- Products
- Learn
- Local User Groups
- Partners
- More
Secure Your AI Transformation
9 April @ 12pm SGT / 3pm CET / 2PM EDT
Check Point WAF TechTalk:
Introduction and New Features
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
CheckMates Go:
CheckMates Fest
Hi folks,
I try to monitor the current bandwith (MBit/s) for on specific interface via SNMP.. does anybody know the OID which I can use for that...
.1.3.6.1.4.1.2620.1.1.25.5.1.Interfacenumber
shows me something about the interface - but which exact IOD have I to you to get the MBit/s value?
Thx
robert
Yes - but... the values are "Accepted bytes throughput" and I think for all interfaces... and on the next page - Bytes since last reboot.. both are not really useful.. what I need is the value which I can find in the cpview
Network->Interfaces-Traffic "Mbps" value..
Br
Oh I see, I also can't find the corresponding OIDf that matches the Mbps column in CPView.
I'm pretty sure CPView came down the Mbps values using the PPS (packets per second) and Mbits values.
But (and here's the catch) the PPS value depends on how the gateway is configured for packet inspection (maybe if it's an appliance involved you can check out DPI throughput in the specs sheets and get to a sloppy approximation).
Roughly we can say, as an example:
For 2000 PPS and using the default MTU size (1500 bytes), is 3000000 Bytes/sec (2000*1500*8), which is equivalent to 24000000 bits/sec (24 Mbps).
But I believe we've another catch here: the packet size I used (the default MTU size), and as it depends to the inspection done by the gateway, in real life scenario it should be never close to 1500 bytes.
Maybe some CP guy here involved in CPView development could tell us how the Mbps calculation is done.
Correct - but the point is, that I can't tell the monitoring tool to start calculations.. I think it should be possible to get the values of the cpview tool..
Hi All,
I also need answer to Robert_Mueller question - how can i get the cpview network bits\second using SNMP ?
the PDF is 4 years old...
Thanks in advance
Aner Sagi
Hi Aner,
Thanks for pointing at outdated document, we'll work on improving it.
CPview exports some parameters to SNMP, it's object ID is 1.3.6.1.4.1.2620.1.56
More specifically, CPview table Network -> Interface -> Traffic is exported as two tables umHardwareTxStatisticsTable and umHardwareErrorStatisticsTable. Their object IDs are 1.3.6.1.4.1.2620.1.56.105.6 and 1.3.6.1.4.1.2620.1.56.105.7 respectivelly. Bit throuput is 1.3.6.1.4.1.2620.1.56.105.6.1.9 for TX and 1.3.6.1.4.1.2620.1.56.105.7.1.9 for RX
If you want to explore other data exported via SNMP, you can find cpview.mib at $CPDIR/lib/snmp/cpview.mib
Hope it helps. Let me know if you have other questions.
Regards,
Kostya
Nowadays (jan/2023 - 81.10), they are:
1.3.6.1.4.1.2620.1.56.105.5.1.9 => Mbps (RX)
1.3.6.1.4.1.2620.1.56.105.6.1.9 => Mbps (TX)
In case anyone else stumbles upon this:
The OIDs above are still correct as of today (You have to do a snmpwalk to get all possible values).
1.3.6.1.4.1.2620.1.56.105.6.1.2 will give you all the interfaces available for TX traffic, eg.
iso.3.6.1.4.1.2620.1.56.105.6.1.2.2.0 = STRING: "eth2"
iso.3.6.1.4.1.2620.1.56.105.6.1.2.3.0 = STRING: "eth4
....
iso.3.6.1.4.1.2620.1.56.105.6.1.2.48.0 = STRING: "bond0.123"
iso.3.6.1.4.1.2620.1.56.105.6.1.2.49.0 = STRING: "eth2.345"
iso.3.6.1.4.1.2620.1.56.105.6.1.2.50.0 = STRING: "bond0.113"
....
iso.3.6.1.4.1.2620.1.56.105.6.1.2.59.0 = STRING: "eth0"
iso.3.6.1.4.1.2620.1.56.105.6.1.2.60.0 = STRING: "eth1"
iso.3.6.1.4.1.2620.1.56.105.6.1.2.61.0 = STRING: "TOTAL"
Those numbers (last 2 digits) are translated directly to the other OIDs with actual traffic values.
(Meaning 1.3.6.1.4.1.2620.1.56.105.6.1.9.2.0 as an example would be the TX-mbps of eth2)
I'm not really sure how those are numbered, I would assume it is by creation date and they are added at the end in front of TOTAL.
(Although eth0 and eth1 should always have been present, I really have no clue how this works)
I wanted to implement thropughput monitoring for our CP appliances, but unfortunately TOTAL is the last OID for either RX and TX.
What that means is that you can't have a general RX/TX Monitoring for your environment, since the TOTAL value I would need is dynamically adjusted and dependent on the number of interfaces and VLANs on the firewall.
If TOTAL would always be for example the first entry 1.3.6.1.4.1.2620.1.56.105.6.1.2.1.0 or any other "static" value this could work, but if it is always put at the end it is not really usable in this case unfortunately.
Hello Sir,
This is not working for us on our FW. We've open server on HA 81.10.
Can you help me to find the correct id for bit thruput please?
Thanks in advanced!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 67 | |
| 42 | |
| 26 | |
| 14 | |
| 12 | |
| 11 | |
| 11 | |
| 10 | |
| 9 | |
| 8 |
Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY