<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: monitoring identity awareness in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/139255#M27156</link>
    <description>&lt;P&gt;Did you get anywhere with this?&amp;nbsp; &amp;nbsp;I was headed down the same path and didn't want to recreate the wheel.&lt;/P&gt;</description>
    <pubDate>Mon, 24 Jan 2022 12:16:07 GMT</pubDate>
    <dc:creator>David_Evans</dc:creator>
    <dc:date>2022-01-24T12:16:07Z</dc:date>
    <item>
      <title>monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23307#M27144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey checkmates&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to know if someone of you is using some sort of script or one liner to monitor the state of identity awareness through command like adlog a dc&amp;nbsp; as an example if the count of events from a dc is equal to zero or something similar.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 15:43:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23307#M27144</guid>
      <dc:creator>Marco_Valenti</dc:creator>
      <dc:date>2018-08-29T15:43:55Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23308#M27145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;pep show user all&lt;BR /&gt;&lt;/SPAN&gt;pep show pdp all&lt;BR /&gt;dpd conn pep&lt;BR /&gt;&lt;BR /&gt;You can use pdp and pep command for monitoring and troubleshooting identity awareness.&lt;BR /&gt;There are many helpful sub commands. Run those commands in expert mode on the gateway.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 19:32:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23308#M27145</guid>
      <dc:creator>Claudio_Bolcato</dc:creator>
      <dc:date>2018-08-29T19:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23309#M27146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;probably I was not clear enough , I would like to know if someone of you put something like that into a script that can be monitored via snmp that show a result like if in adlog a dc the count is equal to zero , in large env showing all user won't be enough&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 07:14:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23309#M27146</guid>
      <dc:creator>Marco_Valenti</dc:creator>
      <dc:date>2018-08-30T07:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23310#M27147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have it displayed in a small dashboard as we have 3 IDCs in different parts of the world connected to multiple firewalls, so two most critical gateways are in the dashboard reporting two things - that connectivity to IDC is alive (new events are arriving) and total number of users. INT represents 41k chassis with 4 SGM blades each (green tick agaist IDC means that connection to IDC is handled by that specific SGM). EXT is a regular non-chassis gateway. Error seen below unfortunately is part of&amp;nbsp; R76 code on chassis - occasionally it fails to respond to &lt;STRONG&gt;pep s p a&lt;/STRONG&gt; command, so my script then reports Error.&amp;nbsp; Code itself is a simple bash script that calls &lt;STRONG&gt;pdp conn adqa&lt;/STRONG&gt; or &lt;STRONG&gt;pdp conn idc&lt;/STRONG&gt; (depending on GW version) and then &lt;STRONG&gt;pep s p a&lt;/STRONG&gt;. Nothing overly complicated &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/69932_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm actually planning to "upgrade" this to have all gateways included that run IA. But haven't got time to do it yet..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 13:45:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23310#M27147</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-08-30T13:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23311#M27148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks this give me something that I can work on with extend snmp or similar at least trying to clean some output for retrieving the filed Users &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2018 07:05:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23311#M27148</guid>
      <dc:creator>Marco_Valenti</dc:creator>
      <dc:date>2018-08-31T07:05:20Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23312#M27149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep, IA monitoring can be challenging (as it is not 100% stable, especially on R76 chassis). And having multiple VSXes and MDS.. I'm trying to pull this to one place so I can have a quick view of what's happening with IA across all GWs, all CMAs and all IDCs. Food for thought &lt;A href="https://community.checkpoint.com/migrated-users/46230"&gt;Royi Priov&lt;/A&gt;‌? &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2018 09:18:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23312#M27149</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-08-31T09:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23313#M27150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;indeed , about vsx can you extend snmp per vs too? not so experienced on vsx side.&lt;/P&gt;&lt;P&gt;Your dashboard seems pretty solid instead of this oneliner but seems to do the job at the moment at least&lt;/P&gt;&lt;DIV class=""&gt;&lt;CODE class=""&gt;pep s p a | &lt;/CODE&gt;&lt;CODE class=""&gt;awk&lt;/CODE&gt; &lt;CODE class=""&gt;-F &lt;/CODE&gt;&lt;CODE class=""&gt;" "&lt;/CODE&gt; &lt;CODE class=""&gt;'{print $5}'&lt;/CODE&gt; &lt;CODE class=""&gt;| &lt;/CODE&gt;&lt;CODE class=""&gt;grep&lt;/CODE&gt; &lt;CODE class=""&gt;-&lt;/CODE&gt;&lt;CODE class=""&gt;v&lt;/CODE&gt; &lt;CODE class=""&gt;time&lt;/CODE&gt; &lt;CODE class=""&gt;| &lt;/CODE&gt;&lt;CODE class=""&gt;sed&lt;/CODE&gt;&amp;nbsp; &lt;CODE class=""&gt;'/^$/d'&lt;/CODE&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2018 10:04:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23313#M27150</guid>
      <dc:creator>Marco_Valenti</dc:creator>
      <dc:date>2018-08-31T10:04:21Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23314#M27151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's exactly what i do &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;and then check if you have received new events in last two minutes comparing current time vs last event. That's how green tick is updated &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/69963_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2018 10:19:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/23314#M27151</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-08-31T10:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/48679#M27152</link>
      <description>Greetings Kaspars, I switched my Identity source from ADquery to Collector. After installing the first Collector yesterday, it had an issue so I installed Collector on a dedicated 2016 server and it is working very well. However, when I run pdp conn idc I still see the old Collector with Invalid Shared Secret and 5 events in the last hour with last event showing 'no event'. I think this is causing the Alert on my gateway. There should be no alerts. So I went to the bogus Collector and uninstalled it. The old Collector is not listed in Authorized Clients in the Cluster Identity Sources so why does it show in pdp conn idc listing? How do I remove it?&lt;BR /&gt;&lt;BR /&gt;Thank you for your help!&lt;BR /&gt;&lt;BR /&gt;Dan</description>
      <pubDate>Tue, 26 Mar 2019 15:40:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/48679#M27152</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2019-03-26T15:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/125369#M27153</link>
      <description>&lt;P&gt;Hi Kaspars,&lt;/P&gt;&lt;P&gt;Sorry to resurrect this old thread, but it still seems there is no good way to monitor IDC events.&lt;/P&gt;&lt;P&gt;I'm currently trying to achieve the same as the OP and yourself have done, a way to monitor the reception of IDC events on the gateway itself.&lt;/P&gt;&lt;P&gt;I can write a quick script that will fetch these values via SSH, but I'd prefer to perform this via SNMP. I've looked through the identityServer MIB(1.3.6.1.4.1.2620.1.38), but from here I'm only able to monitor the number of events being received on the collector machine itself.&lt;/P&gt;&lt;P&gt;So far, I'd like to avoid using SSH, but I keep coming back to it as it is the easiest approach. Is there no way around using SSH? I've considered several, such as using extended SNMP and a custom OID or by executing a script in the gateway itself (using cpd_sched_config) and sending the result back to the snmp manager), but I wonder if I should just bite the bullet and use SSH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To be clear, I would like to query the GW (or the IDC itself), for the same information showed, in the Gateways tab, under columns "Events in last hour" and "Last event send time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know your inputs. Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jul 2021 01:09:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/125369#M27153</guid>
      <dc:creator>Tiago_Cerqueira</dc:creator>
      <dc:date>2021-07-31T01:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/125513#M27154</link>
      <description>&lt;P&gt;I found a way to do this without SNMP or SSH, by using the gaia_api run-script. You can run any expert command there, that includes pdp conn idc. Then I just need to handle it on the client side&lt;/P&gt;&lt;P&gt;I plan to release a nagios plugin that will monitor the events received on the firewall per IDC and alert if they drop or if one (or all) stop receiving events inside a threshold.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 00:24:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/125513#M27154</guid>
      <dc:creator>Tiago_Cerqueira</dc:creator>
      <dc:date>2021-08-03T00:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/125544#M27155</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Does anyone knows the oid in order to monitor the value of pep users (100) from the below table?&lt;/P&gt;&lt;P&gt;pep show pdp all&lt;BR /&gt;Command: root-&amp;gt;show-&amp;gt;pdp-&amp;gt;all&lt;BR /&gt;---------------------------------------------------------------------------&lt;BR /&gt;| Direction | IP | ID | Status | Users | Connect time |&lt;BR /&gt;---------------------------------------------------------------------------&lt;BR /&gt;| Incoming | w.z.y.x | 0 | Connected | 39 |-------------------- |&lt;BR /&gt;---------------------------------------------------------------------------&lt;BR /&gt;| Incoming | x.y.z.w | 0 | Connected | 100 | ------------------- |&lt;BR /&gt;---------------------------------------------------------------------------&lt;BR /&gt;| Outgoing | x.y.z.w | 0 | Connected | N/A | -----------------|&lt;BR /&gt;---------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Kostas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 06:02:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/125544#M27155</guid>
      <dc:creator>KostasGR</dc:creator>
      <dc:date>2021-08-03T06:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/139255#M27156</link>
      <description>&lt;P&gt;Did you get anywhere with this?&amp;nbsp; &amp;nbsp;I was headed down the same path and didn't want to recreate the wheel.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 12:16:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/139255#M27156</guid>
      <dc:creator>David_Evans</dc:creator>
      <dc:date>2022-01-24T12:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: monitoring identity awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/139386#M27157</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do have some code that runs the pdp idc conn command via API, but I didn't get to the processing part (not much time available to work on this). I'd be willing to share that if you'd like.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 11:46:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/monitoring-identity-awareness/m-p/139386#M27157</guid>
      <dc:creator>Tiago_Cerqueira</dc:creator>
      <dc:date>2022-01-25T11:46:23Z</dc:date>
    </item>
  </channel>
</rss>

