- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hi
How is the best way to read the following counter from a TE appliance with an external script?
Scanned File
Malicious Files Detected
Queue Size
Greetings
Søren Kristensen
Probably you can find what you need with snmp starting from point 23
Hi
Thanks
Is there a mib file for this, they are not in the one I have found.
Greetings
Søren
you should be able to add a custom snmp sensor with the reported oid this will work for sure , for mib file you can look at realtive sk
Hi Thomas
I have been testing the OID's, and they do not return the values as the CLI commands.
the CLI values are changing, the OID values do not change.
Hi Soren,
are the values 0 or do they not match ?
Regards Thomas
Hi
I get something like this
[Expert@TE-box:0]# cpstat threat-emulation -f scanned_files
TE Scanned Files: 2416
TE Scanned Files Last Day: 1824
TE Scanned Files Last Week: 11526
TE Scanned Files Last Month: 60923
[Expert@TE-box:0]# snmpwalk -v 2c -c Public localhost .1.3.6.1.4.1.2620.1.49.4
SNMPv2-SMI::enterprises.2620.1.49.4.1.0 = Gauge32: 2309
SNMPv2-SMI::enterprises.2620.1.49.4.2.0 = Gauge32: 1388
SNMPv2-SMI::enterprises.2620.1.49.4.3.0 = Gauge32: 11818
SNMPv2-SMI::enterprises.2620.1.49.4.4.0 = Gauge32: 61755
Slight mismatch 🙂
Please open a TAC ticket if you want to get a reason for it ... I am not sure if SNMP values are counters directly from "tecli s s"
Regards Thomas
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY