- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
Hello,
I want to know, who is connected via VPN to my 1800 gateway (R80.20.35) centrally managed from Smart-1 Cloud
I have tried to get it from:
well... the 1800 has 500 VPN licenses included, but no reporting functionality?
fw tab -t userc_users -f -u
Btw, i do not understand why this parameter is there, if this is not usable. Benefit from working param is huge, nobody will read raw hex format of tables
The syntax is for regular Gaia
Val, I'm aware about this.. but as you can see, running same command on smb causes illegal error. Which means this parameter should never be visible on smb code or it should return correct formated output. I will take it and manage it with code owners.
Yes, reaching out to SMB developers is the best way to get rid of this cosmetic issue, please do so.
Hi all,
according to my discussion parameter -f was corrected(added) into the latest jumbo and will be delivered in near future to next GA.
Tomas
Open a SR# with TAC to find a solution, that is the most promising advice...
thank you for advice. I'll do.
This should show what you are looking for:
vpn tu tlist
yeah. that's good start.
gw1> vpn tu tlist | grep -A1 -B4 User:
^
Bad parameter starting at '| grep -A1 -B4 User:'
whatewer vpn tu tlist give first readable output. I completly forgot about tlist switch and it was not mentioned in command help. Even the I enabled statistic, nothing readable is written.
gw1> vpn tu -t tlist
+-----------------------------------------+-----------------------+---------------------+
| Peer: 172.160.11.4 (89bf1149ce499691) | MSA: ffff00040becb538 | i: 3 ref: 1 |
| Methods: ESP Tunnel 3DES SHA1 | | i: 4 ref: 4 |
| My TS: 0.0.0.0/0 | | |
| Peer TS: 172.160.11.4 | | |
| User: CN=....user1.....,OU=users,O=gw-..| NAT-T | |
| MSPI: 2000064 (i: 4, p: 0) | Out SPI: d3807e48 | |
+-----------------------------------------+-----------------------+---------------------+
gw1> vpn tu tlist -t
Usage:
vpn tu tlist [VOLUME_STATISTICS_OPTION] [OPTION]...
List information about existing VPN tunnels
Example: vpn tu tlist -v -t -br (or -vtbr)
VOLUME_STATISTICS_OPTIONs:
clear clear Tunnel List volume statistics
start turn on Tunnel List volume statistics
stop turn off Tunnel List volume statistics
state show Tunnel List volume statistics state
OPTIONs (mandatory arguments to long options are mandatory for short options too):
-b sort by total (encrypted+decrypted) bytes
-d sort by inbound (decrypted) bytes
-e sort by outbound (encrypted) bytes
-h display this help and exit
-i combine list rows per instance with accumulated traffic. Default order is descending by total bytes
-m sort by MSPI
-n sort by peer name
-p IP list tunnels only for peer with IP
-r reverse order while sorting
-s sort by SPI
-t combine list rows per peer with accumulated traffic. Default order is descending by total bytes
-v print a message for each provided OPTION after this one
-a off/on print only accelerated tunnels or only non-accelerated tunnels
ok, well the statistics are displayed after a while.
GW1> vpn tu list tunnels
+-----------------------------------------+-----------------------+---------------------+
| Peer: 172.160.11.5 (d764901471566341) | MSA: ffff00040becb438 | i: 0 ref: -- 15/60 |
| Methods: ESP Tunnel 3DES SHA1 | | i: 1 ref: -- 23/60 |
| My TS: 0.0.0.0/0 | 😧 233.57 KB -100.00% | i: 2 ref: -- 16/60 |
| Peer TS: 172.160.11.5 | E: 894.27 KB -100.00% | i: 3 ref: -- 16/60 |
| User: CN=....user1.....,OU=users,O=gw-..| NAT-T | i: 4 ref: -- 15/60 |
| MSPI: 40000d2 (i: 8, p: 0) | Out SPI: 8748db45 | i: 5 ref: -- 13/60 |
| | | i: 6 ref: -- 15/60 |
| | | i: 7 ref: -- 30/60 |
| | | i: 8 ref: 31 |
| | | i: 9 ref: -- 16/60 |
+-----------------------------------------+-----------------------+---------------------+
I'm glad I could be of help.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 7 | |
| 4 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 |
Tue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY