<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to monitor Check Point API? in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/215182#M8528</link>
    <description>&lt;P&gt;The 'api' command requires root access to run, which I know&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;I&lt;/STRONG&gt;&lt;/EM&gt; would rather not give to a monitoring tool. The cURL call definitely works, though. You get a 503 when the API is down, and a 400 when the API is up. Zero authentication needed:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@TestSC]# api stop
2024-May-24 13:36:05 - Stopping API ...
2024-May-24 13:36:07 - API stopped successfully.
[Expert@TestSC]# curl_cli -vkX POST https://127.0.0.1/web_api/login 
*   Trying 127.0.0.1...
* TCP_NODELAY set
* Connected to 127.0.0.1 (127.0.0.1) port 443 (#0)
* ALPN, offering http/1.1
* *** Current date is: Fri May 24 13:36:21 2024
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* err is -1, detail is 2
* *** Current date is: Fri May 24 13:36:21 2024
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* servercert: Activated
* servercert: CRL validation was disabled
* Server certificate:
*  subject: L=Locality Name (eg, city); CN=169.254.0.1; emailAddress=Email Address; unstructuredName=An optional company name
*  start date: May 19 16:16:45 2024 GMT
*  expire date: May 19 16:16:45 2034 GMT
*  issuer: L=Locality Name (eg, city); CN=169.254.0.1; emailAddress=Email Address; unstructuredName=An optional company name
*  SSL certificate verify result: self signed certificate (18), continuing anyway.
* servercert: Finished
&amp;lt; HTTP/1.1 503 Service Unavailable
&amp;lt; Date: Fri, 24 May 2024 13:36:21 GMT
&amp;lt; Server: CPWS
&amp;lt; Strict-Transport-Security: max-age=31536000; includeSubDomains
&amp;lt; X-Frame-Options: SAMEORIGIN
&amp;lt; Content-Length: 299
&amp;lt; Connection: close
&amp;lt; Content-Type: text/html; charset=iso-8859-1
&amp;lt; 
&amp;lt;!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"&amp;gt;
&amp;lt;html&amp;gt;&amp;lt;head&amp;gt;
&amp;lt;title&amp;gt;503 Service Unavailable&amp;lt;/title&amp;gt;
&amp;lt;/head&amp;gt;&amp;lt;body&amp;gt;
&amp;lt;h1&amp;gt;Service Unavailable&amp;lt;/h1&amp;gt;
&amp;lt;p&amp;gt;The server is temporarily unable to service your
request due to maintenance downtime or capacity
problems. Please try again later.&amp;lt;/p&amp;gt;
&amp;lt;/body&amp;gt;&amp;lt;/html&amp;gt;
* Closing connection 0
* TLSv1.2 (OUT), TLS alert, close notify (256):
[Expert@TestSC]# api start
2024-May-24 13:36:29 - Starting API ...
2024-May-24 13:36:31 - API started successfully.
[Expert@TestSC]# curl_cli -vkX POST https://127.0.0.1/web_api/login 
*   Trying 127.0.0.1...
* TCP_NODELAY set
* Connected to 127.0.0.1 (127.0.0.1) port 443 (#0)
* ALPN, offering http/1.1
* *** Current date is: Fri May 24 13:37:51 2024
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* err is -1, detail is 2
* *** Current date is: Fri May 24 13:37:51 2024
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* servercert: Activated
* servercert: CRL validation was disabled
* Server certificate:
*  subject: L=Locality Name (eg, city); CN=169.254.0.1; emailAddress=Email Address; unstructuredName=An optional company name
*  start date: May 19 16:16:45 2024 GMT
*  expire date: May 19 16:16:45 2034 GMT
*  issuer: L=Locality Name (eg, city); CN=169.254.0.1; emailAddress=Email Address; unstructuredName=An optional company name
*  SSL certificate verify result: self signed certificate (18), continuing anyway.
* servercert: Finished
&amp;lt; HTTP/1.1 400 Bad Request
&amp;lt; Date: Fri, 24 May 2024 13:37:51 GMT
&amp;lt; Server: Jetty(9.2.9.v20150224)
&amp;lt; Strict-Transport-Security: max-age=31536000; includeSubDomains
&amp;lt; X-Frame-Options: SAMEORIGIN
&amp;lt; Content-Type: application/json
&amp;lt; X-UA-Compatible: IE=EmulateIE8
&amp;lt; X-Forwarded-Host-Port: 443
&amp;lt; Connection: close
&amp;lt; Transfer-Encoding: chunked
&amp;lt; 
{
  "code" : "generic_err_invalid_syntax",
  "message" : "Login request message processing failed"
* Closing connection 0
* TLSv1.2 (OUT), TLS alert, close notify (256):
}[Expert@TestSC]# &lt;/LI-CODE&gt;</description>
    <pubDate>Fri, 24 May 2024 13:44:08 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2024-05-24T13:44:08Z</dc:date>
    <item>
      <title>How to monitor Check Point API?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/81418#M4708</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;one question. Do I have any chances to monitor the status of the REST API &lt;U&gt;without&lt;/U&gt; a login?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the CLI I am able to check the "api status".&lt;/P&gt;&lt;P&gt;If everything is fine I will get the message&lt;/P&gt;&lt;P&gt;"API readiness test SUCCESSFUL. The server is up and ready to receive connections"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I want to monitor the API status with a simple curl statement. But without the need of a session id and authorization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards!&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 09:22:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/81418#M4708</guid>
      <dc:creator>IdentityUnknown</dc:creator>
      <dc:date>2020-04-09T09:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor Check Point API?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/81421#M4709</link>
      <description>&lt;P&gt;Use this CLI command and you get the mgmt version:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;# mgmt_cli -r  true show version


product-version: "Check Point Gaia R80.30"
os-build: "200"
os-kernel-version: "3.10.0-693cpx86_64"
os-edition: "64-bit"
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 09:30:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/81421#M4709</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-04-09T09:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor Check Point API?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/81423#M4710</link>
      <description>&lt;P&gt;Yes, but I need the status from an external monitoring device and via https.&lt;BR /&gt;I need an URL which I am able to access without login credentials and which will response with http status 200 if the API is up and running.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://1.1.1.1:443/web_api" target="_blank"&gt;https://1.1.1.1:443/web_api&lt;/A&gt;&amp;nbsp;responses with 200 but it doesn't matter if the API is up or down.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 09:42:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/81423#M4710</guid>
      <dc:creator>IdentityUnknown</dc:creator>
      <dc:date>2020-04-09T09:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor Check Point API?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/81442#M4711</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can either for mgmt api use the SDK from Checkpoint ( &lt;A href="https://github.com/CheckPointSW/cp_mgmt_api_python_sdk" target="_blank" rel="noopener"&gt;https://github.com/CheckPointSW/cp_mgmt_api_python_sdk&lt;/A&gt; ) for logging in and checking if logging in was successful. like:&lt;/P&gt;&lt;P&gt;if login_res.success is False:&lt;BR /&gt;&amp;nbsp; print("Login failed: {}".format(login_res.error_message))&lt;BR /&gt;&amp;nbsp; raise SystemExit("UNKNOWN")&lt;BR /&gt;do-something = client.api_call("show-something")&lt;/P&gt;&lt;P&gt;if login_res.success just checks if the respons´s JSON field "success" has value false&lt;/P&gt;&lt;P&gt;I assume you have some kind of Monitoring in place that looks for Responses like "OK", "WARNING, "CRITICAL" or "UNKNOWN"? i.e. Nagios based. With the SystemExit you can raise these towards the application.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(remember to logoff the session afterwards, otherwise you´ll end up with lots of orphaned sessions)&lt;/P&gt;&lt;P&gt;Maybe this helps:&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/leinadred/CP_IPS-Update-Monitoring4Nagios" target="_blank" rel="noopener"&gt;https://github.com/leinadred/CP_IPS-Update-Monitoring4Nagios&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(just take out the IPS stuff &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For gateway API there is no SDK AFAIK, so you might have to "login manually" via sending http requests in json and so... it´s possible with some time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 11:53:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/81442#M4711</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2020-04-09T11:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor Check Point API?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/81512#M4714</link>
      <description>&lt;P&gt;Every API call other than login requires an active session ID.&amp;nbsp;There is no "status" API call that I am aware of. Might be a decent RFE.&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/37502"&gt;@Omer_Kleinstern&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2020 05:09:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/81512#M4714</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-10T05:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor Check Point API?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/215077#M8525</link>
      <description>&lt;P&gt;Do you know if this has ever been implemented or if there is a different solution to actively monitor the management API? I went through the current API docs but wasn't able to find anything&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 08:24:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/215077#M8525</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2024-05-23T08:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor Check Point API?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/215108#M8526</link>
      <description>&lt;P&gt;There aren't any endpoints you can query that monitor the health of the API itself, except for possibly something via run-script.&lt;BR /&gt;However run-script requires admin privileges, which is probably not a good idea for "monitoring" purposes.&lt;BR /&gt;Even so, if you can log in with a read-only user, the API is "active."&lt;/P&gt;
&lt;P&gt;An RFE is probably necessary.&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 14:37:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/215108#M8526</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-05-23T14:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor Check Point API?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/215157#M8527</link>
      <description>&lt;P&gt;If you tell something about how you are monitoring the system and what the expected outcome is there might be ideas.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;like:&lt;/P&gt;&lt;P&gt;SNMP, expected Outcome "I want to know, if the service in general is running":&lt;/P&gt;&lt;P&gt;in Check Point MIBs i didn´t find something out of the box, that indicates mgmt API health (might be an idea for future releases?)&amp;nbsp; Maybe custom OIDs might work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CURLing onto management API LogIn endpoint with just an empty POST will end up in:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;curl https://&amp;lt;mgmtip&amp;gt;/web_api/login --insecure -X POST

{
"code" : "generic_err_invalid_syntax",
"message" : "Login request message processing failed"
}&lt;/LI-CODE&gt;&lt;P&gt;which at least indicates, that API is running and expecting LogIn informations.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another one would be to monitor by ssh (most monitoring solutions have this aboard) and let them issue something like:&lt;/P&gt;&lt;P&gt;api status | grep "API readiness\|Overall API Status" | sed -e 's/API readiness test/API State:/g'&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Expert@labfwm:0]# api status | grep "API readiness\|Overall API Status" | sed  -e 's/API readiness test/API State:/g'
Overall API Status: Started
API State: SUCCESSFUL. The server is up and ready to receive connections
[Expert@labfwm:0]# api stop
2024-May-24 07:10:28 - Stopping API ...
2024-May-24 07:10:30 - API stopped successfully.
[Expert@labfwm:0]# api status | grep "API readiness\|Overall API Status" | sed  -e 's/API readiness test/API State:/g'
Overall API Status: The API Server Is Not Running!
API State: FAILED. The server is down and unable to receive connections!
[Expert@labfwm:0]# api start
2024-May-24 07:10:41 - Starting API ...
2024-May-24 07:10:43 - API started successfully.
[Expert@labfwm:0]# api status | grep "API readiness\|Overall API Status" | sed  -e 's/API readiness test/API State:/g'
Overall API Status: Started
API State: SUCCESSFUL. The server is up and ready to receive connections
[Expert@labfwm:0]#&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only some ideas, without knowing what your thoughts / goal is. Perhaps this commands can be issued via custom OID, but did not find further documentation on this, right now. (and was too lazy to look longer than i did &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2024 05:26:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/215157#M8527</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2024-05-24T05:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor Check Point API?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/215182#M8528</link>
      <description>&lt;P&gt;The 'api' command requires root access to run, which I know&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;I&lt;/STRONG&gt;&lt;/EM&gt; would rather not give to a monitoring tool. The cURL call definitely works, though. You get a 503 when the API is down, and a 400 when the API is up. Zero authentication needed:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@TestSC]# api stop
2024-May-24 13:36:05 - Stopping API ...
2024-May-24 13:36:07 - API stopped successfully.
[Expert@TestSC]# curl_cli -vkX POST https://127.0.0.1/web_api/login 
*   Trying 127.0.0.1...
* TCP_NODELAY set
* Connected to 127.0.0.1 (127.0.0.1) port 443 (#0)
* ALPN, offering http/1.1
* *** Current date is: Fri May 24 13:36:21 2024
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* err is -1, detail is 2
* *** Current date is: Fri May 24 13:36:21 2024
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* servercert: Activated
* servercert: CRL validation was disabled
* Server certificate:
*  subject: L=Locality Name (eg, city); CN=169.254.0.1; emailAddress=Email Address; unstructuredName=An optional company name
*  start date: May 19 16:16:45 2024 GMT
*  expire date: May 19 16:16:45 2034 GMT
*  issuer: L=Locality Name (eg, city); CN=169.254.0.1; emailAddress=Email Address; unstructuredName=An optional company name
*  SSL certificate verify result: self signed certificate (18), continuing anyway.
* servercert: Finished
&amp;lt; HTTP/1.1 503 Service Unavailable
&amp;lt; Date: Fri, 24 May 2024 13:36:21 GMT
&amp;lt; Server: CPWS
&amp;lt; Strict-Transport-Security: max-age=31536000; includeSubDomains
&amp;lt; X-Frame-Options: SAMEORIGIN
&amp;lt; Content-Length: 299
&amp;lt; Connection: close
&amp;lt; Content-Type: text/html; charset=iso-8859-1
&amp;lt; 
&amp;lt;!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"&amp;gt;
&amp;lt;html&amp;gt;&amp;lt;head&amp;gt;
&amp;lt;title&amp;gt;503 Service Unavailable&amp;lt;/title&amp;gt;
&amp;lt;/head&amp;gt;&amp;lt;body&amp;gt;
&amp;lt;h1&amp;gt;Service Unavailable&amp;lt;/h1&amp;gt;
&amp;lt;p&amp;gt;The server is temporarily unable to service your
request due to maintenance downtime or capacity
problems. Please try again later.&amp;lt;/p&amp;gt;
&amp;lt;/body&amp;gt;&amp;lt;/html&amp;gt;
* Closing connection 0
* TLSv1.2 (OUT), TLS alert, close notify (256):
[Expert@TestSC]# api start
2024-May-24 13:36:29 - Starting API ...
2024-May-24 13:36:31 - API started successfully.
[Expert@TestSC]# curl_cli -vkX POST https://127.0.0.1/web_api/login 
*   Trying 127.0.0.1...
* TCP_NODELAY set
* Connected to 127.0.0.1 (127.0.0.1) port 443 (#0)
* ALPN, offering http/1.1
* *** Current date is: Fri May 24 13:37:51 2024
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* err is -1, detail is 2
* *** Current date is: Fri May 24 13:37:51 2024
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* servercert: Activated
* servercert: CRL validation was disabled
* Server certificate:
*  subject: L=Locality Name (eg, city); CN=169.254.0.1; emailAddress=Email Address; unstructuredName=An optional company name
*  start date: May 19 16:16:45 2024 GMT
*  expire date: May 19 16:16:45 2034 GMT
*  issuer: L=Locality Name (eg, city); CN=169.254.0.1; emailAddress=Email Address; unstructuredName=An optional company name
*  SSL certificate verify result: self signed certificate (18), continuing anyway.
* servercert: Finished
&amp;lt; HTTP/1.1 400 Bad Request
&amp;lt; Date: Fri, 24 May 2024 13:37:51 GMT
&amp;lt; Server: Jetty(9.2.9.v20150224)
&amp;lt; Strict-Transport-Security: max-age=31536000; includeSubDomains
&amp;lt; X-Frame-Options: SAMEORIGIN
&amp;lt; Content-Type: application/json
&amp;lt; X-UA-Compatible: IE=EmulateIE8
&amp;lt; X-Forwarded-Host-Port: 443
&amp;lt; Connection: close
&amp;lt; Transfer-Encoding: chunked
&amp;lt; 
{
  "code" : "generic_err_invalid_syntax",
  "message" : "Login request message processing failed"
* Closing connection 0
* TLSv1.2 (OUT), TLS alert, close notify (256):
}[Expert@TestSC]# &lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 24 May 2024 13:44:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-monitor-Check-Point-API/m-p/215182#M8528</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-05-24T13:44:08Z</dc:date>
    </item>
  </channel>
</rss>

