<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Monitor VPN Tunnel Using SNMP in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76742#M3121</link>
    <description>&lt;P&gt;Sweet. May be remove public IPs from output.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 28 Feb 2020 17:35:20 GMT</pubDate>
    <dc:creator>HristoGrigorov</dc:creator>
    <dc:date>2020-02-28T17:35:20Z</dc:date>
    <item>
      <title>Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76199#M3090</link>
      <description>&lt;P&gt;Check Point&amp;nbsp;730 Appliance&lt;/P&gt;&lt;P&gt;Version: R77.20.87 (990173004)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I have a VPN tunnel between two (2) Check Point 730 Appliances. Both have the same firmware version.&amp;nbsp; Tunnel works most of the time but occasionally it fails.&amp;nbsp; I have not been able to determine how this failure is recorded in the System logs.&amp;nbsp; Nor have I found the OID that would permit monitoring this via SNMP.&amp;nbsp; Can anyone point me in the right direction.&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2020 13:04:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76199#M3090</guid>
      <dc:creator>Thomas_Dunlap</dc:creator>
      <dc:date>2020-02-24T13:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76200#M3091</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Quite easy to achieve actually. All you need to do is fetch this OID:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;.1.3.6.1.4.1.2620.500.9002.1.3.xxx.xxx.xxx.xxx.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;where&amp;nbsp;xxx.xxx.xxx.xxx is the IP of the other gateway. Match the returned value against following table:&lt;/P&gt;
&lt;P&gt;3 active&lt;BR /&gt;4 destroy&lt;BR /&gt;129 idle&lt;BR /&gt;130 phase1&lt;BR /&gt;131 down&lt;BR /&gt;132 init&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2020 13:16:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76200#M3091</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-02-24T13:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76690#M3104</link>
      <description>&lt;P&gt;Hristo, any ideas why Zabbix discovery of VPN tunnels does not work on SMB appliances?&lt;/P&gt;&lt;P&gt;I'm using&amp;nbsp;discovery[{#SNMPVALUE},1.3.6.1.4.1.2620.500.9002.1.2].&amp;nbsp;It works fine in enterprise appliances, but not on SMB.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 13:07:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76690#M3104</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2020-02-28T13:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76695#M3105</link>
      <description>&lt;P&gt;Change OID to&amp;nbsp;&lt;STRONG&gt;.1.3.6.1.4.1.2620.500.9002.1&lt;/STRONG&gt; and it shall&amp;nbsp; work.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 13:12:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76695#M3105</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-02-28T13:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76706#M3106</link>
      <description>&lt;P&gt;When I do that it discovers everything in the table and the items do not work.&lt;/P&gt;&lt;P&gt;From&amp;nbsp;&lt;A href="https://www.zabbix.com/documentation/current/manual/discovery/low_level_discovery/snmp_oids" target="_blank"&gt;https://www.zabbix.com/documentation/current/manual/discovery/low_level_discovery/snmp_oids&lt;/A&gt;&amp;nbsp;we see the correct format is&amp;nbsp;&lt;SPAN&gt;discovery[{#MACRO},&amp;lt;oid-of-column&amp;gt;], like I was using with the column&amp;nbsp;tunnelPeerObjName.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The problem is that the gateway does not respond to SNMP walk on OID 1.3.6.1.4.1.2620.500.9002.1.2 or any other column. I don't know why.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:root@fw:" target="_blank"&gt;root@host:/#&lt;/A&gt; snmpwalk -v 2c -c public 192.168.1.1 1.3.6.1.4.1.2620.500.9002.1.2&lt;/P&gt;&lt;P&gt;iso.3.6.1.4.1.2620.500.9002.1.2 = No Such Instance currently exists at this OID&lt;/P&gt;&lt;P&gt;The walk works on enterprise gateways and the discovery succeeds.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 14:39:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76706#M3106</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2020-02-28T14:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76716#M3107</link>
      <description>&lt;P&gt;The following command works for me:&lt;/P&gt;
&lt;P&gt;# snmpwalk -v 2c -On -c public 192.168.0.1 .1.3.6.1.4.1.2620.500.9002.1&lt;/P&gt;
&lt;P&gt;I do not know if the table that is returned is what auto-discovery expects. But it is probably easy to adjust it to work.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 15:17:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76716#M3107</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-02-28T15:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76727#M3108</link>
      <description>&lt;P&gt;On second thought... The way VPN table is returned is a bit lame... How on earth am I supposed to enumerate table where peer IP is part of the OID ? I am almost sure auto-discovery won't be possible here. I do not understand what the author (vendor) meant to do it like that...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 15:37:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76727#M3108</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-02-28T15:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76730#M3109</link>
      <description>&lt;P&gt;To all, many thanks I have finally got this to work. I do appreciate all that have responded&lt;/P&gt;&lt;P&gt;Key take away is use the snmpwalk to get it right. Now I can fine tune my PRTG.&amp;nbsp; Here are the results I found. Hopefully this will help others.&amp;nbsp; Have a nice day&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----------------------- New Test -----------------------&lt;BR /&gt;2/28/2020 10:33:40 AM (3 ms) : Device: 192.168.0.1&lt;BR /&gt;2/28/2020 10:33:40 AM (5 ms) : SNMP V2c&lt;BR /&gt;2/28/2020 10:33:40 AM (5 ms) : Walk 1.3.6.1.4.1.2620.500.9002.1&lt;BR /&gt;2/28/2020 10:33:40 AM (290 ms) : 1.3.6.1.4.1.2620.500.9002.1.2. = "VPN_Site1" [ASN_OCTET_STR]&lt;BR /&gt;2/28/2020 10:33:41 AM (563 ms) : 1.3.6.1.4.1.2620.500.9002.1.3. = "3" [ASN_COUNTER]&lt;BR /&gt;2/28/2020 10:33:41 AM (832 ms) : 1.3.6.1.4.1.2620.500.9002.1.4. = "VPN_Site1_community" [ASN_OCTET_STR]&lt;BR /&gt;2/28/2020 10:33:41 AM (1192 ms) : 1.3.6.1.4.1.2620.500.9002.1.5 = "0.0.0.0" [ASN_IPADDRESS]&lt;BR /&gt;2/28/2020 10:33:42 AM (1456 ms) : 1.3.6.1.4.1.2620.500.9002.1.6. = "" [ASN_OCTET_STR]&lt;BR /&gt;2/28/2020 10:33:42 AM (1912 ms) : 1.3.6.1.4.1.2620.500.9002.1.7. = "0.0.0.0" [ASN_OCTET_STR]&lt;BR /&gt;2/28/2020 10:33:42 AM (2361 ms) : 1.3.6.1.4.1.2620.500.9002.1.8. = "0" [ASN_COUNTER]&lt;BR /&gt;2/28/2020 10:33:43 AM (2820 ms) : 1.3.6.1.4.1.2620.500.9002.1.9. = "0" [ASN_COUNTER]&lt;BR /&gt;2/28/2020 10:33:43 AM (3316 ms) : 1.3.6.1.4.1.2620.500.9002.1.10. = "1" [ASN_COUNTER]&lt;BR /&gt;2/28/2020 10:33:44 AM (3764 ms) : 1.3.6.1.4.1.2620.500.9002.1.11. = "1" [ASN_COUNTER]&lt;/P&gt;&lt;P&gt;----------------------- New Test -----------------------&lt;BR /&gt;&lt;BR /&gt;2/28/2020 10:38:29 AM (7 ms) : Device: 10.99.1.3&lt;BR /&gt;2/28/2020 10:38:29 AM (10 ms) : SNMP V2c&lt;BR /&gt;2/28/2020 10:38:29 AM (12 ms) : Walk 1.3.6.1.4.1.2620.500.9002.1&lt;BR /&gt;2/28/2020 10:38:29 AM (22 ms) : 1.3.6.1.4.1.2620.500.9002.1.2. = "VPN_Site2" [ASN_OCTET_STR]&lt;BR /&gt;2/28/2020 10:38:29 AM (34 ms) : 1.3.6.1.4.1.2620.500.9002.1.3. = "3" [ASN_COUNTER]&lt;BR /&gt;2/28/2020 10:38:29 AM (42 ms) : 1.3.6.1.4.1.2620.500.9002.1.4. = "VPN_Site2_community" [ASN_OCTET_STR]&lt;BR /&gt;2/28/2020 10:38:29 AM (50 ms) : 1.3.6.1.4.1.2620.500.9002.1.5. = "0.0.0.0" [ASN_IPADDRESS]&lt;BR /&gt;2/28/2020 10:38:29 AM (58 ms) : 1.3.6.1.4.1.2620.500.9002.1.6. = "" [ASN_OCTET_STR]&lt;BR /&gt;2/28/2020 10:38:29 AM (67 ms) : 1.3.6.1.4.1.2620.500.9002.1.7. = "0.0.0.0" [ASN_OCTET_STR]&lt;BR /&gt;2/28/2020 10:38:29 AM (76 ms) : 1.3.6.1.4.1.2620.500.9002.1.8. = "0" [ASN_COUNTER]&lt;BR /&gt;2/28/2020 10:38:29 AM (89 ms) : 1.3.6.1.4.1.2620.500.9002.1.9. = "0" [ASN_COUNTER]&lt;BR /&gt;2/28/2020 10:38:29 AM (116 ms) : 1.3.6.1.4.1.2620.500.9002.10. = "1" [ASN_COUNTER]&lt;BR /&gt;2/28/2020 10:38:29 AM (125 ms) : 1.3.6.1.4.1.2620.500.9002.1.11. = "1" [ASN_COUNTER]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 17:50:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76730#M3109</guid>
      <dc:creator>Thomas_Dunlap</dc:creator>
      <dc:date>2020-02-28T17:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76742#M3121</link>
      <description>&lt;P&gt;Sweet. May be remove public IPs from output.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 17:35:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76742#M3121</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-02-28T17:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76787#M3137</link>
      <description>&lt;P&gt;Any idea how this changes based on configuration of VPN Tunnel sharing? (device -&amp;gt; advanced settings -&amp;gt; VPN Tunnel Sharing.&lt;/P&gt;&lt;P&gt;I don't see any indication of what subnets are involved in the snmp options. The default is a vpn tunnel per subnet. What i'm assuming is this snmp output is showing if any vpn tunnel is up to the given peer. If that is the case I would expect this isn't as useful as it could be unless the VPN was a VTI or the tunnel sharing mode was set to gateway so that all traffic went through a single vpn tunnel vs 1 vpn tunnel per subnet (or host).&lt;/P&gt;</description>
      <pubDate>Sat, 29 Feb 2020 18:29:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76787#M3137</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-02-29T18:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76789#M3138</link>
      <description>&lt;P&gt;Not sure but I think tunnel is considered active when both Phase 1 and Phase 2 are negotiated. For permanent tunnels it could be counting result from tunnel_test or dpd as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Btw, I found&amp;nbsp;sk63663 that explains exactly how VPN tunnels are supposed to be monitored via SNMP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Feb 2020 19:07:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76789#M3138</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-02-29T19:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76813#M3141</link>
      <description>&lt;P&gt;Thats kind of my point. There are 3 vpn configs that will drastically change phase II and its not clear how this is reflected via snmp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That being said i've never looked at customizing snmpd and it looks really easy.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Mar 2020 13:04:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/76813#M3141</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-03-01T13:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor VPN Tunnel Using SNMP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/97317#M4169</link>
      <description>&lt;P&gt;Bump:&lt;/P&gt;&lt;P&gt;Tunnel management can be set to 1 tunnel per gateway, 1 tunnel per network or 1 tunnel per host. These settings have a pretty massive effect on how many vpn tunnels are up between a pair.&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I verify tunnel configuration via snmp without just forcing everything to be 1 tunnel per gateway or is that just the only option?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 21:06:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Monitor-VPN-Tunnel-Using-SNMP/m-p/97317#M4169</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-09-22T21:06:26Z</dc:date>
    </item>
  </channel>
</rss>

