<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: list all VPNs using certificate for phase1 and vpn cert store in mds in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213037#M40503</link>
    <description>&lt;P&gt;Sorry I'm not fast enough to sort this for you in the time I have...&lt;BR /&gt;but If you have some API skills or someone else can help you can refine the following or export to csv and filter in excel.&lt;/P&gt;&lt;P&gt;show vpn-communities-star limit 50 details-level "full"&lt;BR /&gt;show vpn-communities-mesh limit 50 details-level "full"&lt;/P&gt;&lt;P&gt;(I ran these from the GUI &amp;gt; Cli so didn't need to use the&amp;nbsp;mgmt_cli)&lt;/P&gt;&lt;P&gt;You will need to filter the community name and the field "use-shared-secret"&lt;/P&gt;&lt;P&gt;true = PSK.&amp;nbsp;&lt;/P&gt;&lt;P&gt;false = Cert&lt;/P&gt;&lt;P&gt;Also research command ALL_DOMAINS_ON_THIS_SERVER to save you going into all the domains.&lt;BR /&gt;&lt;BR /&gt;I think the certs are imported into the database and Check Point black magic files then rolled up and pushed out to the gateways&lt;/P&gt;&lt;P&gt;You can see them in GUIDBedit&amp;nbsp; Managed Object &amp;gt; Servers&lt;/P&gt;</description>
    <pubDate>Fri, 03 May 2024 01:29:47 GMT</pubDate>
    <dc:creator>spottex</dc:creator>
    <dc:date>2024-05-03T01:29:47Z</dc:date>
    <item>
      <title>list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/212922#M40473</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the case study: MDS R81.20&amp;nbsp; with multiple CMA domains, each one having multiple gateways with IPSEC VPN tunnels. Some of the tunnels have PSK for phase 1, some of them are using Certificates. Most of the certs are signed by our internal PKI infrastructure, but some are MDS ICA signed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) How to I get a list of VPN tunnel which are using certs for phase 1? So I could check the cert validity (is there any automated&amp;nbsp; way of getting this info?)&lt;/P&gt;&lt;P&gt;2) Where are the 3rd Party VPN certs stored in MDS?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 11:08:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/212922#M40473</guid>
      <dc:creator>sorinstf</dc:creator>
      <dc:date>2024-05-02T11:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213037#M40503</link>
      <description>&lt;P&gt;Sorry I'm not fast enough to sort this for you in the time I have...&lt;BR /&gt;but If you have some API skills or someone else can help you can refine the following or export to csv and filter in excel.&lt;/P&gt;&lt;P&gt;show vpn-communities-star limit 50 details-level "full"&lt;BR /&gt;show vpn-communities-mesh limit 50 details-level "full"&lt;/P&gt;&lt;P&gt;(I ran these from the GUI &amp;gt; Cli so didn't need to use the&amp;nbsp;mgmt_cli)&lt;/P&gt;&lt;P&gt;You will need to filter the community name and the field "use-shared-secret"&lt;/P&gt;&lt;P&gt;true = PSK.&amp;nbsp;&lt;/P&gt;&lt;P&gt;false = Cert&lt;/P&gt;&lt;P&gt;Also research command ALL_DOMAINS_ON_THIS_SERVER to save you going into all the domains.&lt;BR /&gt;&lt;BR /&gt;I think the certs are imported into the database and Check Point black magic files then rolled up and pushed out to the gateways&lt;/P&gt;&lt;P&gt;You can see them in GUIDBedit&amp;nbsp; Managed Object &amp;gt; Servers&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 01:29:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213037#M40503</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2024-05-03T01:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213043#M40504</link>
      <description>&lt;P&gt;I suspect what you're trying to do is renew those certificates before they expired.&lt;BR /&gt;Hopefully very soon, we will have a script published in SupportCenter that, when run on MDS or regular management, will:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Show certificate information&lt;/LI&gt;
&lt;LI&gt;Renew certificates based on the specified criteria&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The specified operation will be performed&amp;nbsp;on all managed Security Gateways, Cluster Members, and Virtual Systems.&lt;BR /&gt;For R81.20, this will require JHF 54 or above.&lt;BR /&gt;It will also be available for R81 and R81.10 and will require a specific JHF level.&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 05:39:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213043#M40504</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-05-03T05:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213067#M40508</link>
      <description>&lt;P&gt;Those commands are good!&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 12:28:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213067#M40508</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-03T12:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213176#M40553</link>
      <description>&lt;P&gt;Hello ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your quick reply. I tried both commands from MDS using mgmt_cli but they returned 0 objects ( before reaching out to CheckMates).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Expert@srv-r8120:0]# mgmt_cli -r true show vpn-communities-meshed
objects: []
total: 0

[Expert@mds-r8120-prod:0]# mgmt_cli -r true show vpn-communities-star
objects: []
total: 0&lt;/LI-CODE&gt;&lt;P&gt;Then I tried from&amp;nbsp; GUI &amp;gt; cli as&amp;nbsp; you suggested and it worked! Of course the GUI Cli has limitations and I need to send the output to a text file to parse it.&amp;nbsp; What am I doing wrong?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I choose the smallest domain with only 3 VPN tunnels, and it returned 1184 lines! That's not something you can easily search from that window.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good point with&amp;nbsp;&lt;SPAN&gt;"use-shared-secret: - true/false - it looks like this is what I'm looking for.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 21:15:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213176#M40553</guid>
      <dc:creator>sorinstf</dc:creator>
      <dc:date>2024-05-03T21:15:11Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213177#M40554</link>
      <description>&lt;P&gt;Let's hope so! Many thanks for the heads up!&lt;/P&gt;&lt;P&gt;There are too many certificates (LOL). SIC + IKE + Management = 3&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are also using Identity Awareness, extra certs to take care of : broker.portal, web portal.&amp;nbsp; = 2.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 20:47:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213177#M40554</guid>
      <dc:creator>sorinstf</dc:creator>
      <dc:date>2024-05-03T20:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213193#M40557</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ICA Certs:&lt;/P&gt;&lt;P&gt;In the Checkmates Toolbox there is a good oneliner, as basic check...&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Scripts/Valid-Certificates-Overview-Oneliner/m-p/179954" target="_blank"&gt;https://community.checkpoint.com/t5/Scripts/Valid-Certificates-Overview-Oneliner/m-p/179954&lt;/A&gt;&lt;/P&gt;&lt;P&gt;when changing into the cma, it should also get you the certificates from the tenant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wrote something to get those states reported into monitoring engines like PRTG or Nagios compatible (like Centreon), which then can alarm/notify you, if thresholds are hit. But thats not finished yet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 May 2024 07:54:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213193#M40557</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2024-05-05T07:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213196#M40559</link>
      <description>&lt;P&gt;Thanks for that, will try on my lab mgmt.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 05 May 2024 12:42:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213196#M40559</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-05T12:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213200#M40561</link>
      <description>&lt;P&gt;Thanks so much for sharing that, super useful.&lt;/P&gt;
&lt;P&gt;From my lab:&lt;/P&gt;
&lt;P&gt;Current Date and Time&lt;BR /&gt;----------------------------------------------------------------------&lt;BR /&gt;05 May 2024 09:05:52 -04:00 EDT&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Check Point Internal Certificate Authority (ICA) Experation Date&lt;BR /&gt;----------------------------------------------------------------------&lt;BR /&gt;18 Jan 2038 22:14:07 -05:00 EST&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Current Valid IKE &amp;amp; SIC Certificates signed by ICA&lt;BR /&gt;----------------------------------------------------------------------&lt;BR /&gt;Nr. Objectname Type Serial Not Valid After&lt;BR /&gt;1 azurefw IKE 19056 20 Feb 2027 13:51:25&lt;BR /&gt;2 CPAZUREcluster IKE 82773 20 Feb 2027 13:52:04&lt;BR /&gt;3 cp_mgmt SIC 66461 03 Jan 2029 08:46:27&lt;BR /&gt;4 cp_mgmt SIC 80400 03 Jan 2029 08:46:36&lt;BR /&gt;5 cp_mgmt SIC 80670 03 Jan 2029 08:46:43&lt;BR /&gt;6 cpazuremgmt SIC 96588 03 Jan 2029 08:46:36&lt;BR /&gt;7 azurefw SIC 39123 03 Jan 2029 09:32:43&lt;BR /&gt;8 CPAZUREcluster1 SIC 75718 18 Jan 2029 08:34:45&lt;BR /&gt;9 CPAZUREcluster2 SIC 78289 18 Jan 2029 08:36:03&lt;/P&gt;
&lt;P&gt;[Expert@cpazuremgmt:0]#&lt;/P&gt;</description>
      <pubDate>Sun, 05 May 2024 13:07:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213200#M40561</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-05T13:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213228#M40583</link>
      <description>&lt;P&gt;If you still want to go down this path and use ssh ...&lt;BR /&gt;&lt;BR /&gt;Per domain:&amp;nbsp;&lt;BR /&gt;mgmt_cli -d "your-domain" show vpn-communities-star limit 100 details-level "full"&lt;BR /&gt;&lt;BR /&gt;Cross domain will not allow the use the detail-level "full"&lt;BR /&gt;mgmt_cli show vpn-communities-star limit 100 domains-to-process.1 "ALL_DOMAINS_ON_THIS_SERVER" ignore-warnings true&lt;BR /&gt;&lt;BR /&gt;I'm an API Noob so cannot figure out how to filter output on just community name and&amp;nbsp;use-shared-secret. Though I did try.&lt;/P&gt;</description>
      <pubDate>Sun, 05 May 2024 20:54:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213228#M40583</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2024-05-05T20:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213810#M40760</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oneliner script is amazing! thanks!&amp;nbsp; I go through each MDS domain using &lt;EM&gt;"mdsenv domain"&lt;/EM&gt; and run it.&amp;nbsp;I used to parse data from cpca_client lscert ....&amp;nbsp; even made a script to go through each domain ...a real pain as I had to remove empty lines and so on.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regards to showing vpn star/meshed config, I still have an issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) once I login to MDS using ssh and type mdsenv Domain_Name -&amp;nbsp; &lt;EM&gt;mgmt_cli show vpn-communities-star&lt;/EM&gt; commands returns -&amp;nbsp; 0 objects.&lt;/P&gt;&lt;P&gt;2) I'm able to login&amp;nbsp; successfully to "System Data" domain using "&amp;gt; id.txt" option.&amp;nbsp; When I run&amp;nbsp;&lt;EM&gt;mgmt_cli -d Domain_VPN show vpn-communities-meshed limit 100 details-level "full" -s id.txt&lt;/EM&gt; , I get&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;objects: []&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;total: 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;My&amp;nbsp; MDS user account has access to Management CLI and read rights across all domains.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is from Management API reference:.&amp;nbsp;&lt;/P&gt;&lt;H5&gt;&lt;EM&gt;Security Management Server and Multi-Domain Server&lt;/EM&gt;&lt;/H5&gt;&lt;H5&gt;&lt;EM&gt;There are different domains for the Multi-Domain Server and the Security Management Server, and each domain has its own API calls:&lt;/EM&gt;&lt;/H5&gt;&lt;UL&gt;&lt;LI&gt;&lt;H5&gt;&lt;EM&gt;Multi-Domain Server - The default login is to the&amp;nbsp;&lt;FONT face="Courier New" size="3.5"&gt;System Data&lt;/FONT&gt;&amp;nbsp;domain. This allows you to manage administrators, domains and other system objects.&lt;/EM&gt;&lt;/H5&gt;&lt;UL&gt;&lt;LI&gt;&lt;H5&gt;&lt;EM&gt;To log in to a specific domain by name or IP address, use the domain parameter.&lt;/EM&gt;&lt;/H5&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 09 May 2024 21:46:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213810#M40760</guid>
      <dc:creator>sorinstf</dc:creator>
      <dc:date>2024-05-09T21:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213820#M40761</link>
      <description>&lt;P&gt;Hi.&lt;BR /&gt;&lt;BR /&gt;Just tried on another MDM and had the same issue as you. I was able to get around it with using the domain IP address.&lt;BR /&gt;Also using the domain IP to create the id.txt as well. So have a play around with that&lt;/P&gt;&lt;P&gt;mgmt_cli login user &amp;lt;username&amp;gt; -d "&amp;lt;CMA IP&amp;gt;" &amp;gt; id.txt&lt;BR /&gt;mgmt_cli -d &amp;lt;CMA IP&amp;gt; show vpn-communities-meshed limit 100 details-level "full" -s id.txt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 02:32:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213820#M40761</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2024-05-10T02:32:01Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213873#M40784</link>
      <description>&lt;P&gt;This simple change from domain name to domain IP address did the trick! I appreciate you time and effort.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to give something back to the community:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step one :&lt;/P&gt;&lt;P&gt;1) login to MDS using SSH then type:&amp;nbsp;&amp;nbsp;mgmt_cli login user justin_user domain domain_IP_addr&amp;nbsp; &amp;gt; id.txt&lt;/P&gt;&lt;P&gt;2) use this command to extract VPN Star Domains using jq to parse json , extract VPN community and join it with Domain Name, for example.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;mgmt_cli -d "domain_IP_address" show vpn-communities-star limit 200 details-level full -s id.txt --format json | $CPDIR/jq/jq -r '.objects[] | select(.type == "vpn-community-star" or .type == "interoperable-device") | [.["name"],.["domain"]["name"]] | join(";")' -r&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I'm no Linux guru, I was not able to extract only VPN Communities with "&lt;EM&gt;"use-shared-secret" : false"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 19:39:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213873#M40784</guid>
      <dc:creator>sorinstf</dc:creator>
      <dc:date>2024-05-10T19:39:09Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213874#M40785</link>
      <description>&lt;P&gt;Many thanks for the onliner tool !&lt;/P&gt;&lt;P&gt;I look forward to any Check Point PRTG integration!!!&amp;nbsp; Plese leave a message if there is anything I can help with testing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 19:28:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213874#M40785</guid>
      <dc:creator>sorinstf</dc:creator>
      <dc:date>2024-05-10T19:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213875#M40786</link>
      <description>&lt;P&gt;Amazing tool indeed.&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 19:56:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/213875#M40786</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-10T19:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/214217#M40889</link>
      <description>&lt;P&gt;Get it done and submit it...you might win something &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/Toolbox-Contest-2024/con-p/toolbox2024" target="_blank"&gt;https://community.checkpoint.com/t5/Toolbox-Contest-2024/con-p/toolbox2024&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 17:43:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/214217#M40889</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-05-14T17:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/214230#M40890</link>
      <description>&lt;P&gt;Try this:&lt;BR /&gt;mgmt_cli -d "domain_IP_address" show vpn-communities-star limit 200 details-level full -s id.txt --format json | $CPDIR/jq/jq -r '.objects[] | "NAME,\(.name)","PreSharedKey,\(."use-shared-secret")"'&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 20:03:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/214230#M40890</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2024-05-14T20:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/214232#M40891</link>
      <description>&lt;P&gt;That's excellent!!! Many thanks!&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any possibility to have the output&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;on a single line?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I would then export this in a text, run the script from a remote linux machine and grab it with scp.&amp;nbsp; Makes life easier &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;NAME,RAS-VPN-BMC
PreSharedKey,false
NAME,RAS-VPN-FTC
PreSharedKey,true
NAME,VPN-JAY-DMA
PreSharedKey,false
NAME,VPN-COR-HEV
PreSharedKey,true&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 20:28:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/214232#M40891</guid>
      <dc:creator>sorinstf</dc:creator>
      <dc:date>2024-05-14T20:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/214245#M40895</link>
      <description>&lt;P&gt;Nah I failed &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Best effort I can do is the following.&lt;BR /&gt;mgmt_cli -d "domain_IP_address" show vpn-communities-star limit 200 details-level full -s id.txt --format json | $CPDIR/jq/jq -r '.objects[] | "NAME/PSK,\([.name,."use-shared-secret"])"'&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;and to text&lt;/P&gt;&lt;P&gt;mgmt_cli -d "domain_IP_address" show vpn-communities-star limit 200 details-level full -s id.txt --format json | $CPDIR/jq/jq -r '.objects[] | "NAME/PSK,\([.name,."use-shared-secret"])"' &amp;gt; cert.txt&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 22:16:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/214245#M40895</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2024-05-14T22:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: list all VPNs using certificate for phase1 and vpn cert store in mds</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/214246#M40896</link>
      <description>&lt;P&gt;Is this expected?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Expert@CP-management:0]# mgmt_cli -d "domain_IP_address" show vpn-communities-star limit 200 details-level full -s id.txt --format json | $CPDIR/jq/jq -r '.objects[] | "NAME,\(.name)","PreSharedKey,\(."use-shared-secret")"'&lt;BR /&gt;Failed to open login output file [id.txt]&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 22:28:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-all-VPNs-using-certificate-for-phase1-and-vpn-cert-store-in/m-p/214246#M40896</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-14T22:28:03Z</dc:date>
    </item>
  </channel>
</rss>

