<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic &amp;quot;fw tab -t subnet_for_range_and_peer&amp;quot; for automatic  Calculated  IPSec IDs in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/quot-fw-tab-t-subnet-for-range-and-peer-quot-for-automatic/m-p/9759#M1324</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If i set the subnetmask for a given range and peer in user.def I can check the Information with this command "fw tab -t subnet_for_range_and_peer" (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec#Related documents"&gt;sk108600 Scenario 1&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does someone know a way to get that Information for the automatically calculated IPsec IDs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can get the Ranges with&lt;/P&gt;&lt;P&gt;[Expert@????:0]# fw tab -t vpn_enc_domain -f&lt;BR /&gt;&amp;nbsp;Using cptfmt&lt;BR /&gt;Formatting table's data - this might take a while...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;localhost:&lt;BR /&gt;Date: Mar 27, 2018&lt;BR /&gt;18:19:04&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.???&amp;nbsp; &amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :(+)====================================(+);Table_Name:vpn_enc_domain;:(+);Attributes:static, id 513;product:VPN-1 &amp;amp; FireWall-1;product_family:Network&lt;BR /&gt;18:19:04&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.???&amp;nbsp; &amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; :(+);First:10.50.0.0;,Last:10.50.255.255;product:VPN-1 &amp;amp; FireWall-1;product_family:Network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is missing are the used Netmasks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Mar 2018 17:11:56 GMT</pubDate>
    <dc:creator>Peter_Rexa</dc:creator>
    <dc:date>2018-03-27T17:11:56Z</dc:date>
    <item>
      <title>"fw tab -t subnet_for_range_and_peer" for automatic  Calculated  IPSec IDs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-fw-tab-t-subnet-for-range-and-peer-quot-for-automatic/m-p/9759#M1324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If i set the subnetmask for a given range and peer in user.def I can check the Information with this command "fw tab -t subnet_for_range_and_peer" (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec#Related documents"&gt;sk108600 Scenario 1&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does someone know a way to get that Information for the automatically calculated IPsec IDs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can get the Ranges with&lt;/P&gt;&lt;P&gt;[Expert@????:0]# fw tab -t vpn_enc_domain -f&lt;BR /&gt;&amp;nbsp;Using cptfmt&lt;BR /&gt;Formatting table's data - this might take a while...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;localhost:&lt;BR /&gt;Date: Mar 27, 2018&lt;BR /&gt;18:19:04&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.???&amp;nbsp; &amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :(+)====================================(+);Table_Name:vpn_enc_domain;:(+);Attributes:static, id 513;product:VPN-1 &amp;amp; FireWall-1;product_family:Network&lt;BR /&gt;18:19:04&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.???&amp;nbsp; &amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; :(+);First:10.50.0.0;,Last:10.50.255.255;product:VPN-1 &amp;amp; FireWall-1;product_family:Network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is missing are the used Netmasks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2018 17:11:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-fw-tab-t-subnet-for-range-and-peer-quot-for-automatic/m-p/9759#M1324</guid>
      <dc:creator>Peter_Rexa</dc:creator>
      <dc:date>2018-03-27T17:11:56Z</dc:date>
    </item>
    <item>
      <title>Re: "fw tab -t subnet_for_range_and_peer" for automatic  Calculated  IPSec IDs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-fw-tab-t-subnet-for-range-and-peer-quot-for-automatic/m-p/9760#M1325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I suspect in your attempt to obfuscate the information, you've probably masked out the exact information needed.&lt;/P&gt;&lt;P&gt;Feel free to send me the unobscured data in a PM and I can take a look.&lt;/P&gt;&lt;P&gt;Also, please do the output of&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;fw tab -t vpn_enc_domain as described in the SK.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2018 04:08:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-fw-tab-t-subnet-for-range-and-peer-quot-for-automatic/m-p/9760#M1325</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-29T04:08:36Z</dc:date>
    </item>
    <item>
      <title>Re: "fw tab -t subnet_for_range_and_peer" for automatic  Calculated  IPSec IDs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-fw-tab-t-subnet-for-range-and-peer-quot-for-automatic/m-p/72781#M14754</link>
      <description>&lt;P&gt;As the output for this command is HEX (and who loves that!?) you might try this one liner:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;for line in `fw tab -t subnet_for_range_and_peer | grep "&amp;lt;" | sed $'s/[^[:alnum:]\t]//g'`; do echo; counter=0; for item in `echo $line | sed 's/.\{2\}/&amp;amp; /g'`; do counter=$((counter+1)); echo -n $((16#$item)); if [ "$counter" -lt "4" ]; then echo -n "."; elif [ "$counter" == "4" ]; then counter=0; echo -n " "; fi; done; done; echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers, Simon&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 02:35:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-fw-tab-t-subnet-for-range-and-peer-quot-for-automatic/m-p/72781#M14754</guid>
      <dc:creator>Simon_Taylor</dc:creator>
      <dc:date>2020-01-21T02:35:14Z</dc:date>
    </item>
    <item>
      <title>Re: "fw tab -t subnet_for_range_and_peer" for automatic  Calculated  IPSec IDs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-fw-tab-t-subnet-for-range-and-peer-quot-for-automatic/m-p/72784#M14756</link>
      <description>&lt;H3&gt;&lt;A href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/One-liner-to-show-VPN-topology-on-gateways/td-p/57975" target="_self"&gt;&lt;SPAN&gt;One-liner to show VPN topology on gateways&lt;/SPAN&gt;&lt;/A&gt;&lt;/H3&gt;</description>
      <pubDate>Tue, 21 Jan 2020 05:50:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-fw-tab-t-subnet-for-range-and-peer-quot-for-automatic/m-p/72784#M14756</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2020-01-21T05:50:32Z</dc:date>
    </item>
  </channel>
</rss>

