<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: In a cluster environment, is it possible to make the snmp daemon listen on a VIP ? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/262011#M51376</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The customer has many sensitive IPSEC VPN tunnels with partners, and the idea here is to monitor via SNMP the status of these tunnels using the OID .1.3.6.1.4.1.2620.500.9002.1.3.A.B.C.D.0, where A.B.C.D represents the IP address of a peer.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Thu, 06 Nov 2025 15:27:58 GMT</pubDate>
    <dc:creator>constant69</dc:creator>
    <dc:date>2025-11-06T15:27:58Z</dc:date>
    <item>
      <title>In a cluster environment, is it possible to make the snmp daemon listen on a VIP ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/261857#M51338</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hello,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I have a Check Point cluster running R81.20.&lt;BR /&gt;This cluster establishes IPSec tunnels with several peers.&lt;/P&gt;&lt;P&gt;I would like to monitor the status of the different tunnels via the active member.&lt;/P&gt;&lt;P&gt;I just noticed that the SNMP daemon is not listening on the VIP.&lt;BR /&gt;Is it possible to make this SNMP daemon listen on a VIP?&lt;/P&gt;&lt;P&gt;Here are the details:&lt;BR /&gt;On my cluster, SNMP is listening on the interfaces below.&lt;/P&gt;&lt;TABLE width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="100%"&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;xxxxx&amp;gt; show snmp interfaces&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Enabled SNMP Agent Interfaces are&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;eth5&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;eth9&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;xxxxx&amp;gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the real IP address associated with &lt;STRONG&gt;eth5&lt;/STRONG&gt; as well as the VIP.&lt;/P&gt;&lt;TABLE width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="100%"&gt;&lt;P&gt;&lt;STRONG&gt;[Expert@xxxxx:0]# ifconfig eth5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;eth5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Link encap:Ethernet&amp;nbsp; HWaddr xx:xx:xx:xx:xx:xx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;inet addr:10.1.0.254&amp;nbsp; Bcast:10.1.0.255&amp;nbsp; Mask:255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;UP BROADCAST RUNNING MULTICAST&amp;nbsp; MTU:1500&amp;nbsp; Metric:1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;RX packets:3450678212 errors:0 dropped:3132 overruns:0 frame:0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;TX packets:3172616142 errors:0 dropped:0 overruns:0 carrier:0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;collisions:0 txqueuelen:1000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;RX bytes:2039943960807 (1.8 TiB)&amp;nbsp; TX bytes:1476745060960 (1.3 TiB)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;Interrupt:44&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="100%"&gt;&lt;P&gt;&lt;STRONG&gt;[Expert@xxxxx:0]# cphaprob -a if | grep eth5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;eth5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;eth5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.0.252&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VMAC address: xx:xx:xx:xx:xx:xx&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An snmpwalk on the real IP associated with eth5 works.&lt;/P&gt;&lt;TABLE width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="100%"&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;[Expert@xxxxx:0]# snmpwalk -v 2c -c XXXXXX 10.1.0.254 .1.3.6.1.4.1.2620.500.9002.1.3.A.B.C.D.0&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;SNMPv2-SMI::enterprises.2620.500.9002.1.3.A.B.C.D.0 = Gauge32: 3&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An snmpwalk on the VIP associated with eth5 does not work.&lt;/P&gt;&lt;TABLE width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="100%"&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;[Expert@xxxxx:0]# snmpwalk -v 2c -c XXXXXX -RO 10.1.0.252 .1.3.6.1.4.1.2620.500.9002.1.3.A.B.C.D.0&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Timeout: No Response from 10.1.0.252&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The netstat command below shows that the SNMP daemon is listening on the real IPs of interfaces eth5 and eth9.&lt;/P&gt;&lt;TABLE width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="100%"&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;[Expert@xxxxx:0]# netstat -anop | grep :161&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;udp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 10.1.0.254:161&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13462/snmpd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; off (0.00/0/0)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;udp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 10.2.3.252:161&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13462/snmpd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; off (0.00/0/0)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance for your help.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2025 09:53:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/261857#M51338</guid>
      <dc:creator>constant69</dc:creator>
      <dc:date>2025-11-05T09:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: In a cluster environment, is it possible to make the snmp daemon listen on a VIP ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/261944#M51355</link>
      <description>&lt;P&gt;I dont believe that can be configured for VIP, as far as snmp is concerned. I would try set this up for both members, so regardless which one is master at any given time, it would always give the info for both members.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 03:21:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/261944#M51355</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-06T03:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: In a cluster environment, is it possible to make the snmp daemon listen on a VIP ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/261955#M51359</link>
      <description>&lt;P&gt;What is your idea to monitoring VPN over SNMP ?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 06:47:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/261955#M51359</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2025-11-06T06:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: In a cluster environment, is it possible to make the snmp daemon listen on a VIP ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/262008#M51374</link>
      <description>&lt;P&gt;No, because SNMP is a per-host operation. &amp;nbsp;It is designed to monitor the status of things on the host. &amp;nbsp;You can use SNMP to monitor operations of each cluster member as well as the Check Point processes (enable this in "cpconfig", option 2, and restart the services). &amp;nbsp;If you were to monitor as the VIP only, then you would not be getting status of the standby cluster member, which you still need.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 15:18:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/262008#M51374</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-11-06T15:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: In a cluster environment, is it possible to make the snmp daemon listen on a VIP ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/262010#M51375</link>
      <description>&lt;P&gt;Thats exactly what I thought as well, thanks for confirming!&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 15:23:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/262010#M51375</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-06T15:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: In a cluster environment, is it possible to make the snmp daemon listen on a VIP ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/262011#M51376</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The customer has many sensitive IPSEC VPN tunnels with partners, and the idea here is to monitor via SNMP the status of these tunnels using the OID .1.3.6.1.4.1.2620.500.9002.1.3.A.B.C.D.0, where A.B.C.D represents the IP address of a peer.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 15:27:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/In-a-cluster-environment-is-it-possible-to-make-the-snmp-daemon/m-p/262011#M51376</guid>
      <dc:creator>constant69</dc:creator>
      <dc:date>2025-11-06T15:27:58Z</dc:date>
    </item>
  </channel>
</rss>

