Hello there,
This is my first posting to this list, so please excuse any mistakes I
may be making.
Playing around with a Nokia 440 Appliance machine on our testnet I found
that if I executed the following command from a machine with FW-1
access, the management station, for example, the following happens:
bobby:~$ snmpwalk -p 260 -v 1 nokia.cisnet public
system.sysDescr.0 = i386 FreeBSD 2.1.5. Check Point FireWall-1 Version
4.0
system.sysObjectID.0 = OID: enterprises.2620.1.1
Timeout: No Response from nokia.cisnet
bobby:~$
The snmpd running on the nokia dies with absolutely nothing in the logs
anywhere on the system.
I did manage to find a work-around for it, I symlinked the snmpd in the
/opt/FireWall-1-des.v4.1.SP-1/binto the one in /bin.
Here are some other tidbits of info about this system:
Packages installed: Check Point FireWall-1 (DES) v4.1 SP-1 (Thu May 4
17:39:13 PDT 2000 bld 11.1):
uname -a: IPSO nokia 3.2.1-fcs1 releng 849 11.24.1999-102644 i386
nokia[admin]# ifconfig -a
loop0c0: flags=57<UP,PHYS_AVAIL,LINK_AVAIL,LOOPBACK,MULTICAST>
inet mtu 63000 127.0.0.1 --> 127.0.0.1
phys loop0 flags=10b<UP,LINK,LOOPBACK,PRESENT>
tun0: flags=107<UP,LINK,POINTOPOINT,PRESENT>
eth-s1p1c0: lname eth-s1p1c0
flags=e7<UP,PHYS_AVAIL,LINK_AVAIL,BROADCAST,MULTICAST>
inet mtu 1500 10.17.130.67/24 broadcast 10.17.130.255
phys eth-s1p1 flags=133<UP,LINK,BROADCAST,MULTICAST,PRESENT>
ether 0:0:f8:7:fb:84 speed 10M half duplex
eth-s2p1c0: lname eth-s2p1c0 flags=e4<UP,BROADCAST,MULTICAST>
inet mtu 1500 192.168.1.1/24 broadcast 192.168.1.255
phys eth-s2p1 flags=132<UP,BROADCAST,MULTICAST,PRESENT>
ether 0:0:f8:7:fc:4 speed 10M half duplex
eth-s3p1c0: lname eth-s3p1c0 flags=e4<UP,BROADCAST,MULTICAST>
inet mtu 1500 192.168.2.1/24 broadcast 192.168.2.255
phys eth-s3p1 flags=132<UP,BROADCAST,MULTICAST,PRESENT>
ether 0:0:f8:7:fc:e1 speed 10M half duplex
ser-s4p1: flags=126<UP,POINTOPOINT,MULTICAST,PRESENT> encaps none
ser-s4p2: flags=126<UP,POINTOPOINT,MULTICAST,PRESENT> encaps none
Anyways, that's about all I know, I am not an expert at FW-1 and I am
not sure how to further investigate this, so any help would be
appreciated.
Thanks,
Xander Soldaat
--
eval "perl -e 'printf(\"%s\", pack \"H*\",
\"436f6d706574612049542042560\
9097c0958616e64657240436f6d706574612e636f6d0a0909097c0958616e64657240536\
f6c646161742e636f6d0a74656c3a2030362d323239392035393330097c0958616e64657\
25340696e65742e6b706e2e636f6d0a\")'"
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================