<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zabbix agent on VSX in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/112059#M15535</link>
    <description>&lt;P&gt;Hm. Interesting approach. Maybe i can realize that in pdp as well. Thanks a lot, will have a look at it.&lt;/P&gt;</description>
    <pubDate>Mon, 01 Mar 2021 08:12:54 GMT</pubDate>
    <dc:creator>Vincent_Bacher</dc:creator>
    <dc:date>2021-03-01T08:12:54Z</dc:date>
    <item>
      <title>Zabbix agent on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111320#M15371</link>
      <description>&lt;P&gt;Hello mates,&lt;/P&gt;&lt;P&gt;I am curious, if anybody here has ever installed Zabbix agent on VSX environment to run Checks / scripts on virtual Systems.&lt;/P&gt;&lt;P&gt;If yes, sharing experience or reports what is done would be appreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and best regards&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vincent&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 17:42:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111320#M15371</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2021-02-19T17:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: Zabbix agent on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111336#M15374</link>
      <description>&lt;P&gt;Have you seen this? &lt;A href="https://community.checkpoint.com/t5/Automation-and-APIs/Pointix-a-tool-to-populate-checkpoint-devices-in-Zabbix-via-API/m-p/105683" target="_blank"&gt;https://community.checkpoint.com/t5/Automation-and-APIs/Pointix-a-tool-to-populate-checkpoint-devices-in-Zabbix-via-API/m-p/105683&lt;/A&gt;&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9001"&gt;@John_Fleming&lt;/a&gt;&amp;nbsp;have you tested this with VSX?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 23:31:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111336#M15374</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-02-19T23:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: Zabbix agent on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111337#M15375</link>
      <description>&lt;P&gt;&lt;A href="https://www.spikefishsolutions.com/post/pointix-integrating-check-point-and-zabbix" target="_self"&gt;Here is our Zabbix post.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Zabbix agent is a full blow agent meant to be installed on a linux/windows box. We didn't cover doing that on a checkpoint firewall directly or VSX for that matter.&lt;/P&gt;&lt;P&gt;That being said, I'm in that "don't tell me how I can/can't use my tool" camp. We have all kinds of write ups on how to put things on checkpoint in interesting ways.. like.. a Fortinet VM on QEMU inside a Palo VM inside QEMU inside a Checkpoint VM (&lt;A href="https://www.spikefishsolutions.com/post/the-invention-of-the-pbj" target="_self"&gt;PBJ&lt;/A&gt; blog post).. you know.. to protect those other vendors that have.. ehem.. colorful CVE reports.&lt;/P&gt;&lt;P&gt;The way we approached custom things in Zabbix was custom snmp scripts (for example installed on a MDS host). We made a few to do things like monitor diskspace per CMA&amp;nbsp; dir, log dir, logdata dir etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its pretty easy to script out. I could publish to our snmp scripts to github if you wanted to use that as a baseline.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 23:55:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111337#M15375</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2021-02-19T23:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Zabbix agent on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111911#M15505</link>
      <description>&lt;P&gt;Would be interesting.&lt;BR /&gt;Background for thinking about zabbix is following:&lt;BR /&gt;There is for instance no way to query IA values on distributed pdp environments (pdp broker using publisher and subscriber). You only see connections on the cli using "pdp b s"&lt;BR /&gt;So how to monitor this automatically if not using an agent?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 15:36:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111911#M15505</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2021-02-26T15:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: Zabbix agent on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111912#M15506</link>
      <description>&lt;P&gt;Show the output. I don't have that handy.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 15:43:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111912#M15506</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2021-02-26T15:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: Zabbix agent on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111918#M15508</link>
      <description>&lt;P&gt;From what?&amp;nbsp;&lt;/P&gt;&lt;P&gt;pdp broker status?&lt;/P&gt;&lt;P&gt;Mentioned in the getting started guide&amp;nbsp;&lt;/P&gt;&lt;P&gt;have already turned off my laptop&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 17:00:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111918#M15508</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2021-02-26T17:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: Zabbix agent on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111929#M15512</link>
      <description>&lt;P&gt;yeah, I mean isn't that what you want access to? The output of that command?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I didn't poke around the mib file. Some of that might already be in there. If its not here is the quick and dirty.&lt;/P&gt;&lt;P&gt;I made a script to print MDS + CMA names. (MDSnames.sh)&lt;/P&gt;&lt;P&gt;#!/bin/bash&lt;BR /&gt;. /etc/profile&lt;BR /&gt;MDSname=$(hostname)&lt;BR /&gt;echo $HOSTNAME&lt;BR /&gt;for x in $($MDSVERUTIL ALLCMAs)&lt;BR /&gt;do&lt;BR /&gt;echo $x&lt;BR /&gt;done&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;edit /etc/snmp/userDefinedSettings.conf&lt;/P&gt;&lt;P&gt;add&amp;nbsp;&lt;/P&gt;&lt;P&gt;extend MDSnames /bin/bash /home/admin/MDSnames.sh&lt;/P&gt;&lt;P&gt;restart snmp&lt;/P&gt;&lt;P&gt;OID would be nsExtendedOutLine.\"MDSnames\"&lt;/P&gt;&lt;P&gt;\" are required if doin this via command line.&lt;/P&gt;&lt;P&gt;output will be like&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NET-SNMP-EXTEND-MIB:nsExtendOutLine."MDSnames".1 = STRING: MDS_NAME_HERE&lt;/P&gt;&lt;P&gt;NET-SNMP-EXTEND-MIB:nsExtendOutLine."MDSnames".2 = STRING: FIRST_CMA_HERE&lt;/P&gt;&lt;P&gt;etc&lt;/P&gt;&lt;P&gt;good luck!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 18:43:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/111929#M15512</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2021-02-26T18:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Zabbix agent on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/112059#M15535</link>
      <description>&lt;P&gt;Hm. Interesting approach. Maybe i can realize that in pdp as well. Thanks a lot, will have a look at it.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Mar 2021 08:12:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/112059#M15535</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2021-03-01T08:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: Zabbix agent on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/112984#M15742</link>
      <description>&lt;P&gt;Again thanks for that hint. I did some tests and compiled a short script to show state of cpd using&amp;nbsp;cpwd_admin list and it works with and without vsx enabled &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 14:49:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Zabbix-agent-on-VSX/m-p/112984#M15742</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2021-03-10T14:49:23Z</dc:date>
    </item>
  </channel>
</rss>

