getting Checkpoint VPN SSL Network Extender working in the command lineHow to connect to CheckPoint VPN on Ubuntu 18.04LTS?Will the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayVPN SSL Network Extender in FirefoxLinux Checkpoint SNX tool configuration issuesCheck Point - Connect under Linux - snx + OTPSNX VPN Ububuntu 18.XXUsing Checkpoint VPN SSL Network Extender CLI with certificateVPN with network manager (nm-applet) is not workingWill the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayImport VPN config files to NetworkManager from command lineTrouble connecting to VPN using network-manager, while command line worksStart a VPN connection with PPTP protocol on command linestarting a docker service daemon breaks the vpn networkCan't connect to vpn with Network-managerVPN SSL Network Extender in FirefoxUsing Checkpoint VPN SSL Network Extender CLI with certificate

If human space travel is limited by the G force vulnerability, is there a way to counter G forces?

Did Shadowfax go to Valinor?

Do I have a twin with permutated remainders?

Blender 2.8 I can't see vertices, edges or faces in edit mode

1960's book about a plague that kills all white people

How can I make my BBEG immortal short of making them a Lich or Vampire?

Alternative to sending password over mail?

Is it inappropriate for a student to attend their mentor's dissertation defense?

Why is Collection not simply treated as Collection<?>

Took a trip to a parallel universe, need help deciphering

Assassin's bullet with mercury

Why is it a bad idea to hire a hitman to eliminate most corrupt politicians?

I Accidentally Deleted a Stock Terminal Theme

Is there a hemisphere-neutral way of specifying a season?

What about the virus in 12 Monkeys?

Why can't we play rap on piano?

Arrow those variables!

Today is the Center

Modeling an IP Address

How to show the equivalence between the regularized regression and their constraint formulas using KKT

How to say in German "enjoying home comforts"

What is the most common color to indicate the input-field is disabled?

What is going on with Captain Marvel's blood colour?

What killed these X2 caps?



getting Checkpoint VPN SSL Network Extender working in the command line


How to connect to CheckPoint VPN on Ubuntu 18.04LTS?Will the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayVPN SSL Network Extender in FirefoxLinux Checkpoint SNX tool configuration issuesCheck Point - Connect under Linux - snx + OTPSNX VPN Ububuntu 18.XXUsing Checkpoint VPN SSL Network Extender CLI with certificateVPN with network manager (nm-applet) is not workingWill the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayImport VPN config files to NetworkManager from command lineTrouble connecting to VPN using network-manager, while command line worksStart a VPN connection with PPTP protocol on command linestarting a docker service daemon breaks the vpn networkCan't connect to vpn with Network-managerVPN SSL Network Extender in FirefoxUsing Checkpoint VPN SSL Network Extender CLI with certificate






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;








4















The official Checkpoint out command line tool from CheckPoint, for setting up a SSL Network Extender VPN is not longer working from the Linux command line. It is also no longer actively supported by CheckPoint.



However, there is a promising project, that tries to replicate the Java applet for authentication, that talks with the snx command line utility, called snxconnect.



I was trying to put snxconnect text utility to work in Debian Buster, doing:



sudo pip install snxvpn


and



export PYTHONHTTPSVERIFY=0
snxconnect -H checkpoint.hostname -U USER


However, it was mostly dying either with an HTTP error of:



HTTP/1.1 301 Moved Permanently:


or:



Got HTTP response: HTTP/1.1 302 Found


or:



Unexpected response, try again.


What to do about it?



PS. The EndPoint Security VPN official client is working well both in a Mac High Sierra and Windows 10 Pro.










share|improve this question






























    4















    The official Checkpoint out command line tool from CheckPoint, for setting up a SSL Network Extender VPN is not longer working from the Linux command line. It is also no longer actively supported by CheckPoint.



    However, there is a promising project, that tries to replicate the Java applet for authentication, that talks with the snx command line utility, called snxconnect.



    I was trying to put snxconnect text utility to work in Debian Buster, doing:



    sudo pip install snxvpn


    and



    export PYTHONHTTPSVERIFY=0
    snxconnect -H checkpoint.hostname -U USER


    However, it was mostly dying either with an HTTP error of:



    HTTP/1.1 301 Moved Permanently:


    or:



    Got HTTP response: HTTP/1.1 302 Found


    or:



    Unexpected response, try again.


    What to do about it?



    PS. The EndPoint Security VPN official client is working well both in a Mac High Sierra and Windows 10 Pro.










    share|improve this question


























      4












      4








      4


      4






      The official Checkpoint out command line tool from CheckPoint, for setting up a SSL Network Extender VPN is not longer working from the Linux command line. It is also no longer actively supported by CheckPoint.



      However, there is a promising project, that tries to replicate the Java applet for authentication, that talks with the snx command line utility, called snxconnect.



      I was trying to put snxconnect text utility to work in Debian Buster, doing:



      sudo pip install snxvpn


      and



      export PYTHONHTTPSVERIFY=0
      snxconnect -H checkpoint.hostname -U USER


      However, it was mostly dying either with an HTTP error of:



      HTTP/1.1 301 Moved Permanently:


      or:



      Got HTTP response: HTTP/1.1 302 Found


      or:



      Unexpected response, try again.


      What to do about it?



      PS. The EndPoint Security VPN official client is working well both in a Mac High Sierra and Windows 10 Pro.










      share|improve this question
















      The official Checkpoint out command line tool from CheckPoint, for setting up a SSL Network Extender VPN is not longer working from the Linux command line. It is also no longer actively supported by CheckPoint.



      However, there is a promising project, that tries to replicate the Java applet for authentication, that talks with the snx command line utility, called snxconnect.



      I was trying to put snxconnect text utility to work in Debian Buster, doing:



      sudo pip install snxvpn


      and



      export PYTHONHTTPSVERIFY=0
      snxconnect -H checkpoint.hostname -U USER


      However, it was mostly dying either with an HTTP error of:



      HTTP/1.1 301 Moved Permanently:


      or:



      Got HTTP response: HTTP/1.1 302 Found


      or:



      Unexpected response, try again.


      What to do about it?



      PS. The EndPoint Security VPN official client is working well both in a Mac High Sierra and Windows 10 Pro.







      debian vpn checkpoint






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Oct 30 '18 at 5:21







      Rui F Ribeiro

















      asked Jun 16 '18 at 23:33









      Rui F RibeiroRui F Ribeiro

      41.9k1483142




      41.9k1483142




















          2 Answers
          2






          active

          oldest

          votes


















          11














          SNX build 800007075 from 2012, used to support VPN in command line. So I tested it, and lo and behold, it still works with the latest distributions and kernel(s) 4.x.



          So ultimately, the my other answer in this thread holds true if you cannot get hold of SNX build 800007075 or if that specific version of SNX stops working with the current Linux versions (it might happen in a near future) or if you need OTP support.



          Presently the solution is then installing this specific last version of SNX that still supports doing the VPN from the command line.



          1) So to install snx build 800007075 I do:



          wget https://starkers.keybase.pub/snx_install_linux30.sh?dl=1 -O snx_install.sh


          For Debian, you might need:



          sudo dpkg --add-architecture i386
          sudo apt-get update


          I had to install the following:



          sudo apt-get install libstdc++5:i386 libx11-6:i386 libpam0g:i386


          Run then:



          chmod a+rx snx_install.sh
          sudo ./snx_install.sh`


          You will have know a /usr/bin/snx 32-bit client binary executable. Check if any dynamic libraries are missing with:



          sudo ldd /usr/bin/snx


          You can only proceed to the following point when all the dependencies are satisfied.



          You might need to run manually first snx -s CheckpointURLFQDN -u USER before scripting any automatic use, for the signature VPN be saved at /etc/snx/USER.db.



          2) Before using it, you create a ~/.snxrc file with the following contents:



          server IP_address_of_your_VPN
          username YOUR_USER
          reauth yes


          3) For connecting, type snx



          $ snx
          Check Point's Linux SNX
          build 800007075
          Please enter your password:

          SNX - connected.

          Session parameters:
          ===================
          Office Mode IP : 10.x.x.x
          DNS Server : 10.x.x.x
          Secondary DNS Server: 10.x.x.x
          DNS Suffix : xxx.xx, xxx.xx
          Timeout : 24 hours


          If you understand the security risks of hard coding a VPN password in a script, you also can use it as:



          echo 'Password' | snx


          5) For closing/disconnecting the VPN, while you may stop/kill snxconnect, the better and official way is issuing the command:



          $snx -d
          SNX - Disconnecting...
          done.


          see also Linux Checkpoint SNX tool configuration issues for some clarifications about which snx version to use.



          6) If automating the login and accepting a new signature (and understanding the security implications), I wrote an expect script, which I called snx_login.exp:



          #!/usr/bin/expect
          spawn /usr/bin/snx

          set password [lindex $argv 0]

          expect "*?assword:*"
          send -- "$passwordr"

          expect
          "o:"
          send "yr"
          exp_continue

          eof



          PS. Beware snx does not support OTP alone, you will have to use the snxconnect script present on the other answer if using it.



          PPS @gibies called to my attention that using an etoken, the password field gets the password from the etoken and not a fixed password.






          share|improve this answer

























          • This works in arch linux using snx from aur repository.

            – Met
            Nov 10 '18 at 16:19











          • @Met indeed, find it much later on...see the last link in this answer. Nevertheless, not sure about the legality of that AUR giving us a much older and unsupported 32 bits 2012 version of Checkpoint's snx utility, even if downloading it from a 3rd party site. I am using the same version in the accepted answer, the other is an alternative method.

            – Rui F Ribeiro
            Nov 10 '18 at 17:57











          • I'm trying to connect using a certificate rather than a username, and receive this error: SNX: Virtual Network Adapter initialization and configuration failed. Try to reconnect. Any thoughts?

            – Ashwin Balamohan
            Dec 3 '18 at 16:48






          • 1





            Thanks @RuiFRibeiro. I've posted the new question here: unix.stackexchange.com/questions/485800/… Any thoughts would be wonderful.

            – Ashwin Balamohan
            Dec 4 '18 at 1:42






          • 1





            Very good detailed description. It works fine on my Ubuntu laptop.

            – gibies
            Dec 26 '18 at 11:51



















          4














          When working to install the Firefox official SSL VPN Extender interface in the question VPN SSL Network Extender in Firefox, I found out and solved some more pieces of the puzzle of this question.



          Apparently, whilst command line usage of snx from checkpoint has been discontinued, the web based client as described in the linked post still works. However, there is a python command line cliente that tries to replicate the Web+Java interface on top of the snx client, and this post is about setting it up to work.



          Firstly, the snxvp installed from python pip does not work. There is an updated patched version on https://github.com/agnis-mateuss/snxvpn, that has some useful patches, including an option for ignoring unsigned and/or expired certificates, and more interestingly, being python2 and python3 compatible.



          Furthermore, all the URLs on snxconnect.py have to be changed from sslvpn/ to ``.





          So the step-by-step instructions are roughly:



          1) Firstly installing the snx setup:



          If in the VPN, to get the installation file, do:



          wget --no-check-certificate https://VPN_FW_HOSTNAME/SNX/INSTALL/snx_install.sh 


          Otherwise you will have to get it from the web interface as describe in the linked answer.



          For Debian, you might need:



          sudo dpkg --add-architecture i386
          sudo apt-get update


          I had to install the following:



          sudo apt-get install libstdc++5:i386 libx11-6:i386 libpam0g:i386


          Run then:



          chmod a+rx snx_install.sh
          sudo ./snx_install.sh`


          You will have know a /usr/bin/snx 32-bit client binary executable. Check if any dynamic libraries are missing with:



          sudo ldd /usr/bin/snx


          You can only proceed to the following point when all the dependencies are satisfied.



          Not sure if you need to run first snx -s CheckpointURLFQDN -u USER before using snxconnect, for the signature VPN be saved at /etc/snx/USER.db.



          2) Now we have the snxconnect python utility. Such program tries to emulate the web interface, and more interestingly, it does not need Java to authenticate.



          So to install the to setup snxconnect, do as root:



          apt-get -y install git make libxml2-dev libxslt1-dev zlib1g-dev python-pip
          pip install pytz
          git clone https://github.com/agnis-mateuss/snxvpn
          git clone git://git.code.sf.net/p/sfreleasetools/code releasetools
          cd snxvpn

          Now, as for taking out the /sslvpn URL, some Checkpoint appliances need it, some do not. I am not still aware of why the difference. I need it, @WileyMarques does not.

          sed -i "s/sslvpn///g" snxconnect.py


          . then do as root, for python3: (recommended)



          apt-get install python3-docutils python3-pip python3-libxml2 python3-dev python3-crypto python3-bs4
          make
          python3 setup.py install --prefix=/usr/local


          . or instead, do as root, for python2:



          apt-get install python-docutils python-libxml2 python-lxml python-dev python-bs4 python-beautifulsoup
          sed -i "s/distutils.core/setuptools/g" setup.py
          make
          python setup.py install --prefix=/usr/local


          3) After installing it, you can run as a non-privileged user:



          /usr/local/bin/snxconnect -H CheckpointURLFQDN -U USER --skip-cert --save-cookies


          If all went ok, it will ask for the password, and then say:



          SNX connected, to leave VPN open, leave this running!


          If you are having problems getting this message, and are instead getting several times in a row, the message: "Unexpected response, try again.", do the Firefox method, and Disconnect and logout properly, waiting a couple of minutes before trying the snxconnect command again.



          4) The cookie(s) file will be created at ~/.snxcookies, after a successful usage.



          After the VPN being established, you can check with ip address or ifconfig you have now a tunsnx interface:



          $ ip addr show dev tunsnx
          14: tunsnx: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100
          link/none
          inet 10.x.x.x peer 10.x.x.x/32 scope global tunsnx
          valid_lft forever preferred_lft forever
          inet6 fe80::acfe:8fce:99a4:44b7/64 scope link stable-privacy
          valid_lft forever preferred_lft forever


          ip route will show you also new routes going through the tunsnx interface.



          5) For closing/disconnecting the VPN, while you may stop/kill snxconnect, the better and official way is issuing the command:



          $snx -d
          SNX - Disconnecting...
          done.




          In addition, I also found out:




          • snxconnect seems to behave better when disconnecting the previous VPN connection and logging out in the official web interface if there is some strange problem (have to try doing snx -d to see if it produces the same result);

          • PYTHONHTTPSVERIFY=0 only affects the python2 version;

          • if the web interface is doing an HTML redirect to a secondary CheckPoint location, pointing directly to that redirected hostname, holds better results;

          • if the certificates of the firewalls are self-signed (they often are) the --skip-cert option has to be used, or authentication will fail;

          • for not having so many problems re-authenticating, had to use --save-cookies to use authentication cookies, while the user is logged in in the remote VPN point (it has a timeout of x hours);

          • as described in the last question, for the script to work, the option "When signing-in launch SSL Network Extender" has to be changed to "automatically";

          • 7776/TCP in localhost has to be free, for snx to own it, as snxconnect talks with snx using it;

          • the hostname passed to snxconnect/snx is handled as a virtual host, and as such you cannot use directly the IP address;

          • instaling a 32-bit architecture seems to be a requirement to run the snx_install.sh script;

          • you might choose to run as python2 as a trade-off for less space, however as python2 is being phased out, snxconnect in a near future might not support it;

          • from using the web client interface, it is clear I need to patch/delete all /sslvpn strings , as my URLs do not start with /sslvpn. I would check your particular case. I have absolutely no idea whether the presence of that string in the code is due to an old version, would love some feedback;

          • in snxconnect the CheckPoint hostname has to be the exact name the webinterface is showing you once authenticated in there, as it is a web virtual host. Otherwise, you won´t succeed on establishing the VPN;

          • The first time snx is used, a file with the signature of the VPN/Checkpoint server will be created at /etc/snx/USER.db;

          • If you need to use OTP from the command line, you have to use snxconnect as snx alone does not support it.





          share|improve this answer

























          • Regarding the removal of '/sslvpn' strings. The server I connect to has it on the URL, so I didn't that step. Interesting to point this on the answer, since it may happen to other people.

            – Wiley Marques
            Nov 11 '18 at 14:29











          • @WileyMarques Thanks for the feedback, I already suspected it would be different for some, also because in the github/pip version the URL is there.

            – Rui F Ribeiro
            Nov 11 '18 at 15:29











          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "106"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f450229%2fgetting-checkpoint-vpn-ssl-network-extender-working-in-the-command-line%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          2 Answers
          2






          active

          oldest

          votes








          2 Answers
          2






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          11














          SNX build 800007075 from 2012, used to support VPN in command line. So I tested it, and lo and behold, it still works with the latest distributions and kernel(s) 4.x.



          So ultimately, the my other answer in this thread holds true if you cannot get hold of SNX build 800007075 or if that specific version of SNX stops working with the current Linux versions (it might happen in a near future) or if you need OTP support.



          Presently the solution is then installing this specific last version of SNX that still supports doing the VPN from the command line.



          1) So to install snx build 800007075 I do:



          wget https://starkers.keybase.pub/snx_install_linux30.sh?dl=1 -O snx_install.sh


          For Debian, you might need:



          sudo dpkg --add-architecture i386
          sudo apt-get update


          I had to install the following:



          sudo apt-get install libstdc++5:i386 libx11-6:i386 libpam0g:i386


          Run then:



          chmod a+rx snx_install.sh
          sudo ./snx_install.sh`


          You will have know a /usr/bin/snx 32-bit client binary executable. Check if any dynamic libraries are missing with:



          sudo ldd /usr/bin/snx


          You can only proceed to the following point when all the dependencies are satisfied.



          You might need to run manually first snx -s CheckpointURLFQDN -u USER before scripting any automatic use, for the signature VPN be saved at /etc/snx/USER.db.



          2) Before using it, you create a ~/.snxrc file with the following contents:



          server IP_address_of_your_VPN
          username YOUR_USER
          reauth yes


          3) For connecting, type snx



          $ snx
          Check Point's Linux SNX
          build 800007075
          Please enter your password:

          SNX - connected.

          Session parameters:
          ===================
          Office Mode IP : 10.x.x.x
          DNS Server : 10.x.x.x
          Secondary DNS Server: 10.x.x.x
          DNS Suffix : xxx.xx, xxx.xx
          Timeout : 24 hours


          If you understand the security risks of hard coding a VPN password in a script, you also can use it as:



          echo 'Password' | snx


          5) For closing/disconnecting the VPN, while you may stop/kill snxconnect, the better and official way is issuing the command:



          $snx -d
          SNX - Disconnecting...
          done.


          see also Linux Checkpoint SNX tool configuration issues for some clarifications about which snx version to use.



          6) If automating the login and accepting a new signature (and understanding the security implications), I wrote an expect script, which I called snx_login.exp:



          #!/usr/bin/expect
          spawn /usr/bin/snx

          set password [lindex $argv 0]

          expect "*?assword:*"
          send -- "$passwordr"

          expect
          "o:"
          send "yr"
          exp_continue

          eof



          PS. Beware snx does not support OTP alone, you will have to use the snxconnect script present on the other answer if using it.



          PPS @gibies called to my attention that using an etoken, the password field gets the password from the etoken and not a fixed password.






          share|improve this answer

























          • This works in arch linux using snx from aur repository.

            – Met
            Nov 10 '18 at 16:19











          • @Met indeed, find it much later on...see the last link in this answer. Nevertheless, not sure about the legality of that AUR giving us a much older and unsupported 32 bits 2012 version of Checkpoint's snx utility, even if downloading it from a 3rd party site. I am using the same version in the accepted answer, the other is an alternative method.

            – Rui F Ribeiro
            Nov 10 '18 at 17:57











          • I'm trying to connect using a certificate rather than a username, and receive this error: SNX: Virtual Network Adapter initialization and configuration failed. Try to reconnect. Any thoughts?

            – Ashwin Balamohan
            Dec 3 '18 at 16:48






          • 1





            Thanks @RuiFRibeiro. I've posted the new question here: unix.stackexchange.com/questions/485800/… Any thoughts would be wonderful.

            – Ashwin Balamohan
            Dec 4 '18 at 1:42






          • 1





            Very good detailed description. It works fine on my Ubuntu laptop.

            – gibies
            Dec 26 '18 at 11:51
















          11














          SNX build 800007075 from 2012, used to support VPN in command line. So I tested it, and lo and behold, it still works with the latest distributions and kernel(s) 4.x.



          So ultimately, the my other answer in this thread holds true if you cannot get hold of SNX build 800007075 or if that specific version of SNX stops working with the current Linux versions (it might happen in a near future) or if you need OTP support.



          Presently the solution is then installing this specific last version of SNX that still supports doing the VPN from the command line.



          1) So to install snx build 800007075 I do:



          wget https://starkers.keybase.pub/snx_install_linux30.sh?dl=1 -O snx_install.sh


          For Debian, you might need:



          sudo dpkg --add-architecture i386
          sudo apt-get update


          I had to install the following:



          sudo apt-get install libstdc++5:i386 libx11-6:i386 libpam0g:i386


          Run then:



          chmod a+rx snx_install.sh
          sudo ./snx_install.sh`


          You will have know a /usr/bin/snx 32-bit client binary executable. Check if any dynamic libraries are missing with:



          sudo ldd /usr/bin/snx


          You can only proceed to the following point when all the dependencies are satisfied.



          You might need to run manually first snx -s CheckpointURLFQDN -u USER before scripting any automatic use, for the signature VPN be saved at /etc/snx/USER.db.



          2) Before using it, you create a ~/.snxrc file with the following contents:



          server IP_address_of_your_VPN
          username YOUR_USER
          reauth yes


          3) For connecting, type snx



          $ snx
          Check Point's Linux SNX
          build 800007075
          Please enter your password:

          SNX - connected.

          Session parameters:
          ===================
          Office Mode IP : 10.x.x.x
          DNS Server : 10.x.x.x
          Secondary DNS Server: 10.x.x.x
          DNS Suffix : xxx.xx, xxx.xx
          Timeout : 24 hours


          If you understand the security risks of hard coding a VPN password in a script, you also can use it as:



          echo 'Password' | snx


          5) For closing/disconnecting the VPN, while you may stop/kill snxconnect, the better and official way is issuing the command:



          $snx -d
          SNX - Disconnecting...
          done.


          see also Linux Checkpoint SNX tool configuration issues for some clarifications about which snx version to use.



          6) If automating the login and accepting a new signature (and understanding the security implications), I wrote an expect script, which I called snx_login.exp:



          #!/usr/bin/expect
          spawn /usr/bin/snx

          set password [lindex $argv 0]

          expect "*?assword:*"
          send -- "$passwordr"

          expect
          "o:"
          send "yr"
          exp_continue

          eof



          PS. Beware snx does not support OTP alone, you will have to use the snxconnect script present on the other answer if using it.



          PPS @gibies called to my attention that using an etoken, the password field gets the password from the etoken and not a fixed password.






          share|improve this answer

























          • This works in arch linux using snx from aur repository.

            – Met
            Nov 10 '18 at 16:19











          • @Met indeed, find it much later on...see the last link in this answer. Nevertheless, not sure about the legality of that AUR giving us a much older and unsupported 32 bits 2012 version of Checkpoint's snx utility, even if downloading it from a 3rd party site. I am using the same version in the accepted answer, the other is an alternative method.

            – Rui F Ribeiro
            Nov 10 '18 at 17:57











          • I'm trying to connect using a certificate rather than a username, and receive this error: SNX: Virtual Network Adapter initialization and configuration failed. Try to reconnect. Any thoughts?

            – Ashwin Balamohan
            Dec 3 '18 at 16:48






          • 1





            Thanks @RuiFRibeiro. I've posted the new question here: unix.stackexchange.com/questions/485800/… Any thoughts would be wonderful.

            – Ashwin Balamohan
            Dec 4 '18 at 1:42






          • 1





            Very good detailed description. It works fine on my Ubuntu laptop.

            – gibies
            Dec 26 '18 at 11:51














          11












          11








          11







          SNX build 800007075 from 2012, used to support VPN in command line. So I tested it, and lo and behold, it still works with the latest distributions and kernel(s) 4.x.



          So ultimately, the my other answer in this thread holds true if you cannot get hold of SNX build 800007075 or if that specific version of SNX stops working with the current Linux versions (it might happen in a near future) or if you need OTP support.



          Presently the solution is then installing this specific last version of SNX that still supports doing the VPN from the command line.



          1) So to install snx build 800007075 I do:



          wget https://starkers.keybase.pub/snx_install_linux30.sh?dl=1 -O snx_install.sh


          For Debian, you might need:



          sudo dpkg --add-architecture i386
          sudo apt-get update


          I had to install the following:



          sudo apt-get install libstdc++5:i386 libx11-6:i386 libpam0g:i386


          Run then:



          chmod a+rx snx_install.sh
          sudo ./snx_install.sh`


          You will have know a /usr/bin/snx 32-bit client binary executable. Check if any dynamic libraries are missing with:



          sudo ldd /usr/bin/snx


          You can only proceed to the following point when all the dependencies are satisfied.



          You might need to run manually first snx -s CheckpointURLFQDN -u USER before scripting any automatic use, for the signature VPN be saved at /etc/snx/USER.db.



          2) Before using it, you create a ~/.snxrc file with the following contents:



          server IP_address_of_your_VPN
          username YOUR_USER
          reauth yes


          3) For connecting, type snx



          $ snx
          Check Point's Linux SNX
          build 800007075
          Please enter your password:

          SNX - connected.

          Session parameters:
          ===================
          Office Mode IP : 10.x.x.x
          DNS Server : 10.x.x.x
          Secondary DNS Server: 10.x.x.x
          DNS Suffix : xxx.xx, xxx.xx
          Timeout : 24 hours


          If you understand the security risks of hard coding a VPN password in a script, you also can use it as:



          echo 'Password' | snx


          5) For closing/disconnecting the VPN, while you may stop/kill snxconnect, the better and official way is issuing the command:



          $snx -d
          SNX - Disconnecting...
          done.


          see also Linux Checkpoint SNX tool configuration issues for some clarifications about which snx version to use.



          6) If automating the login and accepting a new signature (and understanding the security implications), I wrote an expect script, which I called snx_login.exp:



          #!/usr/bin/expect
          spawn /usr/bin/snx

          set password [lindex $argv 0]

          expect "*?assword:*"
          send -- "$passwordr"

          expect
          "o:"
          send "yr"
          exp_continue

          eof



          PS. Beware snx does not support OTP alone, you will have to use the snxconnect script present on the other answer if using it.



          PPS @gibies called to my attention that using an etoken, the password field gets the password from the etoken and not a fixed password.






          share|improve this answer















          SNX build 800007075 from 2012, used to support VPN in command line. So I tested it, and lo and behold, it still works with the latest distributions and kernel(s) 4.x.



          So ultimately, the my other answer in this thread holds true if you cannot get hold of SNX build 800007075 or if that specific version of SNX stops working with the current Linux versions (it might happen in a near future) or if you need OTP support.



          Presently the solution is then installing this specific last version of SNX that still supports doing the VPN from the command line.



          1) So to install snx build 800007075 I do:



          wget https://starkers.keybase.pub/snx_install_linux30.sh?dl=1 -O snx_install.sh


          For Debian, you might need:



          sudo dpkg --add-architecture i386
          sudo apt-get update


          I had to install the following:



          sudo apt-get install libstdc++5:i386 libx11-6:i386 libpam0g:i386


          Run then:



          chmod a+rx snx_install.sh
          sudo ./snx_install.sh`


          You will have know a /usr/bin/snx 32-bit client binary executable. Check if any dynamic libraries are missing with:



          sudo ldd /usr/bin/snx


          You can only proceed to the following point when all the dependencies are satisfied.



          You might need to run manually first snx -s CheckpointURLFQDN -u USER before scripting any automatic use, for the signature VPN be saved at /etc/snx/USER.db.



          2) Before using it, you create a ~/.snxrc file with the following contents:



          server IP_address_of_your_VPN
          username YOUR_USER
          reauth yes


          3) For connecting, type snx



          $ snx
          Check Point's Linux SNX
          build 800007075
          Please enter your password:

          SNX - connected.

          Session parameters:
          ===================
          Office Mode IP : 10.x.x.x
          DNS Server : 10.x.x.x
          Secondary DNS Server: 10.x.x.x
          DNS Suffix : xxx.xx, xxx.xx
          Timeout : 24 hours


          If you understand the security risks of hard coding a VPN password in a script, you also can use it as:



          echo 'Password' | snx


          5) For closing/disconnecting the VPN, while you may stop/kill snxconnect, the better and official way is issuing the command:



          $snx -d
          SNX - Disconnecting...
          done.


          see also Linux Checkpoint SNX tool configuration issues for some clarifications about which snx version to use.



          6) If automating the login and accepting a new signature (and understanding the security implications), I wrote an expect script, which I called snx_login.exp:



          #!/usr/bin/expect
          spawn /usr/bin/snx

          set password [lindex $argv 0]

          expect "*?assword:*"
          send -- "$passwordr"

          expect
          "o:"
          send "yr"
          exp_continue

          eof



          PS. Beware snx does not support OTP alone, you will have to use the snxconnect script present on the other answer if using it.



          PPS @gibies called to my attention that using an etoken, the password field gets the password from the etoken and not a fixed password.







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited 2 days ago

























          answered Jul 5 '18 at 20:01









          Rui F RibeiroRui F Ribeiro

          41.9k1483142




          41.9k1483142












          • This works in arch linux using snx from aur repository.

            – Met
            Nov 10 '18 at 16:19











          • @Met indeed, find it much later on...see the last link in this answer. Nevertheless, not sure about the legality of that AUR giving us a much older and unsupported 32 bits 2012 version of Checkpoint's snx utility, even if downloading it from a 3rd party site. I am using the same version in the accepted answer, the other is an alternative method.

            – Rui F Ribeiro
            Nov 10 '18 at 17:57











          • I'm trying to connect using a certificate rather than a username, and receive this error: SNX: Virtual Network Adapter initialization and configuration failed. Try to reconnect. Any thoughts?

            – Ashwin Balamohan
            Dec 3 '18 at 16:48






          • 1





            Thanks @RuiFRibeiro. I've posted the new question here: unix.stackexchange.com/questions/485800/… Any thoughts would be wonderful.

            – Ashwin Balamohan
            Dec 4 '18 at 1:42






          • 1





            Very good detailed description. It works fine on my Ubuntu laptop.

            – gibies
            Dec 26 '18 at 11:51


















          • This works in arch linux using snx from aur repository.

            – Met
            Nov 10 '18 at 16:19











          • @Met indeed, find it much later on...see the last link in this answer. Nevertheless, not sure about the legality of that AUR giving us a much older and unsupported 32 bits 2012 version of Checkpoint's snx utility, even if downloading it from a 3rd party site. I am using the same version in the accepted answer, the other is an alternative method.

            – Rui F Ribeiro
            Nov 10 '18 at 17:57











          • I'm trying to connect using a certificate rather than a username, and receive this error: SNX: Virtual Network Adapter initialization and configuration failed. Try to reconnect. Any thoughts?

            – Ashwin Balamohan
            Dec 3 '18 at 16:48






          • 1





            Thanks @RuiFRibeiro. I've posted the new question here: unix.stackexchange.com/questions/485800/… Any thoughts would be wonderful.

            – Ashwin Balamohan
            Dec 4 '18 at 1:42






          • 1





            Very good detailed description. It works fine on my Ubuntu laptop.

            – gibies
            Dec 26 '18 at 11:51

















          This works in arch linux using snx from aur repository.

          – Met
          Nov 10 '18 at 16:19





          This works in arch linux using snx from aur repository.

          – Met
          Nov 10 '18 at 16:19













          @Met indeed, find it much later on...see the last link in this answer. Nevertheless, not sure about the legality of that AUR giving us a much older and unsupported 32 bits 2012 version of Checkpoint's snx utility, even if downloading it from a 3rd party site. I am using the same version in the accepted answer, the other is an alternative method.

          – Rui F Ribeiro
          Nov 10 '18 at 17:57





          @Met indeed, find it much later on...see the last link in this answer. Nevertheless, not sure about the legality of that AUR giving us a much older and unsupported 32 bits 2012 version of Checkpoint's snx utility, even if downloading it from a 3rd party site. I am using the same version in the accepted answer, the other is an alternative method.

          – Rui F Ribeiro
          Nov 10 '18 at 17:57













          I'm trying to connect using a certificate rather than a username, and receive this error: SNX: Virtual Network Adapter initialization and configuration failed. Try to reconnect. Any thoughts?

          – Ashwin Balamohan
          Dec 3 '18 at 16:48





          I'm trying to connect using a certificate rather than a username, and receive this error: SNX: Virtual Network Adapter initialization and configuration failed. Try to reconnect. Any thoughts?

          – Ashwin Balamohan
          Dec 3 '18 at 16:48




          1




          1





          Thanks @RuiFRibeiro. I've posted the new question here: unix.stackexchange.com/questions/485800/… Any thoughts would be wonderful.

          – Ashwin Balamohan
          Dec 4 '18 at 1:42





          Thanks @RuiFRibeiro. I've posted the new question here: unix.stackexchange.com/questions/485800/… Any thoughts would be wonderful.

          – Ashwin Balamohan
          Dec 4 '18 at 1:42




          1




          1





          Very good detailed description. It works fine on my Ubuntu laptop.

          – gibies
          Dec 26 '18 at 11:51






          Very good detailed description. It works fine on my Ubuntu laptop.

          – gibies
          Dec 26 '18 at 11:51














          4














          When working to install the Firefox official SSL VPN Extender interface in the question VPN SSL Network Extender in Firefox, I found out and solved some more pieces of the puzzle of this question.



          Apparently, whilst command line usage of snx from checkpoint has been discontinued, the web based client as described in the linked post still works. However, there is a python command line cliente that tries to replicate the Web+Java interface on top of the snx client, and this post is about setting it up to work.



          Firstly, the snxvp installed from python pip does not work. There is an updated patched version on https://github.com/agnis-mateuss/snxvpn, that has some useful patches, including an option for ignoring unsigned and/or expired certificates, and more interestingly, being python2 and python3 compatible.



          Furthermore, all the URLs on snxconnect.py have to be changed from sslvpn/ to ``.





          So the step-by-step instructions are roughly:



          1) Firstly installing the snx setup:



          If in the VPN, to get the installation file, do:



          wget --no-check-certificate https://VPN_FW_HOSTNAME/SNX/INSTALL/snx_install.sh 


          Otherwise you will have to get it from the web interface as describe in the linked answer.



          For Debian, you might need:



          sudo dpkg --add-architecture i386
          sudo apt-get update


          I had to install the following:



          sudo apt-get install libstdc++5:i386 libx11-6:i386 libpam0g:i386


          Run then:



          chmod a+rx snx_install.sh
          sudo ./snx_install.sh`


          You will have know a /usr/bin/snx 32-bit client binary executable. Check if any dynamic libraries are missing with:



          sudo ldd /usr/bin/snx


          You can only proceed to the following point when all the dependencies are satisfied.



          Not sure if you need to run first snx -s CheckpointURLFQDN -u USER before using snxconnect, for the signature VPN be saved at /etc/snx/USER.db.



          2) Now we have the snxconnect python utility. Such program tries to emulate the web interface, and more interestingly, it does not need Java to authenticate.



          So to install the to setup snxconnect, do as root:



          apt-get -y install git make libxml2-dev libxslt1-dev zlib1g-dev python-pip
          pip install pytz
          git clone https://github.com/agnis-mateuss/snxvpn
          git clone git://git.code.sf.net/p/sfreleasetools/code releasetools
          cd snxvpn

          Now, as for taking out the /sslvpn URL, some Checkpoint appliances need it, some do not. I am not still aware of why the difference. I need it, @WileyMarques does not.

          sed -i "s/sslvpn///g" snxconnect.py


          . then do as root, for python3: (recommended)



          apt-get install python3-docutils python3-pip python3-libxml2 python3-dev python3-crypto python3-bs4
          make
          python3 setup.py install --prefix=/usr/local


          . or instead, do as root, for python2:



          apt-get install python-docutils python-libxml2 python-lxml python-dev python-bs4 python-beautifulsoup
          sed -i "s/distutils.core/setuptools/g" setup.py
          make
          python setup.py install --prefix=/usr/local


          3) After installing it, you can run as a non-privileged user:



          /usr/local/bin/snxconnect -H CheckpointURLFQDN -U USER --skip-cert --save-cookies


          If all went ok, it will ask for the password, and then say:



          SNX connected, to leave VPN open, leave this running!


          If you are having problems getting this message, and are instead getting several times in a row, the message: "Unexpected response, try again.", do the Firefox method, and Disconnect and logout properly, waiting a couple of minutes before trying the snxconnect command again.



          4) The cookie(s) file will be created at ~/.snxcookies, after a successful usage.



          After the VPN being established, you can check with ip address or ifconfig you have now a tunsnx interface:



          $ ip addr show dev tunsnx
          14: tunsnx: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100
          link/none
          inet 10.x.x.x peer 10.x.x.x/32 scope global tunsnx
          valid_lft forever preferred_lft forever
          inet6 fe80::acfe:8fce:99a4:44b7/64 scope link stable-privacy
          valid_lft forever preferred_lft forever


          ip route will show you also new routes going through the tunsnx interface.



          5) For closing/disconnecting the VPN, while you may stop/kill snxconnect, the better and official way is issuing the command:



          $snx -d
          SNX - Disconnecting...
          done.




          In addition, I also found out:




          • snxconnect seems to behave better when disconnecting the previous VPN connection and logging out in the official web interface if there is some strange problem (have to try doing snx -d to see if it produces the same result);

          • PYTHONHTTPSVERIFY=0 only affects the python2 version;

          • if the web interface is doing an HTML redirect to a secondary CheckPoint location, pointing directly to that redirected hostname, holds better results;

          • if the certificates of the firewalls are self-signed (they often are) the --skip-cert option has to be used, or authentication will fail;

          • for not having so many problems re-authenticating, had to use --save-cookies to use authentication cookies, while the user is logged in in the remote VPN point (it has a timeout of x hours);

          • as described in the last question, for the script to work, the option "When signing-in launch SSL Network Extender" has to be changed to "automatically";

          • 7776/TCP in localhost has to be free, for snx to own it, as snxconnect talks with snx using it;

          • the hostname passed to snxconnect/snx is handled as a virtual host, and as such you cannot use directly the IP address;

          • instaling a 32-bit architecture seems to be a requirement to run the snx_install.sh script;

          • you might choose to run as python2 as a trade-off for less space, however as python2 is being phased out, snxconnect in a near future might not support it;

          • from using the web client interface, it is clear I need to patch/delete all /sslvpn strings , as my URLs do not start with /sslvpn. I would check your particular case. I have absolutely no idea whether the presence of that string in the code is due to an old version, would love some feedback;

          • in snxconnect the CheckPoint hostname has to be the exact name the webinterface is showing you once authenticated in there, as it is a web virtual host. Otherwise, you won´t succeed on establishing the VPN;

          • The first time snx is used, a file with the signature of the VPN/Checkpoint server will be created at /etc/snx/USER.db;

          • If you need to use OTP from the command line, you have to use snxconnect as snx alone does not support it.





          share|improve this answer

























          • Regarding the removal of '/sslvpn' strings. The server I connect to has it on the URL, so I didn't that step. Interesting to point this on the answer, since it may happen to other people.

            – Wiley Marques
            Nov 11 '18 at 14:29











          • @WileyMarques Thanks for the feedback, I already suspected it would be different for some, also because in the github/pip version the URL is there.

            – Rui F Ribeiro
            Nov 11 '18 at 15:29















          4














          When working to install the Firefox official SSL VPN Extender interface in the question VPN SSL Network Extender in Firefox, I found out and solved some more pieces of the puzzle of this question.



          Apparently, whilst command line usage of snx from checkpoint has been discontinued, the web based client as described in the linked post still works. However, there is a python command line cliente that tries to replicate the Web+Java interface on top of the snx client, and this post is about setting it up to work.



          Firstly, the snxvp installed from python pip does not work. There is an updated patched version on https://github.com/agnis-mateuss/snxvpn, that has some useful patches, including an option for ignoring unsigned and/or expired certificates, and more interestingly, being python2 and python3 compatible.



          Furthermore, all the URLs on snxconnect.py have to be changed from sslvpn/ to ``.





          So the step-by-step instructions are roughly:



          1) Firstly installing the snx setup:



          If in the VPN, to get the installation file, do:



          wget --no-check-certificate https://VPN_FW_HOSTNAME/SNX/INSTALL/snx_install.sh 


          Otherwise you will have to get it from the web interface as describe in the linked answer.



          For Debian, you might need:



          sudo dpkg --add-architecture i386
          sudo apt-get update


          I had to install the following:



          sudo apt-get install libstdc++5:i386 libx11-6:i386 libpam0g:i386


          Run then:



          chmod a+rx snx_install.sh
          sudo ./snx_install.sh`


          You will have know a /usr/bin/snx 32-bit client binary executable. Check if any dynamic libraries are missing with:



          sudo ldd /usr/bin/snx


          You can only proceed to the following point when all the dependencies are satisfied.



          Not sure if you need to run first snx -s CheckpointURLFQDN -u USER before using snxconnect, for the signature VPN be saved at /etc/snx/USER.db.



          2) Now we have the snxconnect python utility. Such program tries to emulate the web interface, and more interestingly, it does not need Java to authenticate.



          So to install the to setup snxconnect, do as root:



          apt-get -y install git make libxml2-dev libxslt1-dev zlib1g-dev python-pip
          pip install pytz
          git clone https://github.com/agnis-mateuss/snxvpn
          git clone git://git.code.sf.net/p/sfreleasetools/code releasetools
          cd snxvpn

          Now, as for taking out the /sslvpn URL, some Checkpoint appliances need it, some do not. I am not still aware of why the difference. I need it, @WileyMarques does not.

          sed -i "s/sslvpn///g" snxconnect.py


          . then do as root, for python3: (recommended)



          apt-get install python3-docutils python3-pip python3-libxml2 python3-dev python3-crypto python3-bs4
          make
          python3 setup.py install --prefix=/usr/local


          . or instead, do as root, for python2:



          apt-get install python-docutils python-libxml2 python-lxml python-dev python-bs4 python-beautifulsoup
          sed -i "s/distutils.core/setuptools/g" setup.py
          make
          python setup.py install --prefix=/usr/local


          3) After installing it, you can run as a non-privileged user:



          /usr/local/bin/snxconnect -H CheckpointURLFQDN -U USER --skip-cert --save-cookies


          If all went ok, it will ask for the password, and then say:



          SNX connected, to leave VPN open, leave this running!


          If you are having problems getting this message, and are instead getting several times in a row, the message: "Unexpected response, try again.", do the Firefox method, and Disconnect and logout properly, waiting a couple of minutes before trying the snxconnect command again.



          4) The cookie(s) file will be created at ~/.snxcookies, after a successful usage.



          After the VPN being established, you can check with ip address or ifconfig you have now a tunsnx interface:



          $ ip addr show dev tunsnx
          14: tunsnx: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100
          link/none
          inet 10.x.x.x peer 10.x.x.x/32 scope global tunsnx
          valid_lft forever preferred_lft forever
          inet6 fe80::acfe:8fce:99a4:44b7/64 scope link stable-privacy
          valid_lft forever preferred_lft forever


          ip route will show you also new routes going through the tunsnx interface.



          5) For closing/disconnecting the VPN, while you may stop/kill snxconnect, the better and official way is issuing the command:



          $snx -d
          SNX - Disconnecting...
          done.




          In addition, I also found out:




          • snxconnect seems to behave better when disconnecting the previous VPN connection and logging out in the official web interface if there is some strange problem (have to try doing snx -d to see if it produces the same result);

          • PYTHONHTTPSVERIFY=0 only affects the python2 version;

          • if the web interface is doing an HTML redirect to a secondary CheckPoint location, pointing directly to that redirected hostname, holds better results;

          • if the certificates of the firewalls are self-signed (they often are) the --skip-cert option has to be used, or authentication will fail;

          • for not having so many problems re-authenticating, had to use --save-cookies to use authentication cookies, while the user is logged in in the remote VPN point (it has a timeout of x hours);

          • as described in the last question, for the script to work, the option "When signing-in launch SSL Network Extender" has to be changed to "automatically";

          • 7776/TCP in localhost has to be free, for snx to own it, as snxconnect talks with snx using it;

          • the hostname passed to snxconnect/snx is handled as a virtual host, and as such you cannot use directly the IP address;

          • instaling a 32-bit architecture seems to be a requirement to run the snx_install.sh script;

          • you might choose to run as python2 as a trade-off for less space, however as python2 is being phased out, snxconnect in a near future might not support it;

          • from using the web client interface, it is clear I need to patch/delete all /sslvpn strings , as my URLs do not start with /sslvpn. I would check your particular case. I have absolutely no idea whether the presence of that string in the code is due to an old version, would love some feedback;

          • in snxconnect the CheckPoint hostname has to be the exact name the webinterface is showing you once authenticated in there, as it is a web virtual host. Otherwise, you won´t succeed on establishing the VPN;

          • The first time snx is used, a file with the signature of the VPN/Checkpoint server will be created at /etc/snx/USER.db;

          • If you need to use OTP from the command line, you have to use snxconnect as snx alone does not support it.





          share|improve this answer

























          • Regarding the removal of '/sslvpn' strings. The server I connect to has it on the URL, so I didn't that step. Interesting to point this on the answer, since it may happen to other people.

            – Wiley Marques
            Nov 11 '18 at 14:29











          • @WileyMarques Thanks for the feedback, I already suspected it would be different for some, also because in the github/pip version the URL is there.

            – Rui F Ribeiro
            Nov 11 '18 at 15:29













          4












          4








          4







          When working to install the Firefox official SSL VPN Extender interface in the question VPN SSL Network Extender in Firefox, I found out and solved some more pieces of the puzzle of this question.



          Apparently, whilst command line usage of snx from checkpoint has been discontinued, the web based client as described in the linked post still works. However, there is a python command line cliente that tries to replicate the Web+Java interface on top of the snx client, and this post is about setting it up to work.



          Firstly, the snxvp installed from python pip does not work. There is an updated patched version on https://github.com/agnis-mateuss/snxvpn, that has some useful patches, including an option for ignoring unsigned and/or expired certificates, and more interestingly, being python2 and python3 compatible.



          Furthermore, all the URLs on snxconnect.py have to be changed from sslvpn/ to ``.





          So the step-by-step instructions are roughly:



          1) Firstly installing the snx setup:



          If in the VPN, to get the installation file, do:



          wget --no-check-certificate https://VPN_FW_HOSTNAME/SNX/INSTALL/snx_install.sh 


          Otherwise you will have to get it from the web interface as describe in the linked answer.



          For Debian, you might need:



          sudo dpkg --add-architecture i386
          sudo apt-get update


          I had to install the following:



          sudo apt-get install libstdc++5:i386 libx11-6:i386 libpam0g:i386


          Run then:



          chmod a+rx snx_install.sh
          sudo ./snx_install.sh`


          You will have know a /usr/bin/snx 32-bit client binary executable. Check if any dynamic libraries are missing with:



          sudo ldd /usr/bin/snx


          You can only proceed to the following point when all the dependencies are satisfied.



          Not sure if you need to run first snx -s CheckpointURLFQDN -u USER before using snxconnect, for the signature VPN be saved at /etc/snx/USER.db.



          2) Now we have the snxconnect python utility. Such program tries to emulate the web interface, and more interestingly, it does not need Java to authenticate.



          So to install the to setup snxconnect, do as root:



          apt-get -y install git make libxml2-dev libxslt1-dev zlib1g-dev python-pip
          pip install pytz
          git clone https://github.com/agnis-mateuss/snxvpn
          git clone git://git.code.sf.net/p/sfreleasetools/code releasetools
          cd snxvpn

          Now, as for taking out the /sslvpn URL, some Checkpoint appliances need it, some do not. I am not still aware of why the difference. I need it, @WileyMarques does not.

          sed -i "s/sslvpn///g" snxconnect.py


          . then do as root, for python3: (recommended)



          apt-get install python3-docutils python3-pip python3-libxml2 python3-dev python3-crypto python3-bs4
          make
          python3 setup.py install --prefix=/usr/local


          . or instead, do as root, for python2:



          apt-get install python-docutils python-libxml2 python-lxml python-dev python-bs4 python-beautifulsoup
          sed -i "s/distutils.core/setuptools/g" setup.py
          make
          python setup.py install --prefix=/usr/local


          3) After installing it, you can run as a non-privileged user:



          /usr/local/bin/snxconnect -H CheckpointURLFQDN -U USER --skip-cert --save-cookies


          If all went ok, it will ask for the password, and then say:



          SNX connected, to leave VPN open, leave this running!


          If you are having problems getting this message, and are instead getting several times in a row, the message: "Unexpected response, try again.", do the Firefox method, and Disconnect and logout properly, waiting a couple of minutes before trying the snxconnect command again.



          4) The cookie(s) file will be created at ~/.snxcookies, after a successful usage.



          After the VPN being established, you can check with ip address or ifconfig you have now a tunsnx interface:



          $ ip addr show dev tunsnx
          14: tunsnx: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100
          link/none
          inet 10.x.x.x peer 10.x.x.x/32 scope global tunsnx
          valid_lft forever preferred_lft forever
          inet6 fe80::acfe:8fce:99a4:44b7/64 scope link stable-privacy
          valid_lft forever preferred_lft forever


          ip route will show you also new routes going through the tunsnx interface.



          5) For closing/disconnecting the VPN, while you may stop/kill snxconnect, the better and official way is issuing the command:



          $snx -d
          SNX - Disconnecting...
          done.




          In addition, I also found out:




          • snxconnect seems to behave better when disconnecting the previous VPN connection and logging out in the official web interface if there is some strange problem (have to try doing snx -d to see if it produces the same result);

          • PYTHONHTTPSVERIFY=0 only affects the python2 version;

          • if the web interface is doing an HTML redirect to a secondary CheckPoint location, pointing directly to that redirected hostname, holds better results;

          • if the certificates of the firewalls are self-signed (they often are) the --skip-cert option has to be used, or authentication will fail;

          • for not having so many problems re-authenticating, had to use --save-cookies to use authentication cookies, while the user is logged in in the remote VPN point (it has a timeout of x hours);

          • as described in the last question, for the script to work, the option "When signing-in launch SSL Network Extender" has to be changed to "automatically";

          • 7776/TCP in localhost has to be free, for snx to own it, as snxconnect talks with snx using it;

          • the hostname passed to snxconnect/snx is handled as a virtual host, and as such you cannot use directly the IP address;

          • instaling a 32-bit architecture seems to be a requirement to run the snx_install.sh script;

          • you might choose to run as python2 as a trade-off for less space, however as python2 is being phased out, snxconnect in a near future might not support it;

          • from using the web client interface, it is clear I need to patch/delete all /sslvpn strings , as my URLs do not start with /sslvpn. I would check your particular case. I have absolutely no idea whether the presence of that string in the code is due to an old version, would love some feedback;

          • in snxconnect the CheckPoint hostname has to be the exact name the webinterface is showing you once authenticated in there, as it is a web virtual host. Otherwise, you won´t succeed on establishing the VPN;

          • The first time snx is used, a file with the signature of the VPN/Checkpoint server will be created at /etc/snx/USER.db;

          • If you need to use OTP from the command line, you have to use snxconnect as snx alone does not support it.





          share|improve this answer















          When working to install the Firefox official SSL VPN Extender interface in the question VPN SSL Network Extender in Firefox, I found out and solved some more pieces of the puzzle of this question.



          Apparently, whilst command line usage of snx from checkpoint has been discontinued, the web based client as described in the linked post still works. However, there is a python command line cliente that tries to replicate the Web+Java interface on top of the snx client, and this post is about setting it up to work.



          Firstly, the snxvp installed from python pip does not work. There is an updated patched version on https://github.com/agnis-mateuss/snxvpn, that has some useful patches, including an option for ignoring unsigned and/or expired certificates, and more interestingly, being python2 and python3 compatible.



          Furthermore, all the URLs on snxconnect.py have to be changed from sslvpn/ to ``.





          So the step-by-step instructions are roughly:



          1) Firstly installing the snx setup:



          If in the VPN, to get the installation file, do:



          wget --no-check-certificate https://VPN_FW_HOSTNAME/SNX/INSTALL/snx_install.sh 


          Otherwise you will have to get it from the web interface as describe in the linked answer.



          For Debian, you might need:



          sudo dpkg --add-architecture i386
          sudo apt-get update


          I had to install the following:



          sudo apt-get install libstdc++5:i386 libx11-6:i386 libpam0g:i386


          Run then:



          chmod a+rx snx_install.sh
          sudo ./snx_install.sh`


          You will have know a /usr/bin/snx 32-bit client binary executable. Check if any dynamic libraries are missing with:



          sudo ldd /usr/bin/snx


          You can only proceed to the following point when all the dependencies are satisfied.



          Not sure if you need to run first snx -s CheckpointURLFQDN -u USER before using snxconnect, for the signature VPN be saved at /etc/snx/USER.db.



          2) Now we have the snxconnect python utility. Such program tries to emulate the web interface, and more interestingly, it does not need Java to authenticate.



          So to install the to setup snxconnect, do as root:



          apt-get -y install git make libxml2-dev libxslt1-dev zlib1g-dev python-pip
          pip install pytz
          git clone https://github.com/agnis-mateuss/snxvpn
          git clone git://git.code.sf.net/p/sfreleasetools/code releasetools
          cd snxvpn

          Now, as for taking out the /sslvpn URL, some Checkpoint appliances need it, some do not. I am not still aware of why the difference. I need it, @WileyMarques does not.

          sed -i "s/sslvpn///g" snxconnect.py


          . then do as root, for python3: (recommended)



          apt-get install python3-docutils python3-pip python3-libxml2 python3-dev python3-crypto python3-bs4
          make
          python3 setup.py install --prefix=/usr/local


          . or instead, do as root, for python2:



          apt-get install python-docutils python-libxml2 python-lxml python-dev python-bs4 python-beautifulsoup
          sed -i "s/distutils.core/setuptools/g" setup.py
          make
          python setup.py install --prefix=/usr/local


          3) After installing it, you can run as a non-privileged user:



          /usr/local/bin/snxconnect -H CheckpointURLFQDN -U USER --skip-cert --save-cookies


          If all went ok, it will ask for the password, and then say:



          SNX connected, to leave VPN open, leave this running!


          If you are having problems getting this message, and are instead getting several times in a row, the message: "Unexpected response, try again.", do the Firefox method, and Disconnect and logout properly, waiting a couple of minutes before trying the snxconnect command again.



          4) The cookie(s) file will be created at ~/.snxcookies, after a successful usage.



          After the VPN being established, you can check with ip address or ifconfig you have now a tunsnx interface:



          $ ip addr show dev tunsnx
          14: tunsnx: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100
          link/none
          inet 10.x.x.x peer 10.x.x.x/32 scope global tunsnx
          valid_lft forever preferred_lft forever
          inet6 fe80::acfe:8fce:99a4:44b7/64 scope link stable-privacy
          valid_lft forever preferred_lft forever


          ip route will show you also new routes going through the tunsnx interface.



          5) For closing/disconnecting the VPN, while you may stop/kill snxconnect, the better and official way is issuing the command:



          $snx -d
          SNX - Disconnecting...
          done.




          In addition, I also found out:




          • snxconnect seems to behave better when disconnecting the previous VPN connection and logging out in the official web interface if there is some strange problem (have to try doing snx -d to see if it produces the same result);

          • PYTHONHTTPSVERIFY=0 only affects the python2 version;

          • if the web interface is doing an HTML redirect to a secondary CheckPoint location, pointing directly to that redirected hostname, holds better results;

          • if the certificates of the firewalls are self-signed (they often are) the --skip-cert option has to be used, or authentication will fail;

          • for not having so many problems re-authenticating, had to use --save-cookies to use authentication cookies, while the user is logged in in the remote VPN point (it has a timeout of x hours);

          • as described in the last question, for the script to work, the option "When signing-in launch SSL Network Extender" has to be changed to "automatically";

          • 7776/TCP in localhost has to be free, for snx to own it, as snxconnect talks with snx using it;

          • the hostname passed to snxconnect/snx is handled as a virtual host, and as such you cannot use directly the IP address;

          • instaling a 32-bit architecture seems to be a requirement to run the snx_install.sh script;

          • you might choose to run as python2 as a trade-off for less space, however as python2 is being phased out, snxconnect in a near future might not support it;

          • from using the web client interface, it is clear I need to patch/delete all /sslvpn strings , as my URLs do not start with /sslvpn. I would check your particular case. I have absolutely no idea whether the presence of that string in the code is due to an old version, would love some feedback;

          • in snxconnect the CheckPoint hostname has to be the exact name the webinterface is showing you once authenticated in there, as it is a web virtual host. Otherwise, you won´t succeed on establishing the VPN;

          • The first time snx is used, a file with the signature of the VPN/Checkpoint server will be created at /etc/snx/USER.db;

          • If you need to use OTP from the command line, you have to use snxconnect as snx alone does not support it.






          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited Nov 11 '18 at 15:31

























          answered Jun 16 '18 at 23:33









          Rui F RibeiroRui F Ribeiro

          41.9k1483142




          41.9k1483142












          • Regarding the removal of '/sslvpn' strings. The server I connect to has it on the URL, so I didn't that step. Interesting to point this on the answer, since it may happen to other people.

            – Wiley Marques
            Nov 11 '18 at 14:29











          • @WileyMarques Thanks for the feedback, I already suspected it would be different for some, also because in the github/pip version the URL is there.

            – Rui F Ribeiro
            Nov 11 '18 at 15:29

















          • Regarding the removal of '/sslvpn' strings. The server I connect to has it on the URL, so I didn't that step. Interesting to point this on the answer, since it may happen to other people.

            – Wiley Marques
            Nov 11 '18 at 14:29











          • @WileyMarques Thanks for the feedback, I already suspected it would be different for some, also because in the github/pip version the URL is there.

            – Rui F Ribeiro
            Nov 11 '18 at 15:29
















          Regarding the removal of '/sslvpn' strings. The server I connect to has it on the URL, so I didn't that step. Interesting to point this on the answer, since it may happen to other people.

          – Wiley Marques
          Nov 11 '18 at 14:29





          Regarding the removal of '/sslvpn' strings. The server I connect to has it on the URL, so I didn't that step. Interesting to point this on the answer, since it may happen to other people.

          – Wiley Marques
          Nov 11 '18 at 14:29













          @WileyMarques Thanks for the feedback, I already suspected it would be different for some, also because in the github/pip version the URL is there.

          – Rui F Ribeiro
          Nov 11 '18 at 15:29





          @WileyMarques Thanks for the feedback, I already suspected it would be different for some, also because in the github/pip version the URL is there.

          – Rui F Ribeiro
          Nov 11 '18 at 15:29

















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Unix & Linux Stack Exchange!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f450229%2fgetting-checkpoint-vpn-ssl-network-extender-working-in-the-command-line%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Àrd-bhaile Cathair chruinne/Baile mòr cruinne | Artagailean ceangailte | Clàr-taice na seòladaireachd

          Cannot Extend partition with GParted The 2019 Stack Overflow Developer Survey Results Are In Announcing the arrival of Valued Associate #679: Cesar Manara Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern) 2019 Community Moderator Election ResultsCan't increase partition size with GParted?GParted doesn't recognize the unallocated space after my current partitionWhat is the best way to add unallocated space located before to Ubuntu 12.04 partition with GParted live?I can't figure out how to extend my Arch home partition into free spaceGparted Linux Mint 18.1 issueTrying to extend but swap partition is showing as Unknown in Gparted, shows proper from fdiskRearrange partitions in gparted to extend a partitionUnable to extend partition even though unallocated space is next to it using GPartedAllocate free space to root partitiongparted: how to merge unallocated space with a partition

          대한민국 목차 국명 지리 역사 정치 국방 경제 사회 문화 국제 순위 관련 항목 각주 외부 링크 둘러보기 메뉴북위 37° 34′ 08″ 동경 126° 58′ 36″ / 북위 37.568889° 동경 126.976667°  / 37.568889; 126.976667ehThe Korean Repository문단을 편집문단을 편집추가해Clarkson PLC 사Report for Selected Countries and Subjects-Korea“Human Development Index and its components: P.198”“http://www.law.go.kr/%EB%B2%95%EB%A0%B9/%EB%8C%80%ED%95%9C%EB%AF%BC%EA%B5%AD%EA%B5%AD%EA%B8%B0%EB%B2%95”"한국은 국제법상 한반도 유일 합법정부 아니다" - 오마이뉴스 모바일Report for Selected Countries and Subjects: South Korea격동의 역사와 함께한 조선일보 90년 : 조선일보 인수해 혁신시킨 신석우, 임시정부 때는 '대한민국' 국호(國號) 정해《우리가 몰랐던 우리 역사: 나라 이름의 비밀을 찾아가는 역사 여행》“남북 공식호칭 ‘남한’‘북한’으로 쓴다”“Corea 대 Korea, 누가 이긴 거야?”국내기후자료 - 한국[김대중 前 대통령 서거] 과감한 구조개혁 'DJ노믹스'로 최단기간 환란극복 :: 네이버 뉴스“이라크 "韓-쿠르드 유전개발 MOU 승인 안해"(종합)”“해외 우리국민 추방사례 43%가 일본”차기전차 K2'흑표'의 세계 최고 전력 분석, 쿠키뉴스 엄기영, 2007-03-02두산인프라, 헬기잡는 장갑차 'K21'...내년부터 공급, 고뉴스 이대준, 2008-10-30과거 내용 찾기mk 뉴스 - 구매력 기준으로 보면 한국 1인당 소득 3만弗과거 내용 찾기"The N-11: More Than an Acronym"Archived조선일보 최우석, 2008-11-01Global 500 2008: Countries - South Korea“몇년째 '시한폭탄'... 가계부채, 올해는 터질까”가구당 부채 5000만원 처음 넘어서“‘빚’으로 내몰리는 사회.. 위기의 가계대출”“[경제365] 공공부문 부채 급증…800조 육박”“"소득 양극화 다소 완화...불평등은 여전"”“공정사회·공생발전 한참 멀었네”iSuppli,08年2QのDRAMシェア・ランキングを発表(08/8/11)South Korea dominates shipbuilding industry | Stock Market News & Stocks to Watch from StraightStocks한국 자동차 생산, 3년 연속 세계 5위자동차수출 '현대-삼성 웃고 기아-대우-쌍용은 울고' 과거 내용 찾기동반성장위 창립 1주년 맞아Archived"중기적합 3개업종 합의 무시한 채 선정"李대통령, 사업 무분별 확장 소상공인 생계 위협 질타삼성-LG, 서민업종인 빵·분식사업 잇따라 철수상생은 뒷전…SSM ‘몸집 불리기’ 혈안Archived“경부고속도에 '아시안하이웨이' 표지판”'철의 실크로드' 앞서 '말(言)의 실크로드'부터, 프레시안 정창현, 2008-10-01“'서울 지하철은 안전한가?'”“서울시 “올해 안에 모든 지하철역 스크린도어 설치””“부산지하철 1,2호선 승강장 안전펜스 설치 완료”“전교조, 정부 노조 통계서 처음 빠져”“[Weekly BIZ] 도요타 '제로 이사회'가 리콜 사태 불러들였다”“S Korea slams high tuition costs”““정치가 여론 양극화 부채질… 합리주의 절실””“〈"`촛불집회'는 민주주의의 질적 변화 상징"〉”““촛불집회가 민주주의 왜곡 초래””“국민 65%, "한국 노사관계 대립적"”“한국 국가경쟁력 27위‥노사관계 '꼴찌'”“제대로 형성되지 않은 대한민국 이념지형”“[신년기획-갈등의 시대] 갈등지수 OECD 4위…사회적 손실 GDP 27% 무려 300조”“2012 총선-대선의 키워드는 '국민과 소통'”“한국 삶의 질 27위, 2000년과 2008년 연속 하위권 머물러”“[해피 코리아] 행복점수 68점…해외 평가선 '낙제점'”“한국 어린이·청소년 행복지수 3년 연속 OECD ‘꼴찌’”“한국 이혼율 OECD중 8위”“[통계청] 한국 이혼율 OECD 4위”“오피니언 [이렇게 생각한다] `부부의 날` 에 돌아본 이혼율 1위 한국”“Suicide Rates by Country, Global Health Observatory Data Repository.”“1. 또 다른 차별”“오피니언 [편집자에게] '왕따'와 '패거리 정치' 심리는 닮은꼴”“[미래한국리포트] 무한경쟁에 빠진 대한민국”“대학생 98% "외모가 경쟁력이라는 말 동의"”“특급호텔 웨딩·200만원대 유모차… "남보다 더…" 호화病, 고질병 됐다”“[스트레스 공화국] ① 경쟁사회, 스트레스 쌓인다”““매일 30여명 자살 한국, 의사보다 무속인에…””“"자살 부르는 '우울증', 환자 중 85% 치료 안 받아"”“정신병원을 가다”“대한민국도 ‘묻지마 범죄’,안전지대 아니다”“유엔 "학생 '성적 지향'에 따른 차별 금지하라"”“유엔아동권리위원회 보고서 및 번역본 원문”“고졸 성공스토리 담은 '제빵왕 김탁구' 드라마 나온다”“‘빛 좋은 개살구’ 고졸 취업…실습 대신 착취”원본 문서“정신건강, 사회적 편견부터 고쳐드립니다”‘소통’과 ‘행복’에 목 마른 사회가 잠들어 있던 ‘심리학’ 깨웠다“[포토] 사유리-곽금주 교수의 유쾌한 심리상담”“"올해 한국인 평균 영화관람횟수 세계 1위"(종합)”“[게임연중기획] 게임은 문화다-여가활동 1순위 게임”“영화속 ‘영어 지상주의’ …“왠지 씁쓸한데””“2월 `신문 부수 인증기관` 지정..방송법 후속작업”“무료신문 성장동력 ‘차별성’과 ‘갈등해소’”대한민국 국회 법률지식정보시스템"Pew Research Center's Religion & Public Life Project: South Korea"“amp;vwcd=MT_ZTITLE&path=인구·가구%20>%20인구총조사%20>%20인구부문%20>%20 총조사인구(2005)%20>%20전수부문&oper_YN=Y&item=&keyword=종교별%20인구& amp;lang_mode=kor&list_id= 2005년 통계청 인구 총조사”원본 문서“한국인이 좋아하는 취미와 운동 (2004-2009)”“한국인이 좋아하는 취미와 운동 (2004-2014)”Archived“한국, `부분적 언론자유국' 강등〈프리덤하우스〉”“국경없는기자회 "한국, 인터넷감시 대상국"”“한국, 조선산업 1위 유지(S. Korea Stays Top Shipbuilding Nation) RZD-Partner Portal”원본 문서“한국, 4년 만에 ‘선박건조 1위’”“옛 마산시,인터넷속도 세계 1위”“"한국 초고속 인터넷망 세계1위"”“인터넷·휴대폰 요금, 외국보다 훨씬 비싸”“한국 관세행정 6년 연속 세계 '1위'”“한국 교통사고 사망자 수 OECD 회원국 중 2위”“결핵 후진국' 한국, 환자가 급증한 이유는”“수술은 신중해야… 자칫하면 생명 위협”대한민국분류대한민국의 지도대한민국 정부대표 다국어포털대한민국 전자정부대한민국 국회한국방송공사about korea and information korea브리태니커 백과사전(한국편)론리플래닛의 정보(한국편)CIA의 세계 정보(한국편)마리암 부디아 (Mariam Budia),『한국: 하늘이 내린 한 폭의 그림』, 서울: 트랜스라틴 19호 (2012년 3월)대한민국ehehehehehehehehehehehehehehWorldCat132441370n791268020000 0001 2308 81034078029-6026373548cb11863345f(데이터)00573706ge128495