- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Hi, having an issue with people who are connected using endpoint clients with full office mode ip addresses, when people are working away on the VPN it disconnects the RDP session or whatever application is open, the VPN client for the most part seems to stay connected and the connectivity will recover after a minute or two.
I've ran script below on the management server and i can see 225 VPN licenses but there is now around 250 connecting at peak hours, it doesn't happen at non peak hours. CPU and memory is fine.
Is there anything logged to Smartconsole when you exceed your licencing for VPN. How can i prove this is or is not a licensing issue, my understanding was if you exceed the licensing limit your VPN client will not connect at all.
Have a TAC case open but just looking for other peoples opinions and experience with this?
Thanks
printf '%.s-' {1..78};echo;echo 'Remote Access VPN License Summary';printf '%.s-' {1..78};echo;echo -n 'Secure Client licenses on SMS (CPVP-VSC-5-NGX-XXX) : '; cplic print |grep never | grep -o -E 'CPVP-VSC-5-NGX\+.*' |sed 's/CPVP-VSC-5-NGX+//g' |awk '{ total = total + $1 } END { print total }';echo -n 'Secure Client licenses on SMS (CPVP-VSC-XXX-NGX) : '; cplic print |grep never |grep -v 'CPVP-VSC-5-NGX\+' |grep -o -E 'CPVP-VSC-.*NGX' | sed 's/CPVP-VSC-//g' | sed 's/-NGX//g' | awk '{ total = total + $1 } END { print total }'; echo -n 'SNX (not MOB) licenses on SMS (CPVP-SNX-XXX-NGX) : '; cplic print |grep never | grep SNX | sed 's/.*\sCPVP\-SNX\-//' | sed 's/\-NGX.*//' |awk '{ total2 = total2 + $1 } END { print total2 }';echo -n 'Mobile Access Blade licenses on SMS (CPSB-SSLVPN-XXX) : ';cplic print |grep never | grep SSLVPN | sed 's/.*\sCPSB\-SSLVPN\-//' | awk '{ total3 = total3 + $1 } END { print total3 }';printf '%.s-' {1..78};echo;
------------------------------------------------------------------------------
Remote Access VPN License Summary
------------------------------------------------------------------------------
Secure Client licenses on SMS (CPVP-VSC-5-NGX-XXX) : 200
Secure Client licenses on SMS (CPVP-VSC-XXX-NGX) : 25
SNX (not MOB) licenses on SMS (CPVP-SNX-XXX-NGX) :
Mobile Access Blade licenses on SMS (CPSB-SSLVPN-XXX) : 5
------------------------------------------------------------------------------
The oneliner ( One-liner for Remote Access VPN License Summary) you copied is from me. It is the previous version of a more comprehensive script. Here you can find the newer version, which also shows the current numbers of connections from the gateway:
R80.x - Mobile User License Tool - replaced "dtps lic"
If you want to see all licenses of the Endpoint Security VPN Client old Secure Client, you must add up the following licenses:
CPVP-VSC-5-NGX-xxx
CPVP-VSC-xxx-NGX
"fw tab -t userc_users -s" shows you the used licenses on the gateway.
Regards
Heiko
The quickest and easiest way to confirm if it is a license limit issue is to apply a 30-day eval license and see if the behavior goes away. Your Check Point reseller/partner should be able to get you an unlimited 30-day eval license. In my experience when license limits are exceeded it will usually be logged somewhere, but often in some obscure log file somewhere on the gateway.
Thanks good idea, pity there is no easy to access log on this one. The 30 day eval gives you unlimited VPN users? Have access to Usercenter so can do that one myself.
Yes unlimited users (or "sufficiently" high like 5000 users for some features), here is what an "All-in-One" 30-day eval has in it:
Cheers I will try that Monday, have your book by the way, it's essential if your working with Checkpoint.
Thanks, when you say log files do you mean in smartlog or where will I see them?
That's great I'll check both places, cheers for the help on this.
which license should be fixed for this issue (Office Mode and not having enough Office Mode IPs)?
There are three types of licensing that impact the number of Office Mode IPs:
Note this is in terms of current SKUs, legacy SKUs also impact this.
By default, your gateway include a license for 5 concurrent Remote Access users (CPSB-SSLVPN-5 in the license string).
The fact the gateway is allowing 15 concurrent users might be considered a bug.
In any case, you will need to purchase an additional license to support more concurrent users.
For Office Mode support, you need one of three things:
Please contact your Check Point partner for more information.
The oneliner ( One-liner for Remote Access VPN License Summary) you copied is from me. It is the previous version of a more comprehensive script. Here you can find the newer version, which also shows the current numbers of connections from the gateway:
R80.x - Mobile User License Tool - replaced "dtps lic"
If you want to see all licenses of the Endpoint Security VPN Client old Secure Client, you must add up the following licenses:
CPVP-VSC-5-NGX-xxx
CPVP-VSC-xxx-NGX
"fw tab -t userc_users -s" shows you the used licenses on the gateway.
Regards
Heiko
Thanks for that, that gives them 225 but there was 260 connected the other day.
People were getting disconnected at times but were not getting denied an IP from office mode.
I will check again on Monday with your script, thanks.
The table "userc_users" can be different from "om_assigned_ips". Therefore there may be more entries.
It is also possible that you have an unlimited license.
Wouldn't even the one script bring back that info if there was an unlimited lic?
Sorry what do mean by tables, is this in script or is it somewhere else I can look?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
4 | |
3 | |
2 | |
2 | |
2 | |
1 | |
1 | |
1 | |
1 | |
1 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewWed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewWed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY