- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
You have to work with mgmt_cli exactly the same way as if you were coding against the API.
This means:
If you're on the management server itself, you can use -r true to bypass doing all of the above, but the above happens "under the covers."
When running from a Windows machine, you're obviously not on the management server, so you have to do the entire flow.
For your specific example, this means something like:
C:\Program Files (x86)\CheckPoint\SmartConsole\R80.30\PROGRAM> mgmt_cli -m 3.80.173.165 -u aa -p aaaa login > \temp\sid.txt
This logs in with the username aa, password aaaa, and writes the session information to \temp\sid.txt so it can be used later.
Then you can issue the command to show gateways-and-servers:
C:\Program Files (x86)\CheckPoint\SmartConsole\R80.30\PROGRAM> mgmt_cli -m 3.80.173.65 -s \temp\sid.txt show gateways-and-servers
- uid: "453ea708-cb36-4ca1-8c51-831e86c7a5d3"
name: "BranchOffice"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "7f994e69-f997-47bd-9f80-621cf622941e"
name: "Corporate-GW"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "a9f2d9bd-35e4-4571-bebb-4aeec04730df"
name: "EuropeBranchGw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "b69b4a9c-1386-4bb1-8057-926551cfcdad"
name: "HQgw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "e1fdc743-e9c8-df44-95bd-b842bcbac362"
name: "mgmt"
type: "CpmiHostCkp"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "71ec8bfb-5924-4672-a207-0682e46285ad"
name: "Remote-1-gw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "95201290-08b3-405f-a4ae-0785f76e8e4b"
name: "Remote-2-gw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "2c68301f-e1f9-4ce4-af46-8f4ded4a9fd2"
name: "Remote-3-gw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "167c76ab-12d2-4e34-834a-00ea056289d3"
name: "Remote-4-gw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "004b689b-797a-4212-b21c-8df4c8b992e3"
name: "Remote-5-gw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "f6bb4929-a831-406a-93da-af6f95525437"
name: "RemoteBranchGw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "37b07654-bc93-469a-9991-27a3b757e9aa"
name: "ThreatEmulationDevice"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
from: 1
to: 12
total: 12
Since you're not making any changes here, no publish is required.
Logout to release the session:
C:\Program Files (x86)\CheckPoint\SmartConsole\R80.30\PROGRAM> mgmt_cli -m 3.80.173.65 -s \temp\sid.txt logout
show-gateways-and-servers API command should help.
How do I run this from the SmartConsole server?
I am presented with a Username prompt when I attempt to run the following command on the management server.
[Expert@cpman:0]# mgmt_cli show gateways-and-servers
Username:
Why am I receiving this prompt, and what credentials should I use?
I tried entering the admin credentials but received the following error.
[Expert@cpman:0]# mgmt_cli show gateways-and-servers
Username: admin
Password:
message: "Command execution failed. Response body is empty"
code: "generic_error"
You have to work with mgmt_cli exactly the same way as if you were coding against the API.
This means:
If you're on the management server itself, you can use -r true to bypass doing all of the above, but the above happens "under the covers."
When running from a Windows machine, you're obviously not on the management server, so you have to do the entire flow.
For your specific example, this means something like:
C:\Program Files (x86)\CheckPoint\SmartConsole\R80.30\PROGRAM> mgmt_cli -m 3.80.173.165 -u aa -p aaaa login > \temp\sid.txt
This logs in with the username aa, password aaaa, and writes the session information to \temp\sid.txt so it can be used later.
Then you can issue the command to show gateways-and-servers:
C:\Program Files (x86)\CheckPoint\SmartConsole\R80.30\PROGRAM> mgmt_cli -m 3.80.173.65 -s \temp\sid.txt show gateways-and-servers
- uid: "453ea708-cb36-4ca1-8c51-831e86c7a5d3"
name: "BranchOffice"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "7f994e69-f997-47bd-9f80-621cf622941e"
name: "Corporate-GW"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "a9f2d9bd-35e4-4571-bebb-4aeec04730df"
name: "EuropeBranchGw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "b69b4a9c-1386-4bb1-8057-926551cfcdad"
name: "HQgw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "e1fdc743-e9c8-df44-95bd-b842bcbac362"
name: "mgmt"
type: "CpmiHostCkp"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "71ec8bfb-5924-4672-a207-0682e46285ad"
name: "Remote-1-gw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "95201290-08b3-405f-a4ae-0785f76e8e4b"
name: "Remote-2-gw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "2c68301f-e1f9-4ce4-af46-8f4ded4a9fd2"
name: "Remote-3-gw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "167c76ab-12d2-4e34-834a-00ea056289d3"
name: "Remote-4-gw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "004b689b-797a-4212-b21c-8df4c8b992e3"
name: "Remote-5-gw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "f6bb4929-a831-406a-93da-af6f95525437"
name: "RemoteBranchGw"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
- uid: "37b07654-bc93-469a-9991-27a3b757e9aa"
name: "ThreatEmulationDevice"
type: "simple-gateway"
domain:
uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"
name: "SMC User"
domain-type: "domain"
from: 1
to: 12
total: 12
Since you're not making any changes here, no publish is required.
Logout to release the session:
C:\Program Files (x86)\CheckPoint\SmartConsole\R80.30\PROGRAM> mgmt_cli -m 3.80.173.65 -s \temp\sid.txt logout
This was asked before here and I put small script together ![]()
https://community.checkpoint.com/thread/7023-security-gateway-inventory
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 3 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY