- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi,
I'm looking for a command to identify if a SFP+ adapter has been inserted and if, which one.
E.g. 5xxx / 15xxx series appliance.
The "show asset all" does not really help
Number of line cards: 1
Line card 1 type: 2 ports 10GbE SFP+ Rev 2.0
Something like this (guess the vendor) would be great
"show interface ethernet 1/1 transceiver"
dmesg command does not really help either.
any ideas?
Regards,
well, 6 years later, but found this posting right before finding the solution, and thought I'd update.
Appears to be new in R81.20.
show interface <Name of Interface> xcvr
show interface <Name of Interface> xcvr_detail
show interfaces xcvr
and:
show interfaces xcvr_detail
@S_E_ wrote:
But on devices with R81.10, it seems to be impossible to identify if it is a CPAC-TR-10SR or CPAC-TR-10LR
As mentioned already in this thread it's possible with
ethtool -m <interface>
Maybe sk68780 How to check which driver should be loaded for installed NIC and if that driver will support the installed NIC will help ?
hi,
not really. I see a lot of 'should' in the SK.
Somehow, it looks nearyl impossible to identify if
- a CheckPoint SFP+ adapter has been inserted or a noname Transceiver
- if a LR or SR has been inserted
- if anything is inserted.
Thanks
Cheers,
The system will not allow installation of a non-Check Point transceiver.
That said, I don't believe the system is able to show further information.
Hi all,
anyhow you can check status of SFP+ module inserted into the machine with ethtool:
[Expert@gw-596d14:0]# ethtool -m eth2
Identifier : 0x03 (SFP)
Extended identifier : 0x04 (GBIC/SFP defined by 2-wire interface ID)
Connector : 0x07 (LC)
Transceiver codes : 0x10 0x00 0x00 0x01 0x00 0x00 0x00 0x00
Transceiver type : 10G Ethernet: 10G Base-SR
Transceiver type : Ethernet: 1000BASE-SX
and much more.
Also asi Daemon wrote, only CP SPF modulea are supported..
Tomas
Hi!
Is there az other way to see this?
There is no -m switch for ethtool command in Expert mode, for my 5100 model
Thank you
Vladimir
@binelipetrov wrote:There is no -m switch for ethtool command in Expert mode, for my 5100 model
Same here. Looks like it just available in R80.30.
@Daniel_ wrote:
@binelipetrov wrote:There is no -m switch for ethtool command in Expert mode, for my 5100 model
Same here. Looks like it just available in R80.30.
Also not available in R80.30 (take136) 🤔
Gaia 3.10 is required to use the -m option for ethtool, the Check Point code level is not directly relevant.
Hi,
This command dont work for R80.10. Another way for know it? My apliances are 15600
Regards,
Julian
Was there a resolution found for this by the way I am on 80.20 and cant use the -m switch for ethtool either.
you have to have 3.10 kernel and new gaia.
OK, and there is no other way to determine the transceiver type besides physical inspection for any of the OS mentioned in this thread then I guess?
You can try mii-diag as mentioned in this thread:
Is there any way to check fiber interface status?
I suppose you could try bringing over the ethtool binary from a Gaia 3.10 system and running it on a Gaia 2.6.18 system with the -m option, but that is not likely to work and is most definitely not supported.
It seems that i have similiar problem.
I'm using Checkpoint appliance 5100 and Checkpoint SFP+ adapter.
Checkpoint verion is R80.40 and Gaia kernel version 3.10.0-957.21.3cpx86_64.
I've run the command:
ethtool -m eth1-01
and getting:
Cannot get module EEPROM information: Operation not supported
It's very strange that it's so difficult on a Checkpoint appliance to see what SFP is inserted. It's a standard information which is avaiable on other vendors appliances, routers or switches.
Do any of you have any other ideas?
All hints are appreciated.
Are you sure you have the right interface (eth1-01)? That is the error that ethtool -m will return if you target a non-fiber/non-SFP interface.
If it is the right interface, what driver name and version does ethtool -i eth1-01 show? It is possible the underlying NIC driver simply does not support that operation, or ethtool itself does not know where to find that info for that particular driver.
If it is the latter cause, you can try manually reading the various files under /sys/class/net/eth1-01, one of them might contain the SFP information you seek.
This is the right interface.
driver: igb
version: 5.3.5.18
I can see a lot of files under /sys/class/net/eth1-01 but they are empty.
😞
well, 6 years later, but found this posting right before finding the solution, and thought I'd update.
Appears to be new in R81.20.
show interface <Name of Interface> xcvr
show interface <Name of Interface> xcvr_detail
show interfaces xcvr
and:
show interfaces xcvr_detail
Hi
these are good news for R81.20
fw02> show interface eth1-01 xcvr_detail
eth1-01 SFP is present
Product Type: 10G Base-SR
Vendor name: PROLABS
Vendor PN: SFP-1/10GB-SR-CP
Vendor rev: A2
Check Point part number: CPAC-TR-10SR-C
But on devices with R81.10, it seems to be impossible to identify if it is a CPAC-TR-10SR or CPAC-TR-10LR
Regards,
@S_E_ wrote:
But on devices with R81.10, it seems to be impossible to identify if it is a CPAC-TR-10SR or CPAC-TR-10LR
As mentioned already in this thread it's possible with
ethtool -m <interface>
ah, you're right, Product type is visible
fw-02# ethtool -m eth1-01 | grep SR
Transceiver type : 10G Ethernet: 10G Base-SR
Thanks
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
10 | |
6 | |
6 | |
6 | |
6 | |
6 | |
4 | |
3 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY