<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://www.cpwiki.net/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://www.cpwiki.net/index.php?feed=atom&amp;namespace=0&amp;title=Special%3ANewPages</id>
		<title>cpwiki.net - New pages [en]</title>
		<link rel="self" type="application/atom+xml" href="http://www.cpwiki.net/index.php?feed=atom&amp;namespace=0&amp;title=Special%3ANewPages"/>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/Special:NewPages"/>
		<updated>2026-04-29T16:06:04Z</updated>
		<subtitle>From cpwiki.net</subtitle>
		<generator>MediaWiki 1.21.10</generator>

	<entry>
		<id>http://www.cpwiki.net/index.php/First_time_config_%22wizard%22_via_CLI_mode</id>
		<title>First time config &quot;wizard&quot; via CLI mode</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/First_time_config_%22wizard%22_via_CLI_mode"/>
				<updated>2025-10-24T14:26:10Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;  == Creating a configuration file ==  # '''config_system -t &amp;lt;File Name&amp;gt;'''  === configuration file validation ===  # config_system --config-file &amp;lt;File Name&amp;gt; --dry-run  == run...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
== Creating a configuration file ==&lt;br /&gt;
 # '''config_system -t &amp;lt;File Name&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
=== configuration file validation ===&lt;br /&gt;
 # config_system --config-file &amp;lt;File Name&amp;gt; --dry-run&lt;br /&gt;
&lt;br /&gt;
== running config with template file ==&lt;br /&gt;
 # config_system -f &amp;lt;File Name&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/fortinet_create_api_user_via_CLI</id>
		<title>fortinet create api user via CLI</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/fortinet_create_api_user_via_CLI"/>
				<updated>2025-04-28T17:20:15Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;   To create a REST API administrator in the CLI:    config system api-user     edit &amp;quot;api-admin&amp;quot;         set comments &amp;lt;string&amp;gt;         set api-key ************         set acc...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To create a REST API administrator in the CLI:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 config system api-user&lt;br /&gt;
    edit &amp;quot;api-admin&amp;quot;&lt;br /&gt;
        set comments &amp;lt;string&amp;gt;&lt;br /&gt;
        set api-key ************&lt;br /&gt;
        set accprofile &amp;quot;API profile&amp;quot;&lt;br /&gt;
        set vdom &amp;quot;root&amp;quot;&lt;br /&gt;
        set peer-auth enable&lt;br /&gt;
        set peer-group &amp;lt;group&amp;gt;&lt;br /&gt;
        config trusthost&lt;br /&gt;
            edit 1&lt;br /&gt;
                set ipv4-trusthost &amp;lt;class_ip&amp;amp;net_netmask&amp;gt;&lt;br /&gt;
            next&lt;br /&gt;
            ...&lt;br /&gt;
        end&lt;br /&gt;
    next&lt;br /&gt;
 end&lt;br /&gt;
&lt;br /&gt;
Generate the API token:&lt;br /&gt;
&lt;br /&gt;
 # execute api-user generate-key &amp;lt;API username&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[category:fortinet]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/API_for_logs_manpage</id>
		<title>API for logs manpage</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/API_for_logs_manpage"/>
				<updated>2025-03-26T22:35:54Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==For a new logs query==&lt;br /&gt;
 '''mgmt_cli show-logs new-query.filter product:&amp;lt;product name&amp;gt; new-query.time-frame &amp;lt;time-frame&amp;gt; new-query.max-logs-per-request &amp;lt;limit&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
filter - The filter as entered in SmartConsole/SmartView. Type: String&lt;br /&gt;
&lt;br /&gt;
time-frame - Specify the time frame to query logs. Type: String&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;Valid values: last-7-days last-hour today last-24-hours yesterday this-week this-month last-30-days all-time custom Default: last-7-days&lt;br /&gt;
&lt;br /&gt;
custom-start - Must be in ISO861 format. Type: String&lt;br /&gt;
&lt;br /&gt;
custom-end - Must be in ISO861 format. Type: String&lt;br /&gt;
&lt;br /&gt;
max-logs-per-request - Valid values: 1-100 Default: 10 Type: String&lt;br /&gt;
&lt;br /&gt;
type - Type of logs to return. Valid values: logs, audit. Default: logs&lt;br /&gt;
&lt;br /&gt;
log-servers - List of IPs of log servers to query. Default: all&lt;br /&gt;
&lt;br /&gt;
==To get results for top statistics==&lt;br /&gt;
 '''mgmt_cli show-logs new-query.filter product:&amp;lt;product name&amp;gt; new-query.top.field blades new-query.top.count &amp;lt;number&amp;gt; --format json -r true'''&lt;br /&gt;
&lt;br /&gt;
count - Valid values: 1-50&lt;br /&gt;
&lt;br /&gt;
field - Valid values: sources destinations services actions blades origins users applications&lt;br /&gt;
&lt;br /&gt;
==To get more results for an existing query==&lt;br /&gt;
 '''mgmt_cli show-logs query-id &amp;lt;query-id&amp;gt; --session-id &amp;lt;session-id&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
query-id - Get the next page of the last run query with a specified limit.&lt;br /&gt;
&lt;br /&gt;
ignore-warnings - Ignore warnings if they exist. Type: Boolean&lt;br /&gt;
&lt;br /&gt;
==Limitations==&lt;br /&gt;
The parameter &amp;quot;time-frame&amp;quot; in the API command does not accept this format as input:&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp; yyyymmddThhmmssZ&lt;br /&gt;
&lt;br /&gt;
The command does not support non-index mode log queries.&lt;br /&gt;
&lt;br /&gt;
[[category:api]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/big-ip_notes</id>
		<title>big-ip notes</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/big-ip_notes"/>
				<updated>2024-10-04T19:06:57Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
get pool membership by node IP via CLI&lt;br /&gt;
 #  '''tmsh -q -c &amp;quot;cd /; list ltm pool one-line recursive&amp;quot; | grep &amp;lt;ip address&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
==links==&lt;br /&gt;
&lt;br /&gt;
[https://community.f5.com/kb/codeshare/big-ip-upgrade-procedure-using-cli-vcmp-guest--host/280685 BIG-IP Upgrade Procedure Using CLI (vCMP Guest &amp;amp; Host)]&lt;br /&gt;
&lt;br /&gt;
[https://networkproguide.com/f5-big-ip-cli-commands-cheat-sheet/ Big-ip cheat sheet]&lt;br /&gt;
[[category:f5]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/vsx_notes</id>
		<title>vsx notes</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/vsx_notes"/>
				<updated>2024-07-03T03:50:29Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==performance optimization==&lt;br /&gt;
concurrent connections sizing - automatic setting not available for VSX. this must be hard coded and monitored.&lt;br /&gt;
==troubleshooting==&lt;br /&gt;
&lt;br /&gt;
show status&lt;br /&gt;
 [Expert@MyVsxGW:2]# '''vsx stat -v'''&lt;br /&gt;
 VSX Gateway Status&lt;br /&gt;
 ==================&lt;br /&gt;
 Name:&lt;br /&gt;
  VSX1_192.168.3.241&lt;br /&gt;
 Access Control Policy: VSX_Cluster_VSX&lt;br /&gt;
 Installed at:&lt;br /&gt;
  20Sep2019 22:06:33&lt;br /&gt;
 Threat Prevention Policy: &amp;lt;No Policy&amp;gt;&lt;br /&gt;
 SIC Status:&lt;br /&gt;
  Trust&lt;br /&gt;
 Number of Virtual Systems allowed by license:&lt;br /&gt;
  25&lt;br /&gt;
 Virtual Systems [active / configured]:&lt;br /&gt;
  2 / 2&lt;br /&gt;
 Virtual Routers and Switches [active / configured]:&lt;br /&gt;
  0 / 0&lt;br /&gt;
 Total connections [current / limit]:&lt;br /&gt;
  5 / 44700&lt;br /&gt;
 Virtual Devices Status&lt;br /&gt;
 ======================&lt;br /&gt;
 ID   | Type &amp;amp; Name | Access Control Policy | Installed at    | Threat Prevention Policy | SIC Stat&lt;br /&gt;
 -----+-------------+-----------------------+-----------------+--------------------------+---------&lt;br /&gt;
 1    | S VS1       | VS_Policy             | 20Sep2019 22:07 | &amp;lt;No Policy&amp;gt;              | Trust&lt;br /&gt;
 2    | S VS2       | VS_Policy             | 20Sep2019 22:07 | &amp;lt;No Policy&amp;gt;              | Trust&lt;br /&gt;
&lt;br /&gt;
set the context to the appropriate Virtual System with &amp;quot;vsenv &amp;lt;ID|name&amp;gt;&lt;br /&gt;
 # '''vsenv 2'''&lt;br /&gt;
&lt;br /&gt;
get interfaces&lt;br /&gt;
 # '''fw getifs'''&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/fortinet_downloads</id>
		<title>fortinet downloads</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/fortinet_downloads"/>
				<updated>2024-06-20T21:18:53Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;https://support.fortinet.com/Download/FirmwareImages.aspx&lt;br /&gt;
&lt;br /&gt;
[[category: fortinet]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/fortimanager_VM_notes</id>
		<title>fortimanager VM notes</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/fortimanager_VM_notes"/>
				<updated>2024-06-20T18:05:10Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;==version 6.4== this version was used because higher versions were failing on the trial license for me. ==console login== default login = admin / (empty password)  ==initial c...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==version 6.4==&lt;br /&gt;
this version was used because higher versions were failing on the trial license for me.&lt;br /&gt;
==console login==&lt;br /&gt;
default login = admin / (empty password)&lt;br /&gt;
&lt;br /&gt;
==initial config==&lt;br /&gt;
&lt;br /&gt;
 config system interface&lt;br /&gt;
 edit port1&lt;br /&gt;
 set mode static&lt;br /&gt;
 set ip 10.1.1.100 255.255.255.0&lt;br /&gt;
 next&lt;br /&gt;
 end&lt;br /&gt;
 config system route&lt;br /&gt;
 edit 1&lt;br /&gt;
 set device port1&lt;br /&gt;
 set gateway 10.1.1.1&lt;br /&gt;
 next&lt;br /&gt;
 end&lt;br /&gt;
&lt;br /&gt;
==license==&lt;br /&gt;
&lt;br /&gt;
connect a browser via https to the IP above. You get a message about signing into forticloud for the trial license. Login and proceed and hope for a message of success. I forgot to screenshot it.&lt;br /&gt;
&lt;br /&gt;
view VM license via CLI.&lt;br /&gt;
&lt;br /&gt;
 FMG-VM64-KVM # '''diag debug vminfo'''&lt;br /&gt;
 VM license is valid.&lt;br /&gt;
 Type: Trial&lt;br /&gt;
 Max devices: 3&lt;br /&gt;
 Management IP: 0.0.0.0&lt;br /&gt;
 VM UUID: 2da3fe28-143d-415f-9939-2d8f8c6ce433&lt;br /&gt;
&lt;br /&gt;
no expiration date... yay! too bad it is so old.&lt;br /&gt;
&lt;br /&gt;
[[category:fortinet]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/cisco_asa_notes</id>
		<title>cisco asa notes</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/cisco_asa_notes"/>
				<updated>2024-06-20T03:16:13Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Getting Started==&lt;br /&gt;
===Accessing the Appliance Command-Line Interface===&lt;br /&gt;
&lt;br /&gt;
This following prompt indicates that you are in user EXEC mode. Only basic commands are available from user EXEC mode.&lt;br /&gt;
 hostname&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To access privileged EXEC mode, enter the following command:&lt;br /&gt;
 hostname&amp;gt; '''enable'''&lt;br /&gt;
&lt;br /&gt;
The prompt changes to the following:&lt;br /&gt;
 hostname#&lt;br /&gt;
&lt;br /&gt;
To exit privileged mode, enter the disable, exit, or quit command.&lt;br /&gt;
&lt;br /&gt;
access global configuration mode&lt;br /&gt;
 hostname# '''configure terminal'''&lt;br /&gt;
&lt;br /&gt;
The prompt changes to the following:&lt;br /&gt;
 hostname(config)#&lt;br /&gt;
&lt;br /&gt;
===configure base system===&lt;br /&gt;
&lt;br /&gt;
set firewall mode to transparent or routed? (Optional)&lt;br /&gt;
&lt;br /&gt;
example config... can paste on command line over console&lt;br /&gt;
 ASA Version 9.18.4&lt;br /&gt;
 !&lt;br /&gt;
 console serial&lt;br /&gt;
 interface management0/0&lt;br /&gt;
 nameif management&lt;br /&gt;
 security-level 100&lt;br /&gt;
 ip address 192.168.100.254 255.255.255.0&lt;br /&gt;
 no shutdown&lt;br /&gt;
 interface gigabitethernet0/0&lt;br /&gt;
 nameif inside&lt;br /&gt;
 security-level 100&lt;br /&gt;
 ip address 10.100.0.254 255.255.255.0&lt;br /&gt;
 no shutdown&lt;br /&gt;
 interface gigabitethernet0/1&lt;br /&gt;
 nameif outside&lt;br /&gt;
 security-level 0&lt;br /&gt;
 ip address 172.16.100.254 255.255.255.0&lt;br /&gt;
 no shutdown&lt;br /&gt;
 http server enable&lt;br /&gt;
 http 192.168.100.0 255.255.255.0 management&lt;br /&gt;
 crypto key generate rsa modulus 1024&lt;br /&gt;
 username admin password admin&lt;br /&gt;
 ssh 192.168.100.0 255.255.255.0 management&lt;br /&gt;
 aaa authentication ssh console LOCAL &lt;br /&gt;
&lt;br /&gt;
save config&lt;br /&gt;
 hostname(config)# '''write memory'''&lt;br /&gt;
&lt;br /&gt;
==VM notes==&lt;br /&gt;
&lt;br /&gt;
KVM graphical console stops after...&lt;br /&gt;
 Booting the kernel.&lt;br /&gt;
&lt;br /&gt;
at this point he VM is outputing to the virtual serial console. There are similar experiences on VMware.&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/reboot_logs</id>
		<title>reboot logs</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/reboot_logs"/>
				<updated>2024-01-17T15:30:03Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;reboot log location  /var/log/reboot.log  especially significant for maestro, config reboot reasons...  /var/log/configuration_reboot_reason.log&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;reboot log location&lt;br /&gt;
 /var/log/reboot.log&lt;br /&gt;
&lt;br /&gt;
especially significant for maestro, config reboot reasons...&lt;br /&gt;
 /var/log/configuration_reboot_reason.log&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/opengear_console_notes</id>
		<title>opengear console notes</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/opengear_console_notes"/>
				<updated>2023-12-15T15:17:54Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;to enter portmanager shell, run ''pmshell''&lt;br /&gt;
&lt;br /&gt;
example:&lt;br /&gt;
 $ pmshell&lt;br /&gt;
 1: Router          4: PDU             6: ISR            8: Switch        &lt;br /&gt;
 33: Front, Upper   34: Front, Lower&lt;br /&gt;
 &amp;lt;br&amp;gt;Connect to port &amp;gt;&lt;br /&gt;
&lt;br /&gt;
to connect to a port, just type the number followed by &amp;lt;enter&amp;gt;&lt;br /&gt;
&lt;br /&gt;
escape character:&lt;br /&gt;
&lt;br /&gt;
* By default, the escape character is: ~&lt;br /&gt;
* If you are connected using the OpenSSH command line client, e.g. from Mac or Linux system, you must type a second ~ to trigger the escape, i.e.: ~~&lt;br /&gt;
* An alternate escape character may be set under Serial &amp;amp; Network -&amp;gt; Serial Port -&amp;gt; Edit/Edit Multiple Ports -&amp;gt; Escape Character&lt;br /&gt;
* The escape character must be the first character on a new line&lt;br /&gt;
&lt;br /&gt;
 Shell Commands:&lt;br /&gt;
 ~b - Generate BREAK &lt;br /&gt;
 ~h - View history&lt;br /&gt;
 ~p - Power menu&lt;br /&gt;
 ~c - Port Configuration menu&lt;br /&gt;
 ~u – User sessions disconnect menu &lt;br /&gt;
 ~m - Connect to port menu&lt;br /&gt;
 ~. - Exit pmshell&lt;br /&gt;
 ~? - Show this message&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/cpuse_deployment_agent_logging</id>
		<title>cpuse deployment agent logging</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/cpuse_deployment_agent_logging"/>
				<updated>2023-10-24T02:16:41Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;tail -f /opt/CPInstLog/DeploymentAgent.log&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/asg_policy_-_manpage</id>
		<title>asg policy - manpage</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/asg_policy_-_manpage"/>
				<updated>2023-10-20T21:39:11Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Nighthawk moved page asg policy - manpage to asg policy - command without leaving a redirect&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==asg policy==&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Use the &amp;quot;asg policy&amp;quot; command in GaiaClosed gClish or the Expert mode to perform policy-related actions.&lt;br /&gt;
&lt;br /&gt;
==Syntax==&lt;br /&gt;
&lt;br /&gt;
 asg policy -h&amp;lt;br&amp;gt;&lt;br /&gt;
 asg policy {verify | verify_amw} [-vs &amp;lt;VS IDs&amp;gt;] [-a] [-v]&amp;lt;br&amp;gt;&lt;br /&gt;
 asg policy unload [--disable_pnotes] [-a]&amp;lt;br&amp;gt;&lt;br /&gt;
 asg policy unload --ip_forward&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/maestro_reference</id>
		<title>maestro reference</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/maestro_reference"/>
				<updated>2023-10-20T21:28:26Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==security groups==&lt;br /&gt;
Single Management Object (SMO) handles all management tasks, such as Security Gateway configuration, policy installation, remote connections, and logging. The Active Security Group Member with the lowest ID number is automatically assigned to be the SMO.&lt;br /&gt;
&lt;br /&gt;
identify the SMO and tasks&lt;br /&gt;
 # asg stat -i tasks&lt;br /&gt;
&lt;br /&gt;
===policy installation===&lt;br /&gt;
Management ServerClosed installs the policy on the SMO Master and then it is copied to the other UP members. Use [[asg policy - command|asg policy]] to verify or unload a policy.&lt;br /&gt;
===Synchronizing Policy and Configuration Between Security Group Members===&lt;br /&gt;
&lt;br /&gt;
synchronize the policies manually to a SG member&lt;br /&gt;
 asg_blade_config pull_config&lt;br /&gt;
&lt;br /&gt;
==Managing Security Groups==&lt;br /&gt;
===Connecting to a Specific Security Group Member ===&lt;br /&gt;
 # member &amp;lt;Member ID&amp;gt;&lt;br /&gt;
or&lt;br /&gt;
 # m &amp;lt;Member ID&amp;gt;&lt;br /&gt;
&lt;br /&gt;
connecting to member in specific SG&lt;br /&gt;
# m &amp;lt;Security Group ID&amp;gt; &amp;lt;Member ID&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==HA==&lt;br /&gt;
clusterXL_admin up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==orchestrator==&lt;br /&gt;
&lt;br /&gt;
get port transiever typoe&lt;br /&gt;
 &amp;gt; show maestro port x optic info&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/fortinet_CLI_notes</id>
		<title>fortinet CLI notes</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/fortinet_CLI_notes"/>
				<updated>2021-12-02T16:29:53Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: /* logging */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
==vdom==&lt;br /&gt;
entering editing a vdom&lt;br /&gt;
&lt;br /&gt;
 # config vdom&lt;br /&gt;
 (vdom) #  edit myvdom&lt;br /&gt;
 (myvdom) # &lt;br /&gt;
&lt;br /&gt;
==interface commands==&lt;br /&gt;
===configure===&lt;br /&gt;
example&lt;br /&gt;
 # config system interface&lt;br /&gt;
 # edit port1&lt;br /&gt;
 # set mode static&lt;br /&gt;
 # set ip 10.1.1.1 255.255.255.0&lt;br /&gt;
 # next&lt;br /&gt;
 # end&lt;br /&gt;
&lt;br /&gt;
===get info==&lt;br /&gt;
for admin status, link stat, speeds, counters...&lt;br /&gt;
 # config global&lt;br /&gt;
 # get hardware nic &amp;lt;interface name&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
==routes==&lt;br /&gt;
 # config router static&lt;br /&gt;
 # edit &amp;lt;route_index&amp;gt;&lt;br /&gt;
 # set device &amp;quot;&amp;lt;interface_name&amp;gt;&amp;quot;&lt;br /&gt;
 # set dst &amp;quot;&amp;lt;destination_ip&amp;gt;&amp;quot;&lt;br /&gt;
 # set gateway &amp;quot;&amp;lt;router_ip&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
for default gw..&lt;br /&gt;
 # set dst 0.0.0.0 0.0.0.0&lt;br /&gt;
or just leave the line out.&lt;br /&gt;
&lt;br /&gt;
HA status&lt;br /&gt;
 # config global&lt;br /&gt;
 # get sys ha status&lt;br /&gt;
&lt;br /&gt;
HA failover to highest priority (if it is not currently Master)&lt;br /&gt;
on current master run...&lt;br /&gt;
 # config global&lt;br /&gt;
 # diagnose sys ha reset-uptime&lt;br /&gt;
&lt;br /&gt;
get admin hash password&lt;br /&gt;
 # config global&lt;br /&gt;
 # config sys admin&lt;br /&gt;
 # show&lt;br /&gt;
&lt;br /&gt;
uptime&lt;br /&gt;
 # config global&lt;br /&gt;
 # get system perf status | grep -i uptime&lt;br /&gt;
&lt;br /&gt;
shutdown/reboot&lt;br /&gt;
&lt;br /&gt;
 # execute shutdown&lt;br /&gt;
or&lt;br /&gt;
 # execute reboot&lt;br /&gt;
&lt;br /&gt;
==firewall==&lt;br /&gt;
 # show firewall policy&lt;br /&gt;
&lt;br /&gt;
==packet capture==&lt;br /&gt;
&lt;br /&gt;
 # diagnose sniffer packet &amp;lt;interface|any&amp;gt; '&amp;lt;tcpdump-filter&amp;gt;' &amp;lt;verbosity&amp;gt; &amp;lt;count&amp;gt; &amp;lt;time-format&amp;gt;&lt;br /&gt;
&lt;br /&gt;
verbosity of 4 will show the port name&lt;br /&gt;
&lt;br /&gt;
where if count = 0, then unlimited&lt;br /&gt;
&lt;br /&gt;
example:&lt;br /&gt;
 fotinet1 # '''diagnose sniffer packet port1 'icmp'''' 4 2 l&lt;br /&gt;
 interfaces=[port1]&lt;br /&gt;
 filters=[icmp]&lt;br /&gt;
 2022-08-25 13:16:52.397609 port1 -- 192.168.169.76 -&amp;gt; 192.168.169.31: icmp: echo request&lt;br /&gt;
 2022-08-25 13:16:52.397673 port1 -- 192.168.169.31 -&amp;gt; 192.168.169.76: icmp: echo reply&lt;br /&gt;
&lt;br /&gt;
==misc==&lt;br /&gt;
&lt;br /&gt;
check if fortigate has fortimanager central-management setting&lt;br /&gt;
  $ show full-configuration | grep &amp;quot;set fmg &amp;quot;&lt;br /&gt;
&lt;br /&gt;
==default login==&lt;br /&gt;
&lt;br /&gt;
VM images = admin / (empty password)&lt;br /&gt;
&lt;br /&gt;
==logging==&lt;br /&gt;
[https://community.fortinet.com/t5/FortiGate/Technical-Tip-Displaying-logs-via-FortiGate-s-CLI/ta-p/193027 Displaying logs via FortiGate's CLI]&lt;br /&gt;
&lt;br /&gt;
set log filter to view category with traffic logs&lt;br /&gt;
 execute log filter category 0&lt;br /&gt;
set log filter to view logs from local disk&lt;br /&gt;
 execute log filter device 0&lt;br /&gt;
view log filter settings&lt;br /&gt;
 execute log filter dump&lt;br /&gt;
reset log filter&lt;br /&gt;
 execute log filter reset&lt;br /&gt;
example..&lt;br /&gt;
&lt;br /&gt;
 execute log filter category 0&lt;br /&gt;
 execute log filter device 0&lt;br /&gt;
 execute log filter field srcip 10.0.0.10&lt;br /&gt;
 execute log filter field dstip 192.168.1.1&lt;br /&gt;
 execute log display&lt;br /&gt;
&lt;br /&gt;
[[category:fortinet]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/maestro_change_Chassis/SGM_up/down_state</id>
		<title>maestro change Chassis/SGM up/down state</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/maestro_change_Chassis/SGM_up/down_state"/>
				<updated>2021-04-11T00:59:02Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; [Expert@MyChassis-ch01-01:0]# '''g_clusterXL_admin -b 1_1 up'''&lt;br /&gt;
 You are about to perform blade_admin up on blades: 1_1&lt;br /&gt;
 This action will change members state&lt;br /&gt;
 &amp;lt;br&amp;gt;Are you sure? (Y - yes, any other key - no) y&lt;br /&gt;
 &amp;lt;br&amp;gt;Blade_admin up requires auditing&lt;br /&gt;
 Enter your full name: bob frapples&lt;br /&gt;
 Enter reason for blade_admin up [Maintenance]:&lt;br /&gt;
 WARNING: Blade_admin up on blades: 1_1, User: bob frapples, Reason: Maintenance&lt;br /&gt;
 &amp;lt;br&amp;gt;Members outputs:&lt;br /&gt;
 -*- 1 blade: 1_1 -*-&lt;br /&gt;
 Setting member to normal operation ...&lt;br /&gt;
 Member current state is ACTIVE&lt;br /&gt;
&lt;br /&gt;
[[category:maestro]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/maestro_setup</id>
		<title>maestro setup</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/maestro_setup"/>
				<updated>2021-04-08T18:33:29Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;single site and single MHO&lt;br /&gt;
&lt;br /&gt;
version r80.20&lt;br /&gt;
&lt;br /&gt;
mho-140&lt;br /&gt;
&lt;br /&gt;
connected downlink ports&lt;br /&gt;
&lt;br /&gt;
connect to MHO via mgmt port 0 on the back on default ip of 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
ssh to the orchestrator amount to 1 as the default is 2, at clish run&lt;br /&gt;
 set maestro configuration orchestrator-amount 1&lt;br /&gt;
 save config&lt;br /&gt;
&lt;br /&gt;
if this step is skipped you will receive error message: &amp;quot;Fail to load security groups&amp;quot; &lt;br /&gt;
&lt;br /&gt;
click on &amp;quot;orchestrator&amp;quot; on the left&lt;br /&gt;
&lt;br /&gt;
should see appliances under unassigned gateways&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
....&lt;br /&gt;
gclish&lt;br /&gt;
&lt;br /&gt;
&amp;gt;set smo image auto-clone state on&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
misc commands&lt;br /&gt;
&lt;br /&gt;
asg_policy unload&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/log_connection_verification</id>
		<title>log connection verification</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/log_connection_verification"/>
				<updated>2021-04-02T16:09:00Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Expert@chkpfw2:0]# '''cpstat fw -f log_connection'''&lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;br /&gt;
 Overall Status:                 0&lt;br /&gt;
 Overall Status Description:     Security Gateway is reporting logs as defined&lt;br /&gt;
 Local Logging Mode Description: Logs are written to log server&lt;br /&gt;
 Local Logging Mode Status:      0   &lt;br /&gt;
 &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 Log Servers Connections&lt;br /&gt;
 --------------------------------------------&lt;br /&gt;
 |IP            |Status|Status Description  |&lt;br /&gt;
 --------------------------------------------&lt;br /&gt;
 |192.168.144.80|     0|Log-Server Connected|&lt;br /&gt;
 --------------------------------------------&lt;br /&gt;
&lt;br /&gt;
netstat should show established connection to logging management server&lt;br /&gt;
&lt;br /&gt;
 [Expert@chkpfw2:0]# '''netstat -an | grep -i &amp;quot;257.*ESTABLISHED&amp;quot;'''&lt;br /&gt;
 tcp        0      0 192.168.1.3:49571         192.168.1.80:257          ESTABLISHED &lt;br /&gt;
&lt;br /&gt;
fwd restart to re-establish log connections&lt;br /&gt;
&lt;br /&gt;
stop&lt;br /&gt;
 # cpwd_admin stop -name FWD -path &amp;quot;$FWDIR/bin/fw&amp;quot; -command &amp;quot;fw kill fwd&amp;quot;&lt;br /&gt;
&lt;br /&gt;
start&lt;br /&gt;
 # cpwd_admin start -name FWD -path &amp;quot;$FWDIR/bin/fw&amp;quot; -command &amp;quot;fwd&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[category:logging]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/snmp-extend_to_run_custom_script</id>
		<title>snmp-extend to run custom script</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/snmp-extend_to_run_custom_script"/>
				<updated>2021-02-24T12:42:42Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;1) Create a script/command that monitors something on your system and output the result to stdout. &lt;br /&gt;
&amp;lt;br&amp;gt;example &lt;br /&gt;
&amp;lt;br&amp;gt;script: /usr/local/bin/check_everything.sh&lt;br /&gt;
&amp;lt;br&amp;gt;outputs either...&lt;br /&gt;
&amp;lt;br&amp;gt;STATUS: OK - everything good&lt;br /&gt;
&amp;lt;br&amp;gt;or&lt;br /&gt;
&amp;lt;br&amp;gt;STATUS: NOT OK!&lt;br /&gt;
&lt;br /&gt;
2) Create entry in the SNMP config to the monitor script:&lt;br /&gt;
 # vi /etc/snmp/userDefinedSettings.conf&lt;br /&gt;
&lt;br /&gt;
add a line...&lt;br /&gt;
 extend everything_status /bin/sh /usr/local/bin/check_everything.sh&lt;br /&gt;
&lt;br /&gt;
3) restart snmpd&lt;br /&gt;
 from clish, run &amp;quot;set snmp agent off&amp;quot; then run &amp;quot;set snmp agent on&amp;quot;&lt;br /&gt;
&lt;br /&gt;
4) test it &lt;br /&gt;
&lt;br /&gt;
with a walk&lt;br /&gt;
&lt;br /&gt;
 $ snmpwalk -On -v2c -c mycomstring 192.168.1.1 NET-SNMP-EXTEND-MIB::nsExtendObjects&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.1.0 = INTEGER: 1&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.2.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: /bin/sh&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.2.1.3.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: &lt;br /&gt;
 /usr/local/bin/check_everything.sh&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.2.1.4.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: &lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.2.1.5.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: 5&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.2.1.6.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: exec(1)&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.2.1.7.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: run-on-read(1)&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.2.1.20.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: permanent(4)&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.2.1.21.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: active(1)&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.3.1.1.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: STATUS: OK - everything good&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.3.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: STATUS: OK - everything good&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.3.1.3.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: 1&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.3.1.4.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: 0&lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.4.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115.1 = STRING: STATUS: OK - everything good&lt;br /&gt;
&lt;br /&gt;
with a get&lt;br /&gt;
&lt;br /&gt;
 $ snmpget -v 2c -c mycomstring 192.168.1.1 &lt;br /&gt;
 .1.3.6.1.4.1.8072.1.3.2.4.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115.1&lt;br /&gt;
 NET-SNMP-EXTEND-MIB::nsExtendOutLine.&amp;quot;fwpolicy_status&amp;quot;.1 = STRING: STATUS: OK - everything good&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/checkpoint.com_platform_document_page</id>
		<title>checkpoint.com platform document page</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/checkpoint.com_platform_document_page"/>
				<updated>2021-01-13T22:14:19Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;[https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doShowprelanding=&amp;amp;id=1 Downloads &amp;amp; Documentation Next Generation Firewalls]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doShowprelanding=&amp;amp;id=1 Downloads &amp;amp; Documentation Next Generation Firewalls]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/interface_monitoring_via_snmp</id>
		<title>interface monitoring via snmp</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/interface_monitoring_via_snmp"/>
				<updated>2020-06-19T18:20:34Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;notes... page in progress&lt;br /&gt;
&lt;br /&gt;
 [Expert@chkpfw1:0]# '''netstat -in'''&lt;br /&gt;
 Kernel Interface table&lt;br /&gt;
 Iface       MTU Met    RX-OK RX-ERR RX-DRP RX-OVR    TX-OK TX-ERR TX-DRP TX-OVR Flg&lt;br /&gt;
 eth0       1500   0 103695407    104    163      0 21955304      0      0      0 BMRU&lt;br /&gt;
 eth1       1500   0 84889247      3      0      0   134888      0      0      0 BMRU&lt;br /&gt;
 eth2       1500   0 51557348      0      0      0        0      0      0      0 BMRU&lt;br /&gt;
 lo        16436   0  7173067      0      0      0  7173067      0      0      0 LRU&lt;br /&gt;
&lt;br /&gt;
RX-DRP&lt;br /&gt;
 [Expert@chkpfw1:0]# '''snmpget -v 2c -c NAGIOS 192.168.1.2 IF-MIB::ifInDiscards.2''' &lt;br /&gt;
 IF-MIB::ifInDiscards.2 = Counter32: 163&lt;br /&gt;
&lt;br /&gt;
RX-ERR&lt;br /&gt;
 [Expert@chkpfw1:0]# '''snmpget -v 2c -c NAGIOS 192.168.1.2 IF-MIB::ifInErrors.2'''&lt;br /&gt;
 IF-MIB::ifInErrors.2 = Counter32: 104&lt;br /&gt;
&lt;br /&gt;
 [Expert@chkpfw1:0]# '''snmpwalk -v 2c -c NAGIOS 192.168.1.2  | grep -i if.*UcastPkts'''&lt;br /&gt;
 IF-MIB::ifInUcastPkts.1 = Counter32: 7173335&lt;br /&gt;
 IF-MIB::ifInUcastPkts.2 = Counter32: 103699664&lt;br /&gt;
 IF-MIB::ifInUcastPkts.3 = Counter32: 84893047&lt;br /&gt;
 IF-MIB::ifInUcastPkts.4 = Counter32: 51559644&lt;br /&gt;
 IF-MIB::ifInNUcastPkts.1 = Counter32: 0&lt;br /&gt;
 IF-MIB::ifInNUcastPkts.2 = Counter32: 0&lt;br /&gt;
 IF-MIB::ifInNUcastPkts.3 = Counter32: 0&lt;br /&gt;
 IF-MIB::ifInNUcastPkts.4 = Counter32: 0&lt;br /&gt;
 IF-MIB::ifOutUcastPkts.1 = Counter32: 7173335&lt;br /&gt;
 IF-MIB::ifOutUcastPkts.2 = Counter32: 21956198&lt;br /&gt;
 IF-MIB::ifOutUcastPkts.3 = Counter32: 134891&lt;br /&gt;
 IF-MIB::ifOutUcastPkts.4 = Counter32: 0&lt;br /&gt;
 IF-MIB::ifOutNUcastPkts.1 = Counter32: 0&lt;br /&gt;
 IF-MIB::ifOutNUcastPkts.2 = Counter32: 0&lt;br /&gt;
 IF-MIB::ifOutNUcastPkts.3 = Counter32: 0&lt;br /&gt;
 IF-MIB::ifOutNUcastPkts.4 = Counter32: 0&lt;br /&gt;
 HOST-RESOURCES-MIB::hrSWRunParameters.28716 = STRING: &amp;quot;-i if.*UcastPkts&amp;quot;&lt;br /&gt;
 IF-MIB::ifHCInUcastPkts.1 = Counter64: 7173335&lt;br /&gt;
 IF-MIB::ifHCInUcastPkts.2 = Counter64: 103699664&lt;br /&gt;
 IF-MIB::ifHCInUcastPkts.3 = Counter64: 84893047&lt;br /&gt;
 IF-MIB::ifHCInUcastPkts.4 = Counter64: 51559644&lt;br /&gt;
 IF-MIB::ifHCOutUcastPkts.1 = Counter64: 7173335&lt;br /&gt;
 IF-MIB::ifHCOutUcastPkts.2 = Counter64: 21956198&lt;br /&gt;
 IF-MIB::ifHCOutUcastPkts.3 = Counter64: 134891&lt;br /&gt;
 IF-MIB::ifHCOutUcastPkts.4 = Counter64: 0&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/snmp</id>
		<title>snmp</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/snmp"/>
				<updated>2020-06-19T16:55:32Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;mib files location on check point device&lt;br /&gt;
 $CPDIR/lib/snmp/&lt;br /&gt;
&lt;br /&gt;
==mib descriptions and OID of interest==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
appliance model&lt;br /&gt;
 &amp;quot;svnApplianceProductName&amp;quot;                       &amp;quot;1.3.6.1.4.1.2620.1.6.16.7&amp;quot;&lt;br /&gt;
&lt;br /&gt;
get check point version&lt;br /&gt;
&amp;quot;svnVersion&amp;quot;                    &amp;quot;1.3.6.1.4.1.2620.1.6.4.1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
example:&lt;br /&gt;
 [Expert@chkpfw1:0]# '''snmpget -v2c -c public localhost 1.3.6.1.4.1.2620.1.6.4.1.0'''&lt;br /&gt;
 SNMPv2-SMI::enterprises.2620.1.6.4.1.0 = STRING: &amp;quot;R80.20&amp;quot;&lt;br /&gt;
&lt;br /&gt;
firewall connections&lt;br /&gt;
 $ '''snmptranslate -Tz -m CHECKPOINT-MIB | grep -i fwnumconn'''&lt;br /&gt;
 &amp;quot;fwNumConn&amp;quot;                     &amp;quot;1.3.6.1.4.1.2620.1.1.25.3&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 $ '''snmpget -v 2c -c public 10.0.0.254 1.3.6.1.4.1.2620.1.1.25.3.0'''&lt;br /&gt;
 SNMPv2-SMI::enterprises.2620.1.1.25.3.0 = Gauge32: 3310&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[category:snmp]]&lt;br /&gt;
[[category:monitoring]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/palo_alto_api</id>
		<title>palo alto api</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/palo_alto_api"/>
				<updated>2019-09-16T22:44:17Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot; [https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-panorama-api/get-started-with-the-pan-os-xml-api/explore-the-api.html PAN-OS® and Panorama™ API Guide]  ==panxapi== co...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-panorama-api/get-started-with-the-pan-os-xml-api/explore-the-api.html PAN-OS® and Panorama™ API Guide]&lt;br /&gt;
&lt;br /&gt;
==panxapi==&lt;br /&gt;
command line program for accessing the PAN-OS XML API&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://github.com/kevinsteves/pan-python/blob/master/doc/panxapi.rst panxapi.py documentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[category:palo alto]]&lt;br /&gt;
[[category:api]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/panorama_api</id>
		<title>panorama api</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/panorama_api"/>
				<updated>2019-08-23T17:23:12Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
login for token / key&lt;br /&gt;
 $ curl -k &amp;quot;https://&amp;lt;''hostname|ip''&amp;gt;/api/?type=keygen&amp;amp;user=&amp;lt;username&amp;gt;&amp;amp;password=&amp;lt;password&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
example...&lt;br /&gt;
 curl -k &amp;quot;https://192.168.1.1/api/?type=keygen&amp;amp;user=admin&amp;amp;password=admin&amp;quot;&lt;br /&gt;
 &amp;lt;response status = 'success'&amp;gt;&amp;lt;result&amp;gt;&amp;lt;key&amp;gt;LUFRPT1jMUFXZHlNdDBPVTEya0lQNWorTyttYURFNmM9UHdvL2REWWUyaWFIU1hlZHdiRU5BQT09&amp;lt;/key&amp;gt;&amp;lt;/result&amp;gt;&amp;lt;/response&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
  	&lt;br /&gt;
Get a list of firewalls that Panorama manages:&lt;br /&gt;
 https://&amp;lt;''hostname|ip''&amp;gt;/api/?type=op&amp;amp;cmd=&amp;lt;show&amp;gt;&amp;lt;devices&amp;gt;&amp;lt;all&amp;gt;&amp;lt;/all&amp;gt;&amp;lt;/devices&amp;gt;&amp;lt;/show&amp;gt;&lt;br /&gt;
&lt;br /&gt;
curl example&lt;br /&gt;
 curl -kg &amp;quot;https://192.168.1.1/api/?type=op&amp;amp;cmd=&amp;lt;show&amp;gt;&amp;lt;devices&amp;gt;&amp;lt;all&amp;gt;&amp;lt;/all&amp;gt;&amp;lt;/devices&amp;gt;&amp;lt;/show&amp;gt;&amp;amp;key=LUFRPT1jMUFXZHlNdDBPVTEya0lQNWorTyttYURFNmM9UHdvL2REWWUyaWFIU1hlZHdiRU5BQT09&amp;quot;&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/vmware_nsx_notes</id>
		<title>vmware nsx notes</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/vmware_nsx_notes"/>
				<updated>2019-08-16T13:43:43Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=NSX-T=&lt;br /&gt;
==Tier-0 Gateways==&lt;br /&gt;
A tier-0 gateway performs the functions of a tier-0 logical router. It processes traffic between the logical and physical networks.&lt;br /&gt;
&lt;br /&gt;
An Edge node can support only one tier-0 gateway or logical router.&lt;br /&gt;
&lt;br /&gt;
==documentation==&lt;br /&gt;
[https://docs.vmware.com/en/VMware-NSX-T-Data-Center/index.html VMware NSX-T Data Center Documentation]&lt;br /&gt;
&lt;br /&gt;
[[category:vmware]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/cpuse_notes</id>
		<title>cpuse notes</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/cpuse_notes"/>
				<updated>2019-07-18T15:18:31Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92449&amp;amp;partition=General&amp;amp;product=All%22 sk92449 - Check Point Upgrade Service Engine (CPUSE) - Gaia Deployment Agent]&lt;br /&gt;
&lt;br /&gt;
log file&lt;br /&gt;
&lt;br /&gt;
 /opt/CPInstLog/DeploymentAgent.log&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/mgmt_cli_on_ubuntu</id>
		<title>mgmt cli on ubuntu</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/mgmt_cli_on_ubuntu"/>
				<updated>2019-05-14T16:10:45Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;[https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/mgmt-cli-on-Ubuntu/td-p/28706 mgmt_cli on ubuntu]  category:api&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/mgmt-cli-on-Ubuntu/td-p/28706 mgmt_cli on ubuntu]&lt;br /&gt;
&lt;br /&gt;
[[category:api]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/ssh_tunneling_r80.x_smartconsole_GUI</id>
		<title>ssh tunneling r80.x smartconsole GUI</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/ssh_tunneling_r80.x_smartconsole_GUI"/>
				<updated>2019-05-09T04:29:27Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;==disclaimer== this is not a recommended or secure configuration for production systems!  ==sshd_config==  modify the line   AllowTcpForwarding no  to    AllowTcpForwarding ye...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==disclaimer==&lt;br /&gt;
this is not a recommended or secure configuration for production systems!&lt;br /&gt;
&lt;br /&gt;
==sshd_config==&lt;br /&gt;
&lt;br /&gt;
modify the line&lt;br /&gt;
&lt;br /&gt;
 AllowTcpForwarding no&lt;br /&gt;
&lt;br /&gt;
to &lt;br /&gt;
&lt;br /&gt;
 AllowTcpForwarding yes&lt;br /&gt;
&lt;br /&gt;
and restart sshd&lt;br /&gt;
 /etc/init.d/sshd restart&lt;br /&gt;
&lt;br /&gt;
==ssh tunnel commands==&lt;br /&gt;
Main GUI connection - port 19009&lt;br /&gt;
 # ssh -f -N -L &amp;lt;relay_host&amp;gt;:19009:&amp;lt;r80_mgmt_svr&amp;gt;:19009 username@&amp;lt;r80_mgmt_svr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CRL download - port 18264&lt;br /&gt;
 # ssh -f -N -L &amp;lt;relay_host&amp;gt;:18264:&amp;lt;r80_mgmt_svr&amp;gt;:18264 username@&amp;lt;r80_mgmt_svr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ICA connection - port 18190 - needed for manipulating objects which have SIC attributes&lt;br /&gt;
 # ssh -f -N -L &amp;lt;relay_host&amp;gt;:18190:&amp;lt;r80_mgmt_svr&amp;gt;:18190 username@&amp;lt;r80_mgmt_svr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==GUI connection==&lt;br /&gt;
lauch the smartconsole and specify the &amp;lt;relay_host&amp;gt; ip or hostname as the destination&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/1.0_TLS_disablement</id>
		<title>1.0 TLS disablement</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/1.0_TLS_disablement"/>
				<updated>2019-04-12T15:17:52Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;TLS 1.1 and above configure  sk102989 + sk120846&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;TLS 1.1 and above configure&lt;br /&gt;
&lt;br /&gt;
sk102989 + sk120846&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/gaia_log_rotation_settings</id>
		<title>gaia log rotation settings</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/gaia_log_rotation_settings"/>
				<updated>2018-05-23T15:36:51Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;found in...  /etc/cpshell/log_rotation.conf&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;found in...&lt;br /&gt;
 /etc/cpshell/log_rotation.conf&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/r80.10_what_is_new</id>
		<title>r80.10 what is new</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/r80.10_what_is_new"/>
				<updated>2018-04-24T15:27:54Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: /* objects window */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Unified Console==&lt;br /&gt;
===legacy apps gone?===&lt;br /&gt;
nope...&lt;br /&gt;
[[file:unified_and_legacy_consoles.png]]&lt;br /&gt;
===Multi-Domain login===&lt;br /&gt;
[[file:mds_login.png]]&lt;br /&gt;
===MultiDomain View===&lt;br /&gt;
[[file:multidomain_view.png]]&lt;br /&gt;
search is broken&lt;br /&gt;
&lt;br /&gt;
===Gateway &amp;amp; Server View===&lt;br /&gt;
&lt;br /&gt;
To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest,&lt;br /&gt;
 1) navigate to Gateways &amp;amp; Server View &lt;br /&gt;
 2) find the firewall of interest&lt;br /&gt;
 3) sort by Domain&lt;br /&gt;
 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View&lt;br /&gt;
&lt;br /&gt;
[[file:gateway_view.png]]&lt;br /&gt;
&lt;br /&gt;
===Global Policy Assingment===&lt;br /&gt;
[[file:global_assing.png]]&lt;br /&gt;
&lt;br /&gt;
==Policy Layers and Sub-Policies==&lt;br /&gt;
&lt;br /&gt;
==Security Policies View==&lt;br /&gt;
===tabbed policies===&lt;br /&gt;
===diffs===&lt;br /&gt;
objects window moved to the right side&lt;br /&gt;
&lt;br /&gt;
policy install status lower left&lt;br /&gt;
&lt;br /&gt;
===Publishing Changes===&lt;br /&gt;
&lt;br /&gt;
===unpublished changes===&lt;br /&gt;
In earlier version of the SmartDashboard, if the client crashed or was disconnected then the changes were lost. This is not the case with r80+. Changes are saved on the Management server automatically. They do not take effect until published.&lt;br /&gt;
&lt;br /&gt;
==troubleshooting==&lt;br /&gt;
error message&lt;br /&gt;
[[file:object_locked.png]]&lt;br /&gt;
&lt;br /&gt;
this is often due to an unpublished session. The unpublished session can be found under&lt;br /&gt;
&lt;br /&gt;
 Manage &amp;amp; Settings &amp;gt; Sessions &amp;gt; View Sessions&lt;br /&gt;
&lt;br /&gt;
Look for session with locks and changes. If the Connection Mode show &amp;quot;Disconnected&amp;quot;, then it is likely the source of the issue. An administrator can Publish, Discard or Take Over the session with the SmartConsole. &lt;br /&gt;
&lt;br /&gt;
[[file:session_disconnected.png]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/Static_NAT_for_outgoing_connections_through_gateway_with_ISP_Redundancy</id>
		<title>Static NAT for outgoing connections through gateway with ISP Redundancy</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/Static_NAT_for_outgoing_connections_through_gateway_with_ISP_Redundancy"/>
				<updated>2018-02-11T17:55:11Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;[https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk25152&amp;amp;partition=Advanced&amp;amp;product=Security sk25152]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk25152&amp;amp;partition=Advanced&amp;amp;product=Security sk25152]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/smartupdate_license_repository_commands</id>
		<title>smartupdate license repository commands</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/smartupdate_license_repository_commands"/>
				<updated>2018-02-02T15:41:27Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: /* cplic del - delete license from repo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;License Database/repository Operations:&lt;br /&gt;
 &lt;br /&gt;
taken from R77 CP_R77_CLI_ReferenceGuide.pdf&lt;br /&gt;
&lt;br /&gt;
=='''cplic db_print''' - Print licenses in database/repository==&lt;br /&gt;
'''Description'''&lt;br /&gt;
Displays the details of Check Point licenses stored in the license repository on the Security&lt;br /&gt;
Management Server.&lt;br /&gt;
 cplic db_print &amp;lt;object name | -all&amp;gt; [-n noheader] [-x print signatures] [-t type] [-a attached]&lt;br /&gt;
&lt;br /&gt;
=='''cplic db_add''' - add license to device or repository==&lt;br /&gt;
'''Description'''&lt;br /&gt;
Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''.&lt;br /&gt;
 cplic db_add &amp;lt; -l license-file | host expiration-date signature SKU/features &amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''cplic get''' - retrieve/sync repo with remote gateways==&lt;br /&gt;
'''Description '''&lt;br /&gt;
The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated.&lt;br /&gt;
 cplic get {&amp;lt;ipaddr&amp;gt;|&amp;lt;hostname&amp;gt;|-all} [-v41]&lt;br /&gt;
&amp;lt;br&amp;gt;example: pretend there was a hardware failure, and RMA was performed, the new firewall is up and running backup config produced by clish &amp;quot;show configuration&amp;quot; as run on the failed device prior to failure. the backup config doesn't include the license. this is the job of the license repository/database on the management device (smartcenter or provider-1 CMA). however; it will show as attached to the firewall because that was the last license status before the failure. so, to &amp;quot;detach&amp;quot; it in the repo we can run the command as follows...&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[Expert@chkpmgr1:0]# '''cplic get chkpfw1'''&lt;br /&gt;
&amp;lt;br&amp;gt; Getting licenses from chkpfw1 ...&lt;br /&gt;
&amp;lt;br&amp;gt;chkpfw1:&lt;br /&gt;
&amp;lt;br&amp;gt;Retrieved 1 licenses&lt;br /&gt;
&amp;lt;br&amp;gt;Detached  1 licenses&lt;br /&gt;
&amp;lt;br&amp;gt;Removed   0 licenses&lt;br /&gt;
&lt;br /&gt;
=='''cplic put''' - add local or attach license remotely==&lt;br /&gt;
&amp;lt;br&amp;gt;'''Description '''&lt;br /&gt;
Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated.&lt;br /&gt;
 cplic put &amp;lt;object name&amp;gt; [-ip dynamic ip] [-F &amp;lt;output file&amp;gt;] -l &amp;lt;license-file&amp;gt; [&amp;lt;host&amp;gt;] [&amp;lt;expiration date&amp;gt;] [&amp;lt;signature&amp;gt;] [&amp;lt;SKU/feature&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''cplic del''' - delete license from repo==&lt;br /&gt;
'''WARNING - use with care! deleting a license from an online gateway can cause an outage.'''&lt;br /&gt;
&amp;lt;br&amp;gt;'''Description'''&lt;br /&gt;
Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines&lt;br /&gt;
  cplic del [-F &amp;lt;output file&amp;gt;] &amp;lt;signature&amp;gt; &amp;lt;object name&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[category:license]]&lt;br /&gt;
&lt;br /&gt;
[[category:cli]]&lt;br /&gt;
&lt;br /&gt;
[[category:smartupdate]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/manager_to_firewall_services</id>
		<title>manager to firewall services</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/manager_to_firewall_services"/>
				<updated>2018-01-19T20:13:33Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;manager / mgmt / MDM / CMA / smartcenter to firewall  fw1 - tcp 256 &amp;lt;br&amp;gt;fw1_lea - tcp 18184 &amp;lt;br&amp;gt;fw1_sam - tcp 18183 &amp;lt;br&amp;gt;fw1_ica_push - tcp 18211 &amp;lt;br&amp;gt;cpd &amp;lt;br&amp;gt;cpd_amon &amp;lt;br&amp;gt;fw1_c...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;manager / mgmt / MDM / CMA / smartcenter to firewall&lt;br /&gt;
&lt;br /&gt;
fw1 - tcp 256&lt;br /&gt;
&amp;lt;br&amp;gt;fw1_lea - tcp 18184&lt;br /&gt;
&amp;lt;br&amp;gt;fw1_sam - tcp 18183&lt;br /&gt;
&amp;lt;br&amp;gt;fw1_ica_push - tcp 18211&lt;br /&gt;
&amp;lt;br&amp;gt;cpd&lt;br /&gt;
&amp;lt;br&amp;gt;cpd_amon&lt;br /&gt;
&amp;lt;br&amp;gt;fw1_cprid&lt;br /&gt;
&amp;lt;br&amp;gt;cpmi&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/manual_upgrade_notes</id>
		<title>manual upgrade notes</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/manual_upgrade_notes"/>
				<updated>2017-11-19T06:42:36Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;77.20 to 77.30                                                                                                          installer verions check...                             ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;77.20 to 77.30&lt;br /&gt;
                                                                                                        &lt;br /&gt;
installer verions check...                                                                              &lt;br /&gt;
 cpvinfo $DADIR/bin/DAService | grep Build                                                              &lt;br /&gt;
                                                                                                        &lt;br /&gt;
upgrade installer                                                                                       &lt;br /&gt;
 rpm -Uhv --force CPda-00-00.i386-1278.rpm                                                              &lt;br /&gt;
                                                                                                        &lt;br /&gt;
check base fw ver                                                                                       &lt;br /&gt;
                                                                                                        &lt;br /&gt;
 installer import local Check_Point_R77.30_T204_Install_and_Upgrade.tgz                                 &lt;br /&gt;
                                                                                                        &lt;br /&gt;
 installer install Check_Point_R77.30_T204_Install_and_Upgrade.tgz                                      &lt;br /&gt;
                                                                                                        &lt;br /&gt;
rebooted by installer                                                                                   &lt;br /&gt;
                                                                                                        &lt;br /&gt;
77.30 to hotfix to post build script                                                                    &lt;br /&gt;
                                                                                                        &lt;br /&gt;
touch /etc/.wizard_accepted                                                                             &lt;br /&gt;
                                                                                                        &lt;br /&gt;
cpconfig                                                                                                &lt;br /&gt;
                                                                                                        &lt;br /&gt;
rpm -ihv --force CPppak-R77-00.i386.rpm                                                                 &lt;br /&gt;
                                                                                                        &lt;br /&gt;
reboot                                                                                                  &lt;br /&gt;
                                                                                                        &lt;br /&gt;
cpconfig to enable securexl (not needed)                                                                &lt;br /&gt;
                                                                                                        &lt;br /&gt;
cpconfig to configure corexl instances                                                                  &lt;br /&gt;
                                                                                                        &lt;br /&gt;
&amp;lt;br&amp;gt;configure $FWDIR/boot/modules/fwkern.conf                                                               &lt;br /&gt;
&amp;lt;br&amp;gt;(13800 example)                                                                                         &lt;br /&gt;
&amp;lt;br&amp;gt;fwx_nat_dynamic_port_allocation=1&lt;br /&gt;
&amp;lt;br&amp;gt;fwx_old_icmp_nat=1&lt;br /&gt;
&amp;lt;br&amp;gt;fw_drop_icmp_errors_over_tcp=1&lt;br /&gt;
&amp;lt;br&amp;gt;fwkern_optimize_drops_support=1&lt;br /&gt;
&amp;lt;br&amp;gt;fwha_monitor_if_link_state=0&lt;br /&gt;
&lt;br /&gt;
 clish&amp;gt; set core-dump enable&lt;br /&gt;
&lt;br /&gt;
reboot&lt;br /&gt;
&lt;br /&gt;
 installer import local Check_Point_R77_30_JUMBO_HF_1_Bundle_T216_FULL.tgz&lt;br /&gt;
&lt;br /&gt;
 installer install Check_Point_R77_30_JUMBO_HF_1_Bundle_T216_FULL.tgz&lt;br /&gt;
&lt;br /&gt;
reboot (installer)&lt;br /&gt;
&lt;br /&gt;
# mkdir HF_INSTALL&lt;br /&gt;
&lt;br /&gt;
# cd HF_INSTALL&lt;br /&gt;
# tar xvfz ../SecurePlatform_HOTFIX_R7730_T216_JHF_879.tgz&lt;br /&gt;
#./SecurePlatform_HOTFIX_R7730_T216_JHF_879_990879001_1&lt;br /&gt;
&lt;br /&gt;
reboot&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/smartlog_data_path</id>
		<title>smartlog data path</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/smartlog_data_path"/>
				<updated>2017-11-10T18:32:00Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;r77 index paths...   /var/log/opt/CPmds-R77/customers/&amp;lt;customer_name&amp;gt;/CPSmartLog-R77/data/  default data kept = 14 days&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;r77 index paths...&lt;br /&gt;
&lt;br /&gt;
 /var/log/opt/CPmds-R77/customers/&amp;lt;customer_name&amp;gt;/CPSmartLog-R77/data/&lt;br /&gt;
&lt;br /&gt;
default data kept = 14 days&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/setting_interface_affinity</id>
		<title>setting interface affinity</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/setting_interface_affinity"/>
				<updated>2017-10-22T04:19:32Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;example (77.30)&lt;br /&gt;
&lt;br /&gt;
set affinity&lt;br /&gt;
 # '''sim affinity -s'''&lt;br /&gt;
 Usage : For each interface enter one of the following:&lt;br /&gt;
    Return             - To keep the default values (appearing in [ ])&lt;br /&gt;
    all                - To allow all processors for this interface&lt;br /&gt;
    List of processors - A list of processor numbers between 0 and 19&lt;br /&gt;
&lt;br /&gt;
 eth1-01 [All] : '''0'''&lt;br /&gt;
 eth1-02 [All] : '''0'''&lt;br /&gt;
 eth2-01 [All] : '''1'''&lt;br /&gt;
 eth2-02 [All] : '''2'''&lt;br /&gt;
 eth3-01 [All] : '''3'''&lt;br /&gt;
 eth3-02 [All] : '''4'''&lt;br /&gt;
 eth3-04 [All] : '''5'''&lt;br /&gt;
&lt;br /&gt;
check affinity&lt;br /&gt;
 # sim affinity -l&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
 # fw ctl affinity -l -r&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/r80_api_reference</id>
		<title>r80 api reference</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/r80_api_reference"/>
				<updated>2017-10-04T15:18:34Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Management server API setup==&lt;br /&gt;
===enabling for remote IPs===&lt;br /&gt;
done the smartconsole&lt;br /&gt;
&lt;br /&gt;
[[file:cp_mgmt_api_enable_all_IPs.png]]&lt;br /&gt;
&lt;br /&gt;
it can also be enabled via mgmt_cli under &amp;quot;set api-settings&amp;quot;&lt;br /&gt;
&lt;br /&gt;
===status check===&lt;br /&gt;
&lt;br /&gt;
[Expert@chmkmgr1:0]# '''api status'''&lt;br /&gt;
&amp;lt;br&amp;gt;API Settings:      &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;nowiki&amp;gt;-----------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Accessibility:                      Require all granted      &lt;br /&gt;
&amp;lt;br&amp;gt;Automatic Start:                    Enabled       &lt;br /&gt;
&amp;lt;br&amp;gt;Processes:      &lt;br /&gt;
&amp;lt;br&amp;gt;Name      State     PID       More Information&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;nowiki&amp;gt;-------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;API       Started   10763               &lt;br /&gt;
&amp;lt;br&amp;gt;CPM       Started   10460     Check Point Security Management Server is running and ready&lt;br /&gt;
&amp;lt;br&amp;gt;FWM       Started   10007               &lt;br /&gt;
&amp;lt;br&amp;gt;Port Details:      &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;nowiki&amp;gt;----------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;JETTY Internal Port:      50276          &lt;br /&gt;
&amp;lt;br&amp;gt;APACHE Gaia Port:         443            &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;nowiki&amp;gt;-------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Overall API Status: Started&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;nowiki&amp;gt;-------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;API readiness test SUCCESSFUL. The server is up and ready to receive connections&lt;br /&gt;
&lt;br /&gt;
==examples==&lt;br /&gt;
===logging in===&lt;br /&gt;
login and redirect session info to a file for reuse&lt;br /&gt;
 # mgmt_cli login user admin &amp;gt; id.txt&lt;br /&gt;
&lt;br /&gt;
same but read only&lt;br /&gt;
 # mgmt_cli login user admin read-only true &amp;gt; id.txt&lt;br /&gt;
&lt;br /&gt;
===search existing object===&lt;br /&gt;
search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range.&lt;br /&gt;
 # mgmt_cli -s id.txt show objects filter &amp;quot;192.168.1.1&amp;quot; ip-only true  --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: .&amp;quot;mask-length4&amp;quot;}'&lt;br /&gt;
&lt;br /&gt;
return only objects with the EXACT ip&lt;br /&gt;
&lt;br /&gt;
 # mgmt_cli -s id.txt show objects filter &amp;quot;192.168.1.1&amp;quot; ip-only true details-level full --format json |  jq '.objects[] | select(.&amp;quot;ipv4-address&amp;quot; == &amp;quot;192.168.1.1&amp;quot;) | .name'&lt;br /&gt;
&lt;br /&gt;
*** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object)&lt;br /&gt;
&lt;br /&gt;
===access rules===&lt;br /&gt;
====notes before you begin====&lt;br /&gt;
when using the parameter &amp;quot;name&amp;quot; to refer to a particular package, it appears to require the following...&lt;br /&gt;
&amp;lt;package name&amp;gt; &amp;lt;layer name&amp;gt;&lt;br /&gt;
&lt;br /&gt;
as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no &amp;quot;headers&amp;quot; or &amp;quot;titles&amp;quot; in the ruleset, you will get 1 rulebase[] array.  If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules.&lt;br /&gt;
&lt;br /&gt;
What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli &amp;quot;offset&amp;quot; commands and/or modified jq commands... &lt;br /&gt;
&lt;br /&gt;
for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with &lt;br /&gt;
&lt;br /&gt;
 | jq '.rulebase[]'&lt;br /&gt;
&lt;br /&gt;
if you DO HAVE headers, to output the rules you need&lt;br /&gt;
&lt;br /&gt;
 | jq '.rulebase[] | .rulebase[]'&lt;br /&gt;
&lt;br /&gt;
====show access layers?====&lt;br /&gt;
 [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '.&amp;quot;access-layers&amp;quot;[].name'&lt;br /&gt;
 &amp;quot;dropall Network&amp;quot;'''&lt;br /&gt;
 &amp;quot;Network&amp;quot;&lt;br /&gt;
&lt;br /&gt;
where &amp;quot;Network&amp;quot; represents the default policy package Standard&lt;br /&gt;
&lt;br /&gt;
====examples====&lt;br /&gt;
show number of rules in policy&lt;br /&gt;
 mgmt_cli show access-rulebase name &amp;quot;&amp;lt;layer&amp;gt;&amp;quot; -s id.txt --format json limit 1 | jq '.total'&lt;br /&gt;
&lt;br /&gt;
display rule with uid = xxx&lt;br /&gt;
&lt;br /&gt;
 # '''mgmt_cli -s id.txt show access-rule layer &amp;quot;My_policy Network&amp;quot; uid &amp;quot;xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
display src/dst/service from rule with uid&lt;br /&gt;
 for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer &amp;quot;&amp;lt;policy_name&amp;gt; &amp;lt;layer_name&amp;gt;&amp;quot; uid &amp;quot;xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx&amp;quot; --format json | jq .$i[].name; done&lt;br /&gt;
&lt;br /&gt;
alternate(inferior) way with jq&lt;br /&gt;
 mgmt_cli show access-rulebase name &amp;quot;Network&amp;quot; -s id.txt package &amp;quot;Standard&amp;quot; show-hits true --format json | jq '.rulebase[] | select (.uid == &amp;quot;1de8fab0-4858-4067-977d-1cbb5cd2e55d&amp;quot;) | .&amp;quot;rule-number&amp;quot;'&lt;br /&gt;
 1&lt;br /&gt;
&lt;br /&gt;
display rule number with comment containing a string haha&lt;br /&gt;
 mgmt_cli show access-rulebase name &amp;quot;Network&amp;quot; -s id.txt package &amp;quot;Standard&amp;quot; show-hits true --format json | jq '.rulebase[] | select (.comments | contains(&amp;quot;haha&amp;quot;)) | {rulenum: .&amp;quot;rule-number&amp;quot;, comment: .comments}'&lt;br /&gt;
&lt;br /&gt;
====adding rules====&lt;br /&gt;
&lt;br /&gt;
mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule&lt;br /&gt;
&lt;br /&gt;
mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule&lt;br /&gt;
&lt;br /&gt;
mgmt_cli -s id.txt set access-rule name &amp;quot;new_rule&amp;quot; layer &amp;quot;xx70adc9-b4c6-4e64-9bfd-d57ac91289f3&amp;quot; action &amp;quot;Accept&amp;quot; service add &amp;quot;https&amp;quot;&lt;br /&gt;
&lt;br /&gt;
mgmt_cli -s id.txt set access-rule name &amp;quot;new_rule&amp;quot; layer &amp;quot;xx70adc9-b4c6-4e64-9bfd-d57ac91289f3&amp;quot; service.add &amp;quot;https&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===mds / domain===&lt;br /&gt;
&lt;br /&gt;
get list of domains,objects(management and firewalls),object type&lt;br /&gt;
 mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3&lt;br /&gt;
&lt;br /&gt;
===log queries===&lt;br /&gt;
 mgmt_cli -s id.txt show-logs new-query.filter &amp;quot;src:10.0.0.11 and service:https&amp;quot; new-query.time-frame last-hour new-query.max-logs-per-request 1 --format json | jq '.logs[] | {time: .time,fw: .orig,log_server: .orig_log_server,policy: .policy_name,action: .action,source: .src,dest: .dst,service: .service}'&lt;br /&gt;
&lt;br /&gt;
{&lt;br /&gt;
  &amp;quot;time&amp;quot;: &amp;quot;2023-06-09T06:20:20Z&amp;quot;,&lt;br /&gt;
  &amp;quot;fw&amp;quot;: &amp;quot;my_cp_fw1&amp;quot;,&lt;br /&gt;
  &amp;quot;log_server&amp;quot;: &amp;quot;192.168.1.88&amp;quot;,&lt;br /&gt;
  &amp;quot;policy&amp;quot;: &amp;quot;super_secure&amp;quot;,&lt;br /&gt;
  &amp;quot;action&amp;quot;: &amp;quot;Accept&amp;quot;,&lt;br /&gt;
  &amp;quot;source&amp;quot;: &amp;quot;10.0.0.11&amp;quot;,&lt;br /&gt;
  &amp;quot;dest&amp;quot;: &amp;quot;204.79.197.203&amp;quot;,&lt;br /&gt;
  &amp;quot;service&amp;quot;: &amp;quot;443&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
==jq==&lt;br /&gt;
compound jq select using and/or (note: contains returns true/false)&lt;br /&gt;
&lt;br /&gt;
 | jq '.rulebase[] | .rulebase[] | select (.comments | (contains(&amp;quot;hahaha&amp;quot;) or contains(&amp;quot;lol&amp;quot;)) | not ) | {ruleUID: .uid, comments: .comments} '&lt;br /&gt;
&lt;br /&gt;
and another one...&lt;br /&gt;
 | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains(&amp;quot;hahah&amp;quot;) or contains(&amp;quot;lol&amp;quot;) | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: .&amp;quot;rule-number&amp;quot;, ruleUID: .uid, comments: .comments} '&lt;br /&gt;
 &lt;br /&gt;
filter objects dictary for uid for accept action&lt;br /&gt;
 jq '.&amp;quot;objects-dictionary&amp;quot;[] | select (.name == &amp;quot;Accept&amp;quot;) | .uid'&lt;br /&gt;
&lt;br /&gt;
get cluster member policy installation targets&lt;br /&gt;
&lt;br /&gt;
 | jq -c '.&amp;quot;installation-targets-revision&amp;quot;[] | .&amp;quot;cluster-members-revision&amp;quot;[] | .&amp;quot;target-name&amp;quot;' | tr -d '&amp;quot;' | tr '\n' ' '&lt;br /&gt;
&lt;br /&gt;
get values without keys&lt;br /&gt;
&lt;br /&gt;
example&lt;br /&gt;
&lt;br /&gt;
with keys...&lt;br /&gt;
 '''| jq '.objects[] | {name: .name,type: .type}''''&lt;br /&gt;
 {&lt;br /&gt;
  &amp;quot;name&amp;quot;: chkp-fw&amp;quot;,&lt;br /&gt;
  &amp;quot;type&amp;quot;: &amp;quot;simple-gateway&amp;quot;&lt;br /&gt;
 }&lt;br /&gt;
 {&lt;br /&gt;
  &amp;quot;name&amp;quot;: &amp;quot;chkp-mgmt&amp;quot;,&lt;br /&gt;
  &amp;quot;type&amp;quot;: &amp;quot;checkpoint-host&amp;quot;&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
without keys, change from curly {} to square [] brackets and drop key references&lt;br /&gt;
 '''| jq '.objects[] | [.name, .type]''''&lt;br /&gt;
 [&lt;br /&gt;
  &amp;quot;chkp-fw&amp;quot;,&lt;br /&gt;
  &amp;quot;simple-gateway&amp;quot;&lt;br /&gt;
 ]&lt;br /&gt;
 [&lt;br /&gt;
  &amp;quot;chkp-mgmt&amp;quot;,&lt;br /&gt;
  &amp;quot;checkpoint-host&amp;quot;&lt;br /&gt;
 ]&lt;br /&gt;
&lt;br /&gt;
print all values on the same line, comma separated&lt;br /&gt;
 '''| jq '.objects[] | [.name, .type] | join (&amp;quot;,&amp;quot;)'''&lt;br /&gt;
 &amp;quot;chkp-fw simple-gateway&amp;quot;&lt;br /&gt;
 &amp;quot;chkp-mgmt,checkpoint-host&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==curl==&lt;br /&gt;
&lt;br /&gt;
 curl -X POST -H &amp;quot;Content-Type: application/json&amp;quot; -d '{&amp;quot;userId&amp;quot;: 5, &amp;quot;title&amp;quot;: &amp;quot;Post Title&amp;quot;, &amp;quot;body&amp;quot;: &amp;quot;Post content.&amp;quot;}' &lt;br /&gt;
		&lt;br /&gt;
 curl -X -H POST -H &amp;quot;Content-Type: application/json&amp;quot; -d	'{&amp;quot;user&amp;quot; : &amp;quot;jsmith&amp;quot;, &amp;quot;password&amp;quot; : &amp;quot;abc123&amp;quot;}' 192.168.1.10:443/login&lt;br /&gt;
	&lt;br /&gt;
 $ '''curl --insecure -X POST -H &amp;quot;Content-Type: application/json&amp;quot; -d '{&amp;quot;user&amp;quot; : &amp;quot;jsmith&amp;quot;, &amp;quot;password&amp;quot; : &amp;quot;abc123&amp;quot;}' https://192.168.1.10:443/web_api/login'''&lt;br /&gt;
 {&lt;br /&gt;
 &amp;quot;uid&amp;quot; : &amp;quot;46a11170-e554-4e58-a5fc-65ff9e38d8cb&amp;quot;,&lt;br /&gt;
 &amp;quot;sid&amp;quot; : &amp;quot;dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres&amp;quot;,&lt;br /&gt;
 &amp;quot;url&amp;quot; : &amp;quot;https://192.168.1.10:443/web_api&amp;quot;,&lt;br /&gt;
 &amp;quot;session-timeout&amp;quot; : 600,&lt;br /&gt;
 &amp;quot;last-login-was-at&amp;quot; : {&lt;br /&gt;
   &amp;quot;posix&amp;quot; : 1707413218074,&lt;br /&gt;
   &amp;quot;iso-8601&amp;quot; : &amp;quot;2024-02-08T10:26-0700&amp;quot;&lt;br /&gt;
 },&lt;br /&gt;
 &amp;quot;api-server-version&amp;quot; : &amp;quot;1.8.1&amp;quot;,&lt;br /&gt;
 &amp;quot;user-name&amp;quot; : &amp;quot;jsmith&amp;quot;,&lt;br /&gt;
 &amp;quot;user-uid&amp;quot; : &amp;quot;c1109c35-d741-7jg8-98e3-36669b7047a2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 $ '''curl --insecure -X POST -H &amp;quot;Content-Type: application/json&amp;quot; -H &amp;quot;X-chkp-sid: dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres&amp;quot; -d '{ }' https://192.168.1.10:443/web_api/keepalive'''&lt;br /&gt;
 {&lt;br /&gt;
  &amp;quot;message&amp;quot; : &amp;quot;OK&amp;quot;&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
==links==&lt;br /&gt;
[https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API]&lt;br /&gt;
&lt;br /&gt;
[https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api]&lt;br /&gt;
&lt;br /&gt;
parsing json return output&lt;br /&gt;
[https://stedolan.github.io/jq/ jq]&lt;br /&gt;
&lt;br /&gt;
[https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli]&lt;br /&gt;
&lt;br /&gt;
[https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/Creating_calculate_GB_in_one_days_of_logs_for_MLM</id>
		<title>Creating calculate GB in one days of logs for MLM</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/Creating_calculate_GB_in_one_days_of_logs_for_MLM"/>
				<updated>2017-10-03T15:43:59Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;to get log quantity for the last 24 hours(in GB on R77)...&lt;br /&gt;
 mcd customers&lt;br /&gt;
 # for CLM in *; do mdsenv $CLM; find $CLM/CPsuite-R77/fw1/log/*.log -mtime -1 | xargs ls -l | awk '{s+=$5} END {printf &amp;quot;%.0f&amp;quot;, s; print &amp;quot;/1024/1024/1024&amp;quot;}' | bc -l; done | awk '{s+=$1} END {print s}'&lt;br /&gt;
&lt;br /&gt;
get logs in GB per day for the last 7 days(R77)...&lt;br /&gt;
 for CLM in *; do mdsenv $CLM; echo $CLM; for DAY in 1 2 3 4 5 6 7; do find $CLM/CPsuite-R77/fw1/log/*.log -mtime +`echo $DAY` -a -mtime -`expr $DAY + 2` | xargs ls -l | awk '{s+=$5} END {printf &amp;quot;%.0f&amp;quot;, s; print &amp;quot;/1024/1024/1024&amp;quot;}' | bc -l; done; done&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[category:mlm]]&lt;br /&gt;
[[category:logging]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/hit_counter</id>
		<title>hit counter</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/hit_counter"/>
				<updated>2017-09-21T15:57:57Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
== Prerequisites for hit counter functionality ==&lt;br /&gt;
&lt;br /&gt;
Global Properties that must be enabled&lt;br /&gt;
 &lt;br /&gt;
CLI to query(must be in CMA environment on an MDM)&lt;br /&gt;
&lt;br /&gt;
 # cpmiquerybin object &amp;quot;&amp;quot; properties &amp;quot;name='firewall_properties'&amp;quot; | grep -i enable_hit_count &lt;br /&gt;
 :enable_hit_count (1)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 # cpmiquerybin object &amp;quot;&amp;quot; properties &amp;quot;name='firewall_properties'&amp;quot; | grep rulebase_uids_in_log&lt;br /&gt;
 :rulebase_uids_in_log (true)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== max table size (on fw gateways) ==&lt;br /&gt;
&lt;br /&gt;
[https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk90040&amp;amp;partition=General&amp;amp;product=Security hit counter fw module max table size]&lt;br /&gt;
&lt;br /&gt;
sk90040&lt;br /&gt;
&lt;br /&gt;
 fw ctl get int fw_rules_uid_max_dic_entries&lt;br /&gt;
 &lt;br /&gt;
 fw ctl set int fw_rules_uid_max_dic_entries VALUE&lt;br /&gt;
&lt;br /&gt;
for surviving reboot... [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk26202 Changing the kernel global parameters for Check Point Security Gateway]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/rewriting_grub_mbr</id>
		<title>rewriting grub mbr</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/rewriting_grub_mbr"/>
				<updated>2017-08-09T04:42:41Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
 grub&amp;gt; '''root (hd0,0)'''&lt;br /&gt;
 grub&amp;gt; '''setup (hd0)'''&lt;br /&gt;
  Checking if &amp;quot;/boot/grub/stage1&amp;quot; exists... no&lt;br /&gt;
  Checking if &amp;quot;/grub/stage1&amp;quot; exists... yes&lt;br /&gt;
  Checking if &amp;quot;/grub/stage2&amp;quot; exists... yes&lt;br /&gt;
  Checking if &amp;quot;/grub/e2fs_stage1_5&amp;quot; exists... yes&lt;br /&gt;
  Running &amp;quot;embed /grub/e2fs_stage1_5 (hd0)&amp;quot;...  15 sectors are embedded. succeeded&lt;br /&gt;
  Running &amp;quot;install /grub/stage1 (hd0) (hd0)1+15 p (hd0,0)/grub/stage2 /grub/grub.conf&amp;quot;...succeeded&lt;br /&gt;
 Done.&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/cyclic_logging_deletion_mechanism</id>
		<title>cyclic logging deletion mechanism</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/cyclic_logging_deletion_mechanism"/>
				<updated>2017-08-07T18:55:20Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;referenced sk33309&lt;br /&gt;
&lt;br /&gt;
all versions&lt;br /&gt;
&lt;br /&gt;
SmartView Tracker Messages / Errors &lt;br /&gt;
&lt;br /&gt;
in the traffic log files of the log server (not on the smartcenter or in the fw.adtlog)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Normal log deletion log'''&lt;br /&gt;
&lt;br /&gt;
Type: Control&lt;br /&gt;
&lt;br /&gt;
Information field: Log file &amp;lt;name&amp;gt; has been deleted by the &amp;quot;Cyclic Logging&amp;quot; mechanism&lt;br /&gt;
&lt;br /&gt;
'''Disk space triggered log deletion that failed'''&lt;br /&gt;
&lt;br /&gt;
Type: Alert&lt;br /&gt;
&lt;br /&gt;
Information Field: The log repository quota has been exceeded. No file could be deleted.&lt;br /&gt;
&lt;br /&gt;
This message indicates that the system tried to delete old log files in order to fulfill the required disk space requirement, as defined by the user, but could not find an appropriate file to delete. This might be because there are no old files left to delete (the active log file cannot be deleted), or because the user configured the mechanism not to delete log files from the last &amp;quot;N&amp;quot; days. The user should delete files manually from the machine in order to reach the desired free disk space. If the user does not, the current log might be deleted when a log switch occurs.&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/isp_redundancy</id>
		<title>isp redundancy</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/isp_redundancy"/>
				<updated>2017-07-24T03:52:32Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot; [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk23630 Advanced configuration options for ISP Redundancy]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk23630 Advanced configuration options for ISP Redundancy]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/firewall_logconnection_status</id>
		<title>firewall logconnection status</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/firewall_logconnection_status"/>
				<updated>2017-06-16T00:13:47Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;[Expert@chkpfw1:0]# cpstat fw -f log_connection&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[Expert@chkpfw1:0]# cpstat fw -f log_connection&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/centos_6.5_repo</id>
		<title>centos 6.5 repo</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/centos_6.5_repo"/>
				<updated>2017-05-24T22:28:41Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Nighthawk moved page centos 6.5 repo to centos 6.5 repo yum file&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt;[rhel-source]&lt;br /&gt;
&amp;lt;br&amp;gt;name=Red Hat Enterprise Linux $releasever - $basearch - Source&lt;br /&gt;
&amp;lt;br&amp;gt;baseurl=ftp://ftp.redhat.com/pub/redhat/linux/enterprise/$releasever/en/os/SRPMS/&lt;br /&gt;
&amp;lt;br&amp;gt;enabled=0&lt;br /&gt;
&amp;lt;br&amp;gt;gpgcheck=1&lt;br /&gt;
&amp;lt;br&amp;gt;gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[rhel-source-beta]&lt;br /&gt;
&amp;lt;br&amp;gt;name=Red Hat Enterprise Linux $releasever Beta - $basearch - Source&lt;br /&gt;
&amp;lt;br&amp;gt;baseurl=ftp://ftp.redhat.com/pub/redhat/linux/beta/$releasever/en/os/SRPMS/&lt;br /&gt;
&amp;lt;br&amp;gt;enabled=0&lt;br /&gt;
&amp;lt;br&amp;gt;gpgcheck=1&lt;br /&gt;
&amp;lt;br&amp;gt;gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-beta,file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[CentOS6base]&lt;br /&gt;
&amp;lt;br&amp;gt;name=CentOS-6-Base&lt;br /&gt;
&amp;lt;br&amp;gt;mirrorlist=http://mirrorlist.centos.org/?release=6&amp;amp;arch=$basearch&amp;amp;repo=os&lt;br /&gt;
&amp;lt;br&amp;gt;gpgcheck=1&lt;br /&gt;
&amp;lt;br&amp;gt;enabled=1&lt;br /&gt;
&amp;lt;br&amp;gt;gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY=CentOS-6&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[CentOS6updates]&lt;br /&gt;
&amp;lt;br&amp;gt;name=CentOS-6-Updates&lt;br /&gt;
&amp;lt;br&amp;gt;mirrorlist=http://mirrorlist.centos.org/?release=6&amp;amp;arch=$basearch&amp;amp;repo=updates&lt;br /&gt;
&amp;lt;br&amp;gt;gpgcheck=1&lt;br /&gt;
&amp;lt;br&amp;gt;enabled=1&lt;br /&gt;
&amp;lt;br&amp;gt;gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[CentOS6plus]&lt;br /&gt;
&amp;lt;br&amp;gt;name=CentOS-6-Plus&lt;br /&gt;
&amp;lt;br&amp;gt;mirrorlist=http://mirrorlist.centos.org/?release=6&amp;amp;arch=$basearch&amp;amp;repo=centosplus&lt;br /&gt;
&amp;lt;br&amp;gt;gpgcheck=1&lt;br /&gt;
&amp;lt;br&amp;gt;enabled=1&lt;br /&gt;
&amp;lt;br&amp;gt;gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/cp_manpage_-_mdsenv_runcrossdomainquery</id>
		<title>cp manpage - mdsenv runcrossdomainquery</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/cp_manpage_-_mdsenv_runcrossdomainquery"/>
				<updated>2017-05-01T17:38:53Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: Created page with &amp;quot;usage:   mdscmd runcrossdomainquery &amp;lt;-f Domain_list_filename | -list Domain1,Domain2,... | -all&amp;gt;  &amp;lt;  &amp;lt;query_network_obj &amp;lt;-n exact_name | -c partial_name | -i IP&amp;gt; &amp;gt; |  &amp;lt;query_r...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;usage: &lt;br /&gt;
 mdscmd runcrossdomainquery &amp;lt;-f Domain_list_filename | -list Domain1,Domain2,... | -all&amp;gt;&lt;br /&gt;
 &amp;lt;  &amp;lt;query_network_obj &amp;lt;-n exact_name | -c partial_name | -i IP&amp;gt; &amp;gt; |&lt;br /&gt;
 &amp;lt;query_rulebase -n global_obj_name&amp;gt; |&lt;br /&gt;
 &amp;lt;whereused_rules -n global_obj_name&amp;gt; |&lt;br /&gt;
 &amp;lt;whereused_objs -n global_obj_name&amp;gt; &amp;gt; |&lt;br /&gt;
 &amp;lt;query_generic_obj -t table -s query_str&amp;gt;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/gaia_CLI_upgrades</id>
		<title>gaia CLI upgrades</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/gaia_CLI_upgrades"/>
				<updated>2017-04-30T19:56:33Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: /* R75.40 to R77.10 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
==R75.40 to R77.10==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;To upgrade using an ISO image on a DVD:&lt;br /&gt;
&amp;lt;br&amp;gt;Note - This procedure is not supported on IP Appliances.&lt;br /&gt;
&amp;lt;br&amp;gt;1. Download the Gaia ISO image from the Check Point Support Center&lt;br /&gt;
&amp;lt;br&amp;gt;http://supportcontent.checkpoint.com/solutions?id=sk92965.&lt;br /&gt;
&amp;lt;br&amp;gt;Check_Point_Install_and_Upgrade_R77.Gaia.iso&lt;br /&gt;
&amp;lt;br&amp;gt;2. Mount the iso image to the device to be upgraded.  This can be done via physical drive, or virtually attaching the iso.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;3. From clish, run: upgrade cd&lt;br /&gt;
&lt;br /&gt;
==troubleshooting==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=== error: mount failed ===&lt;br /&gt;
&lt;br /&gt;
 chkpmgr&amp;gt; upgrade cd&lt;br /&gt;
 UPGRADE:  mount failed: Device or resource busy&lt;br /&gt;
&lt;br /&gt;
in this scenario, i had manually mounted the /dev/cdrom to /mnt/cdrom.  this is not needed and even causes the upgrade command to fail. I solve it by unmounting the cdrom.&lt;br /&gt;
 # umount /dev/cdrom&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/gaia_-_adding_an_alias_interface</id>
		<title>gaia - adding an alias interface</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/gaia_-_adding_an_alias_interface"/>
				<updated>2017-04-30T02:41:03Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
at the clish prompt&lt;br /&gt;
 mygw&amp;gt; add interface eth0 alias 192.168.1.10/24&lt;br /&gt;
&lt;br /&gt;
the alias created will look like...&lt;br /&gt;
&lt;br /&gt;
 eth0:1      Link encap:Ethernet  HWaddr 82:3E:FC:AF:B5:80  &lt;br /&gt;
            inet addr:192.168.1.10  Bcast:192.168.1.255  Mask:255.255.255.0&lt;br /&gt;
            UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1&lt;br /&gt;
            Interrupt:185 Base address:0xa000&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/smart_reporter</id>
		<title>smart reporter</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/smart_reporter"/>
				<updated>2017-04-30T01:55:58Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: /* tables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==databases and versions==&lt;br /&gt;
&lt;br /&gt;
SmartReporter Database Management&lt;br /&gt;
This release can use one of these SQL databases:&lt;br /&gt;
&lt;br /&gt;
• MySQL - When you upgrade from R75.40 or earlier to R77, SmartReporter continues to use the legacy&lt;br /&gt;
• MySQL database. In some cases, upgrading from R75.20 or R75.40 can also use MySQL.&lt;br /&gt;
&lt;br /&gt;
PostgreSQL - All new installations of SmartReporter, from R75.40VS and higher, use the PostgreSQL&lt;br /&gt;
database.&lt;br /&gt;
You do database management operations in these ways:&lt;br /&gt;
&lt;br /&gt;
• With the SmartReporter Database Maintenance view&lt;br /&gt;
• With CLI commands. MySQL and PostgreSQL have different commands and procedures&lt;br /&gt;
• Changing SmartReporter configuration files&lt;br /&gt;
&lt;br /&gt;
'''To see which SQL database is installed, run:'''&lt;br /&gt;
 grep DefaultDatabase $CPDIR/registry/HKLM_registry.data&lt;br /&gt;
&lt;br /&gt;
If the command returns the string PostgreSQL, the database is PostgreSQL. If the command returns&lt;br /&gt;
another result, the database is MySQL.&lt;br /&gt;
&lt;br /&gt;
==mysql database==&lt;br /&gt;
&lt;br /&gt;
username for mysql connections: RMSERVER&lt;br /&gt;
password can me set in smartreporter gui under management &amp;gt; database maintenance &amp;gt; change database password&lt;br /&gt;
&lt;br /&gt;
mysql binary location: $RTDIR/Database/bin/mysql&lt;br /&gt;
socket file: use as defined in $RTDIR/Database/conf/my.cnf&lt;br /&gt;
&lt;br /&gt;
example command to connect to local database&lt;br /&gt;
 $RTDIR/Database/bin/mysql -u RMSERVER -h localhost -p --socket=/opt/CPrt-R75.40/Database/mysql.sock&lt;br /&gt;
&lt;br /&gt;
==postgresql==&lt;br /&gt;
connecting to postgresql database&lt;br /&gt;
 $CPDIR/database/postgresql/bin/psql -U cp_postgres -p 18272 rt_database&lt;br /&gt;
&lt;br /&gt;
==logging and session status==&lt;br /&gt;
log consolidation session log: $RTDIR/log_consolidator_engine/log/&amp;lt;Session_ID&amp;gt;/lc_rt.log &lt;br /&gt;
&lt;br /&gt;
example of successful log consolidation entry...&lt;br /&gt;
&lt;br /&gt;
 Last processed file: 2017-03-01_235900.log&lt;br /&gt;
        &amp;lt;br&amp;gt;The Engine has finished scanning the requested log files.&lt;br /&gt;
&lt;br /&gt;
==service stop and start==&lt;br /&gt;
&lt;br /&gt;
rmdstop -server to stop&lt;br /&gt;
&lt;br /&gt;
==tables==&lt;br /&gt;
&lt;br /&gt;
== fwaction ==&lt;br /&gt;
&lt;br /&gt;
 fw_action_code |  fw_action_name  &lt;br /&gt;
 &amp;lt;br&amp;gt;            -1 | &lt;br /&gt;
              0 | consolidated&lt;br /&gt;
              1 | encrypt&lt;br /&gt;
              2 | approved&lt;br /&gt;
              3 | accept&lt;br /&gt;
              4 | blocked&lt;br /&gt;
              5 | drop&lt;br /&gt;
              6 | reject&lt;br /&gt;
... and more...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[category:loggin]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/RHEL_6.5_install</id>
		<title>RHEL 6.5 install</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/RHEL_6.5_install"/>
				<updated>2017-04-29T16:04:15Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==installing prereqs==&lt;br /&gt;
&lt;br /&gt;
[https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98760 Prerequisites for installing Security Management Server / Multi-Domain Security Management Server on Red Hat Enterprise Linux]&lt;br /&gt;
&lt;br /&gt;
==using centos yum repo==&lt;br /&gt;
&lt;br /&gt;
replace /etc/yum.repos.d/rhel-source.repo contents with the following&lt;br /&gt;
&lt;br /&gt;
[[centos 6.5 repo]]&lt;br /&gt;
&lt;br /&gt;
vault access to older/deprecated centos repos - [http://vault.centos.org/6.5/os/x86_64/ vault.centos.org 64bit centos]&lt;br /&gt;
&lt;br /&gt;
run to import vault key&lt;br /&gt;
 # rpm --import http://vault.centos.org/6.5/os/x86_64/RPM-GPG-KEY-CentOS-6&lt;br /&gt;
&lt;br /&gt;
==installing check point==&lt;br /&gt;
&lt;br /&gt;
which package to install from the support site?&lt;br /&gt;
&lt;br /&gt;
the iso to download will usually say &amp;quot;install&amp;quot; and &amp;quot;open_server&amp;quot;&lt;br /&gt;
&lt;br /&gt;
for example...&lt;br /&gt;
&lt;br /&gt;
Check_Point_R77.30_T207_Install_and_Upgrade.SPLAT_Open_Server.iso&lt;br /&gt;
&lt;br /&gt;
==troubleshooting==&lt;br /&gt;
===libz.so.1 error===&lt;br /&gt;
&lt;br /&gt;
errors occur during configuration on install or when cpconfig is run&lt;br /&gt;
&lt;br /&gt;
'''error message:'''&lt;br /&gt;
 Do you want to add an administrator (y/n) [y] ? &lt;br /&gt;
 /opt/CPsuite-R77/fw1/bin/fwm: error while loading shared libraries: libz.so.1: cannot open shared object file: No such file or directory&lt;br /&gt;
&lt;br /&gt;
'''cause'''&lt;br /&gt;
&lt;br /&gt;
 # yum list zlib&lt;br /&gt;
 Installed Packages&lt;br /&gt;
 zlib.x86_64            1.2.3-29.el6             @anaconda-RedHatEnterpriseLinux-201311111358.x86_64/6.5&lt;br /&gt;
 Available Packages&lt;br /&gt;
 zlib.i686              1.2.3-29.el6             CentOS6base &lt;br /&gt;
&lt;br /&gt;
'''solution'''&lt;br /&gt;
install 32bit libz&lt;br /&gt;
&lt;br /&gt;
 # yum install zlib.i686&lt;br /&gt;
&lt;br /&gt;
===bad ELF interpreter===&lt;br /&gt;
&lt;br /&gt;
'''error message'''&lt;br /&gt;
 # ./UnixInstallScript: ./UnixInstallScript: /lib/ld-linux.so.2: bad ELF interpreter: No such file or directory&lt;br /&gt;
'''solution''' &lt;br /&gt;
install missing glibc&lt;br /&gt;
 # yum install glibc.i686&lt;br /&gt;
&lt;br /&gt;
=== libpam.so.0 ===&lt;br /&gt;
&lt;br /&gt;
'''error:''' ./UnixInstallScript: error while loading shared libraries: libpam.so.0: cannot open shared object file: No such file or directory&lt;br /&gt;
&lt;br /&gt;
'''solution:''' install 32-bit pam.  you will likely need to update the 64-bit to match to avoid Multilib version errors. The following command will do this.&lt;br /&gt;
 # yum install pam.x86_64 pam.i686&lt;br /&gt;
&lt;br /&gt;
==links==&lt;br /&gt;
&lt;br /&gt;
[http://it.tuxie.eu/?p=404 RHEL 6.5 x64 with CentOS 6.5 repositories]&lt;br /&gt;
&lt;br /&gt;
[[category:rhel]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/cpuse_agent</id>
		<title>cpuse agent</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/cpuse_agent"/>
				<updated>2017-04-25T15:15:08Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==checking current version==&lt;br /&gt;
 # clish -c &amp;quot;show installer status build&amp;quot;&lt;br /&gt;
 Build number: 2084 (agent build is up to date)&lt;br /&gt;
&lt;br /&gt;
==downloading the latest cpuse deployment agent==&lt;br /&gt;
&lt;br /&gt;
a download link to the latest cpuse is found in [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92449&amp;amp;partition=General&amp;amp;product=All%22 sk92449] on the user center&lt;br /&gt;
&lt;br /&gt;
==check currently installed version==&lt;br /&gt;
&lt;br /&gt;
cpvinfo $DADIR/bin/DAService | grep Build&lt;br /&gt;
&lt;br /&gt;
==how do perform and offline upgrades==&lt;br /&gt;
&lt;br /&gt;
# download the latest cpuse&lt;br /&gt;
# uninstall cpuse&lt;br /&gt;
 [Expert@chkpmds1:0]# '''rpm -e CPda-00-00'''&lt;br /&gt;
 /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE&lt;br /&gt;
 cpwd_admin: &lt;br /&gt;
 successful Del operation&lt;br /&gt;
&lt;br /&gt;
# install new cpuse&lt;br /&gt;
&lt;br /&gt;
 Expert@chkpmds1:0]# '''rpm -ivh ./CPda-00-00.i386.rpm''' &lt;br /&gt;
 Preparing...                ########################################### [100%]&lt;br /&gt;
 cpwd_admin: &lt;br /&gt;
 Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts &lt;br /&gt;
  Trying to stop DAService for 60 seconds - please wait...&lt;br /&gt;
 Error: DAService is not running.&lt;br /&gt;
 &amp;lt;br&amp;gt;Waiting for DAService to stop...&lt;br /&gt;
 Error: DAService is not running.&lt;br /&gt;
&lt;br /&gt;
*** note: it is typical to see the above message many times&lt;br /&gt;
&lt;br /&gt;
== restarting clishd==&lt;br /&gt;
&lt;br /&gt;
To Stop	[Expert@HostName]# '''tellpm process:clishd'''&lt;br /&gt;
&amp;lt;br&amp;gt;To Start [Expert@HostName]# '''tellpm process:clishd t'''&lt;br /&gt;
&lt;br /&gt;
start agent&lt;br /&gt;
&lt;br /&gt;
 # clish -c &amp;quot;installer agent start&amp;quot;&lt;br /&gt;
&lt;br /&gt;
upgrade should be completed.&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php/hit_counter</id>
		<title>hit counter</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php/hit_counter"/>
				<updated>2017-04-16T21:30:44Z</updated>
		
		<summary type="html">&lt;p&gt;Nighthawk: /* example queries R80+ */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==example queries R80+==&lt;br /&gt;
&lt;br /&gt;
the database was moved from the sqlite file to postgres&lt;br /&gt;
&lt;br /&gt;
*** note **** case matters for the UID! all characters must be upper case it seems...&lt;br /&gt;
&lt;br /&gt;
show  all hit count data for a specific rule uid&lt;br /&gt;
 # '''psql_client monitoring postgres -c &amp;quot;select hits,end_date from hitcount where rule_uid = '{0C8C26F9-7A52-4160-BB96-73AECEF13758}' limit 5&amp;quot;'''&lt;br /&gt;
 hits |      end_date       &lt;br /&gt;
 ------+---------------------&lt;br /&gt;
    4 | 2017-06-30 22:01:08&lt;br /&gt;
   16 | 2017-07-01 22:01:06&lt;br /&gt;
   16 | 2017-07-02 22:01:05&lt;br /&gt;
   16 | 2017-07-03 22:01:03&lt;br /&gt;
   16 | 2017-07-04 22:01:02&lt;br /&gt;
&lt;br /&gt;
show &lt;br /&gt;
 # '''mgmt_cli show access-rulebase name &amp;quot;Network&amp;quot; -s id.txt package &amp;quot;Standard&amp;quot; show-hits true --format json | jq '.rulebase[] | {rule_number: .&amp;quot;rule-number&amp;quot;,uid: .uid,hits: .hits.value}''''&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;rule_number&amp;quot;: 1,&lt;br /&gt;
  &amp;quot;uid&amp;quot;: &amp;quot;1de8fab0-4858-4067-977d-1cbb5cd2e55d&amp;quot;,&lt;br /&gt;
  &amp;quot;hits&amp;quot;: 0&lt;br /&gt;
  &amp;lt;br&amp;gt;&lt;br /&gt;
  &amp;quot;rule_number&amp;quot;: 2,&lt;br /&gt;
  &amp;quot;uid&amp;quot;: &amp;quot;bbbfd8e6-72b6-4ff0-82ca-a9b0a6151d07&amp;quot;,&lt;br /&gt;
  &amp;quot;hits&amp;quot;: 19&lt;br /&gt;
  &amp;lt;br&amp;gt;&lt;br /&gt;
  &amp;quot;rule_number&amp;quot;: 3,&lt;br /&gt;
  &amp;quot;uid&amp;quot;: &amp;quot;bc69f34d-7ee8-47fe-a225-11b8e27e9a44&amp;quot;,&lt;br /&gt;
  &amp;quot;hits&amp;quot;: 16617&lt;br /&gt;
  &amp;lt;br&amp;gt;&lt;br /&gt;
  &amp;quot;rule_number&amp;quot;: 4,&lt;br /&gt;
  &amp;quot;uid&amp;quot;: &amp;quot;26373728-50df-49c3-b8d0-8895e350bc9f&amp;quot;,&lt;br /&gt;
  &amp;quot;hits&amp;quot;: 1187628&lt;br /&gt;
&lt;br /&gt;
==example queries R75.30==&lt;br /&gt;
 sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, &amp;quot;unixepoch&amp;quot;) as time, datetime(end_date, &amp;quot;unixepoch&amp;quot;) as time, netobj_name, rule_uid, hits from HitCountRules where rule_uid=&amp;quot;{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}&amp;quot;'&lt;br /&gt;
&lt;br /&gt;
 sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, &amp;quot;unixepoch&amp;quot;) as time, datetime(end_date, &amp;quot;unixepoch&amp;quot;) as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name=&amp;quot;myfirewall&amp;quot;'&lt;br /&gt;
&lt;br /&gt;
hits per day for a firewall, within day range&lt;br /&gt;
&lt;br /&gt;
  sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select date(start_date, &amp;quot;unixepoch&amp;quot;) as day, SUM(hits) AS hits_total from HitCountRules where netobj_name=&amp;quot;&amp;lt;my_firewall&amp;gt;&amp;quot; AND day between &amp;quot;2017-07-25&amp;quot; and &amp;quot;2017-09-14&amp;quot; GROUP by day'&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
keywords: hit count, hitcount&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	</feed>