic&amp;amp;product=Security" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk90860&amp;amp;partition=Basic&amp;amp;product=Security&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Oct 2020 23:57:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/100073#M13198</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-24T23:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: Sandblast Threat Emulation SNMP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/199258#M37332</link>
      <description>&lt;P&gt;I'm having the same question. Did you managed to fix this?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 12:15:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/199258#M37332</guid>
      <dc:creator>Forsaken_61</dc:creator>
      <dc:date>2023-11-29T12:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: Sandblast Threat Emulation SNMP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/201041#M37778</link>
      <description>&lt;P&gt;Basically if I snmpwalk I get these results:&lt;/P&gt;&lt;P&gt;[Expert@cpsandblast:0]# snmpwalk -v 2c -c xxx localhost .1.3.6.1.4.1.2620.1.49&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.3.0 = STRING: "100%"&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.4.1.0 = Gauge32: 20708&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.4.2.0 = Gauge32: 356&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.4.3.0 = Gauge32: 2767&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.4.4.0 = Gauge32: 13446&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.5.1.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.5.2.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.5.3.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.5.4.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.6.1.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.6.2.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.6.3.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.6.4.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.7.1.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.7.2.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.7.3.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.7.4.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.8.1.0 = Gauge32: 79&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.8.2.0 = Gauge32: 113&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.8.3.0 = Gauge32: 66&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.8.4.0 = Gauge32: 69&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.9.1.0 = Gauge32: 124126&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.9.2.0 = Gauge32: 385518&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.9.3.0 = Gauge32: 388842&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.9.4.0 = Gauge32: 457460&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.10.1.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.10.2.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.10.3.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.10.4.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.11.1.0 = Gauge32: 102&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.11.2.0 = Gauge32: 20&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.11.3.0 = Gauge32: 23&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.11.4.0 = Gauge32: 21&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.12.0 = Gauge32: 2&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.13.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.14.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.15.0 = Gauge32: 5&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.16.0 = STRING: "up-to-date"&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.17.0 = STRING: "Gateway is up to date."&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.19.0 = STRING: "temu_local"&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.20.0 = STRING: "1735559812"&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.21.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.22.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.23.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.24.0 = Gauge32: 4&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.25.0 = STRING: "valid"&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.26.0 = STRING: "ok"&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.27.0 = STRING: "Subscription is up to date"&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.28.0 = STRING: "Cloud emulation is not used"&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.29.0 = Gauge32: 60&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.30.0 = Gauge32: 990000400&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.31.0 = STRING: "N/A"&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.32.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.33.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.34.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.35.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.36.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.37.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.38.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.39.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.40.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.41.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.101.0 = Gauge32: 0&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.102.0 = STRING: "ok"&lt;BR /&gt;SNMPv2-SMI::enterprises.2620.1.49.103.0 = ""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In chkpnt.mib I only see a handful of values&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="snmpte.PNG" style="width: 557px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23721iA93E06562752FAAE/image-size/large?v=v2&amp;amp;px=999" role="button" title="snmpte.PNG" alt="snmpte.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Is there anywhere a extended documentation?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2023 12:06:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/201041#M37778</guid>
      <dc:creator>morris</dc:creator>
      <dc:date>2023-12-19T12:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: Sandblast Threat Emulation SNMP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/201154#M37805</link>
      <description>&lt;P&gt;What I'm saying is that this is not something that can be polled via SNMP by default.&lt;BR /&gt;You can extend the MIB to support your requirement:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk90860" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk90860&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2023 00:54:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Threat-Emulation-SNMP/m-p/201154#M37805</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-12-20T00:54:04Z</dc:date>
    </item>
  </channel>
</rss>

