- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hello,
I want to know, who is connected via VPN to my 1800 gateway (R80.20.35) centrally managed from Smart-1 Cloud
I have tried to get it from:
well... the 1800 has 500 VPN licenses included, but no reporting functionality?
fw tab -t userc_users -f -u
Btw, i do not understand why this parameter is there, if this is not usable. Benefit from working param is huge, nobody will read raw hex format of tables
The syntax is for regular Gaia
Val, I'm aware about this.. but as you can see, running same command on smb causes illegal error. Which means this parameter should never be visible on smb code or it should return correct formated output. I will take it and manage it with code owners.
Yes, reaching out to SMB developers is the best way to get rid of this cosmetic issue, please do so.
Hi all,
according to my discussion parameter -f was corrected(added) into the latest jumbo and will be delivered in near future to next GA.
Tomas
Open a SR# with TAC to find a solution, that is the most promising advice...
thank you for advice. I'll do.
This should show what you are looking for:
vpn tu tlist
yeah. that's good start.
gw1> vpn tu tlist | grep -A1 -B4 User:
^
Bad parameter starting at '| grep -A1 -B4 User:'
whatewer vpn tu tlist give first readable output. I completly forgot about tlist switch and it was not mentioned in command help. Even the I enabled statistic, nothing readable is written.
gw1> vpn tu -t tlist
+-----------------------------------------+-----------------------+---------------------+
| Peer: 172.160.11.4 (89bf1149ce499691) | MSA: ffff00040becb538 | i: 3 ref: 1 |
| Methods: ESP Tunnel 3DES SHA1 | | i: 4 ref: 4 |
| My TS: 0.0.0.0/0 | | |
| Peer TS: 172.160.11.4 | | |
| User: CN=....user1.....,OU=users,O=gw-..| NAT-T | |
| MSPI: 2000064 (i: 4, p: 0) | Out SPI: d3807e48 | |
+-----------------------------------------+-----------------------+---------------------+
gw1> vpn tu tlist -t
Usage:
vpn tu tlist [VOLUME_STATISTICS_OPTION] [OPTION]...
List information about existing VPN tunnels
Example: vpn tu tlist -v -t -br (or -vtbr)
VOLUME_STATISTICS_OPTIONs:
clear clear Tunnel List volume statistics
start turn on Tunnel List volume statistics
stop turn off Tunnel List volume statistics
state show Tunnel List volume statistics state
OPTIONs (mandatory arguments to long options are mandatory for short options too):
-b sort by total (encrypted+decrypted) bytes
-d sort by inbound (decrypted) bytes
-e sort by outbound (encrypted) bytes
-h display this help and exit
-i combine list rows per instance with accumulated traffic. Default order is descending by total bytes
-m sort by MSPI
-n sort by peer name
-p IP list tunnels only for peer with IP
-r reverse order while sorting
-s sort by SPI
-t combine list rows per peer with accumulated traffic. Default order is descending by total bytes
-v print a message for each provided OPTION after this one
-a off/on print only accelerated tunnels or only non-accelerated tunnels
ok, well the statistics are displayed after a while.
GW1> vpn tu list tunnels
+-----------------------------------------+-----------------------+---------------------+
| Peer: 172.160.11.5 (d764901471566341) | MSA: ffff00040becb438 | i: 0 ref: -- 15/60 |
| Methods: ESP Tunnel 3DES SHA1 | | i: 1 ref: -- 23/60 |
| My TS: 0.0.0.0/0 | 😧 233.57 KB -100.00% | i: 2 ref: -- 16/60 |
| Peer TS: 172.160.11.5 | E: 894.27 KB -100.00% | i: 3 ref: -- 16/60 |
| User: CN=....user1.....,OU=users,O=gw-..| NAT-T | i: 4 ref: -- 15/60 |
| MSPI: 40000d2 (i: 8, p: 0) | Out SPI: 8748db45 | i: 5 ref: -- 13/60 |
| | | i: 6 ref: -- 15/60 |
| | | i: 7 ref: -- 30/60 |
| | | i: 8 ref: 31 |
| | | i: 9 ref: -- 16/60 |
+-----------------------------------------+-----------------------+---------------------+
I'm glad I could be of help.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY