?
Solved

Looking for way to export NAT Table from Checkpoint R65 from the CLI

Posted on 2013-05-29
3
Medium Priority
?
2,389 Views
Last Modified: 2013-05-31
Hi Team,
   We are using Checkpoint R65 extensively in our environment.  We want a way to be able to run a script that logs in to individual gateways/CMAs and export the NAT tables in csv format.  Is there a common (or even hidden) command to do this from the command line?

Thanks very much.
0
Comment
Question by:rleyba828
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 37

Assisted Solution

by:ArneLovius
ArneLovius earned 750 total points
ID: 39206364
I don;t believe that rancid, my usual tool of choice for storing configs is capable of working with Checkpoint devices unless they are configured to save their config out as a text file.

you might take a look at a commercial product http://www.algosec.com/en/products/firewall_analyzer
0
 
LVL 64

Accepted Solution

by:
btan earned 750 total points
ID: 39206787
Looks like it will have to do with the 'fwx_alloc' table then...

there are some related link on some script but yet to see if fitting - probably to fw tab -t fwx_alloc with other option and grep the necessary field as txt and parse as csv...
 
http://nvkirank.blogspot.sg/2013/03/v-behaviorurldefaultvmlo.html#!/2013/03/v-behaviorurldefaultvmlo.html
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk32224&js_peid=P-114a7ba5fd7-10001&partition=General&product=Security
0
 

Author Comment

by:rleyba828
ID: 39212305
Hi Team,   looked at both solutions above and first, we are constrained from buying additional 3rd party products and then for 'fwx_alloc above, I played and researched every possible variation of the command and it doesn't show anything about NAT, looks like its really a limitation of checkpoint.

thanks for all your help.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question