<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SNMP on VSX in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/170420#M30880</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a related problem, sorry if I'm necroing this thread (I'll post a separate post if need be).&lt;/P&gt;&lt;P&gt;While I'm able to poll the VS directly, I'm not able to get the actual IP address per interface through SNMP, I only get the funny IP from its interfaces. Is there a way to find the actual IP address rather than the funny IP related to the interfaces?&lt;/P&gt;</description>
    <pubDate>Mon, 06 Feb 2023 09:11:04 GMT</pubDate>
    <dc:creator>eriki</dc:creator>
    <dc:date>2023-02-06T09:11:04Z</dc:date>
    <item>
      <title>SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/158530#M27639</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;i have VSX Checkpoint 15400 with R80.30 take 251.&lt;/P&gt;&lt;P&gt;I can snmpwalk to physical IP getting info, ex. with command&lt;/P&gt;&lt;P&gt;snmpwalk -v 2c -c public x.x.x.x .1.3.6.1.2.1.4.20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if i try&amp;nbsp; same command to virtual ip (VSX firewalls configured on same physical device) i get no response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is possible to monitor VSX or only physical device ?&lt;/P&gt;&lt;P&gt;In the command working, can i specify virtual device to monitor, ex. vsx hostname ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Giuliano&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 14:38:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/158530#M27639</guid>
      <dc:creator>Buitre</dc:creator>
      <dc:date>2022-09-30T14:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/158537#M27640</link>
      <description>&lt;P&gt;VSX does not have independent SNMP on VS level. However, you can monitor&amp;nbsp;pretty much everything you need from the physical host, including per VS parameters. Look into&amp;nbsp;sk90470 and&amp;nbsp;&lt;SPAN&gt;sk90860.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Most importantly, &lt;U&gt;R80.30 is out of support today&lt;/U&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 16:22:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/158537#M27640</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-09-30T16:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/158679#M27681</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;i resolved my issue looking for in both SK.&lt;/P&gt;&lt;P&gt;Command missing on my device was : "set snmp vs-direct-access on"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Giuliano&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Oct 2022 12:42:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/158679#M27681</guid>
      <dc:creator>Buitre</dc:creator>
      <dc:date>2022-10-03T12:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/170420#M30880</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a related problem, sorry if I'm necroing this thread (I'll post a separate post if need be).&lt;/P&gt;&lt;P&gt;While I'm able to poll the VS directly, I'm not able to get the actual IP address per interface through SNMP, I only get the funny IP from its interfaces. Is there a way to find the actual IP address rather than the funny IP related to the interfaces?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 09:11:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/170420#M30880</guid>
      <dc:creator>eriki</dc:creator>
      <dc:date>2023-02-06T09:11:04Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/170449#M30882</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/40514"&gt;@eriki&lt;/a&gt;&amp;nbsp;please make sure you enabled VSX mode for SNMP. Also, please review&amp;nbsp;&lt;SPAN&gt;sk90860, the VSX section, and let me know if it helps.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 13:47:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/170449#M30882</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-02-06T13:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/170541#M30894</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have configured the SNMP settings in accordance with the SK article. I have enabled vs-mode as well as vs-direct. I'm polling using SNMPv3. I can successfully snmpwalk the gateways, but when looking for the interface IP addresses, I only get the funny addresses rather than their configured actual address. I even tried a full snmpwalk with no specific OID and searched the output for the IP address, and couldn't find it.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 07:19:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/170541#M30894</guid>
      <dc:creator>eriki</dc:creator>
      <dc:date>2023-02-07T07:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174698#M31806</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Him with &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/40514"&gt;@eriki&lt;/a&gt;, im looking for this for many, many years(+10y) for vsx environments, ive open tac case in the past(dont bother to ask when, I already move companies),whats the point snmp return funny ips which is only for internal vsx usage. Im not a developer but how hard is to make this snmp query work as expected?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 07:40:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174698#M31806</guid>
      <dc:creator>NUNO_C</dc:creator>
      <dc:date>2023-03-14T07:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174759#M31816</link>
      <description>&lt;P&gt;Hi eriki,&lt;/P&gt;
&lt;P&gt;I will be happy to assist if you can share more details with me, I have tested SNMPv3 on my setups (ignis and ivory) and successfully retrieved the values of IP&lt;/P&gt;
&lt;P&gt;can you share with me snmp configuration, gaia version you have and how you run the snmpwalk command?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 14:15:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174759#M31816</guid>
      <dc:creator>sarihunter</dc:creator>
      <dc:date>2023-03-14T14:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174778#M31822</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/47767"&gt;@sarihunter&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Let me explain the case, when you create a VSX cluster you need to assign a network for internal cluster members communication which must not be used on internal network, for this case lets say&lt;BR /&gt;192.168.0.0/22.&lt;/P&gt;&lt;P&gt;vsx cluster has 2 nodes&lt;/P&gt;&lt;P&gt;vsx node1:10.2.0.1/24&lt;BR /&gt;vsx node2: 10.2.0.2/24&lt;BR /&gt;vsx clusterip:10.2.0.3/24&lt;/P&gt;&lt;P&gt;Now you build virtual system 1 and assign 3 interfaces with following information&lt;/P&gt;&lt;P&gt;eth1: 10.0.0.1/24&lt;BR /&gt;eth2: 10.0.1.1/24&lt;BR /&gt;eth3: 10.1.2.1/24&amp;nbsp;&lt;/P&gt;&lt;P&gt;Virtual System 1 (VS1) is active on vsx node2 standby on vsx node 1&lt;/P&gt;&lt;P&gt;######&lt;BR /&gt;Desired outcome, when you snmp query vsx node or virtual system directly&lt;/P&gt;&lt;P&gt;- via context&lt;BR /&gt;snmptable -v3 -l authPriv -u &amp;lt;snmpuser&amp;gt; -a SHA -A &amp;lt;snmppass&amp;gt; -x AES -X &amp;lt;privpass&amp;gt;&amp;nbsp; -n ctxname_vsid1 &amp;lt;any_Vsx_node&amp;gt; ipAddrTable&lt;/P&gt;&lt;P&gt;- direct to virtual System&lt;BR /&gt;snmptable -v3 -l authPriv -u &amp;lt;snmpuser&amp;gt; -a SHA -A &amp;lt;snmppass&amp;gt; -x AES -X &amp;lt;privpass&amp;gt;&amp;nbsp; 10.0.0.1&amp;nbsp; ipAddrTable&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ipAdEntAddr ipAdEntIfIndex ipAdEntNetMask ipAdEntBcastAddr ipAdEntReasmMaxSize&lt;BR /&gt;127.0.0.1 1 255.0.0.0 0 ?&lt;BR /&gt;10.0.0.1 2 255.255.255.0&amp;nbsp; 1 ?&lt;BR /&gt;10.0.1.1 3 255.255.255.0&amp;nbsp; 1 ?&lt;BR /&gt;10.0.2.1 4 255.255.255.0&amp;nbsp; 1 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In reality, what both run both snmp queries return is :&lt;/P&gt;&lt;P&gt;if you query vsx node 1&lt;/P&gt;&lt;P&gt;snmptable -v3 -l authPriv -u &amp;lt;snmpuser&amp;gt; -a SHA -A &amp;lt;snmppass&amp;gt; -x AES -X &amp;lt;privpass&amp;gt;&amp;nbsp; -n ctxname_vsid1 10.2.0.1 ipAddrTable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ipAdEntAddr ipAdEntIfIndex ipAdEntNetMask ipAdEntBcastAddr ipAdEntReasmMaxSize&lt;BR /&gt;127.0.0.1 1 255.0.0.0 0 ?&lt;BR /&gt;192.168.0.1 2 255.255.255.240&amp;nbsp; 1 ?&lt;BR /&gt;192.168.0.17 3 255.255.255.240&amp;nbsp; 1 ?&lt;BR /&gt;192.168.0.33 4 255.255.255.240&amp;nbsp; 1 ?&lt;/P&gt;&lt;P&gt;if you query vsx node 2&lt;/P&gt;&lt;P&gt;snmptable -v3 -l authPriv -u &amp;lt;snmpuser&amp;gt; -a SHA -A &amp;lt;snmppass&amp;gt; -x AES -X &amp;lt;privpass&amp;gt;&amp;nbsp; -n ctxname_vsid1 10.2.0.2 ipAddrTable&lt;BR /&gt;ipAdEntAddr ipAdEntIfIndex ipAdEntNetMask ipAdEntBcastAddr ipAdEntReasmMaxSize&lt;BR /&gt;127.0.0.1 1 255.0.0.0 0 ?&lt;BR /&gt;192.168.0.2 2 255.255.255.240&amp;nbsp; 1 ?&lt;BR /&gt;192.168.0.18 3 255.255.255.240&amp;nbsp; 1 ?&lt;BR /&gt;192.168.0.34 4 255.255.255.240&amp;nbsp; 1 ?&lt;/P&gt;&lt;P&gt;if you query the virtual system directly&lt;/P&gt;&lt;P&gt;snmptable -v3 -l authPriv -u &amp;lt;snmpuser&amp;gt; -a SHA -A &amp;lt;snmppass&amp;gt; -x AES -X &amp;lt;privpass&amp;gt;&amp;nbsp; -n ctxname_vsid1 10.2.0.1 ipAddrTable&lt;/P&gt;&lt;P&gt;ipAdEntAddr ipAdEntIfIndex ipAdEntNetMask ipAdEntBcastAddr ipAdEntReasmMaxSize&lt;BR /&gt;127.0.0.1 1 255.0.0.0 0 ?&lt;BR /&gt;192.168.0.2 2 255.255.255.240&amp;nbsp; 1 ?&lt;BR /&gt;192.168.0.18 3 255.255.255.240&amp;nbsp; 1 ?&lt;BR /&gt;192.168.0.34 4 255.255.255.240&amp;nbsp; 1 ?&lt;/P&gt;&lt;P&gt;Ive been too many times over this, and no is not snmp configuration, ive done to many trials around snmp configurations, dump all oid from a snmp query a look for something that could lead to get virtual system ips and no luck. I had high expectations when Checkpoint given the option to query the virtual system directly (i think from R81), but no, same outcome.&lt;BR /&gt;Snmp query returns internal ips used for internal communications instead the ones thar realy matters.&lt;BR /&gt;Its possible to get correct routing table information,arp table but not interface ip from the virtual system other than vsx internal ips...&lt;/P&gt;&lt;P&gt;I hope that ive been clear enough on my description. Easy to generate this result with VSX cluster with a virtual system.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Nuno&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 15:19:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174778#M31822</guid>
      <dc:creator>NUNO_C</dc:creator>
      <dc:date>2023-03-14T15:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174849#M31848</link>
      <description>&lt;P&gt;Interessting, ive posted detail information about how to get to case problem, but the post, but for some reason moderator removed my post.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 01:31:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174849#M31848</guid>
      <dc:creator>NUNO_C</dc:creator>
      <dc:date>2023-03-15T01:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174855#M31852</link>
      <description>&lt;P&gt;One option / workaround is documented here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk169572" target="_self"&gt;sk169572: Snmpwalk command shows the Virtual System internal IP addresses&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 02:40:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174855#M31852</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-15T02:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174858#M31853</link>
      <description>&lt;P&gt;Hi Chris,&lt;BR /&gt;&lt;BR /&gt;The problem is exactly stated in the end of that SK,quoting last part&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cause&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;STRONG&gt;By design the VSX Internal IP addresses are registered at the linux/OS level for interfaces.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;User Configured IP addresses are visible at the Gaia/OS level.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Summarising, snmp ONLY RETURNS&amp;nbsp; vsx internal&amp;nbsp;interfaces IP addresses NOT virtual system interface ip addresses.&lt;BR /&gt;&lt;BR /&gt;PS. I would appreciate to know why my previous post wasnt approved by moderator.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Nuno&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 15 Mar 2023 03:14:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174858#M31853</guid>
      <dc:creator>NUNO_C</dc:creator>
      <dc:date>2023-03-15T03:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174862#M31857</link>
      <description>&lt;P&gt;And is the solution proposed in the SK viable in your scenario or is there some other challenge there?&lt;/P&gt;
&lt;P&gt;Tagging&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;regarding your moderator query, depending on specifics they may reach out in private.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 03:36:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174862#M31857</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-15T03:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174863#M31858</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;The whole point is to get via snmp the traffic interface ips from virtual systems&amp;nbsp; and not vsx internal ips.&lt;/P&gt;&lt;P&gt;With a virtual system on vsx a single interface always have 2 ips, traffic ip and vsx ip, and the one that snmp return is internal ip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Simple as that&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 03:46:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174863#M31858</guid>
      <dc:creator>NUNO_C</dc:creator>
      <dc:date>2023-03-15T03:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174865#M31859</link>
      <description>&lt;P&gt;So your tooling is unable to reference the alternate OID that provides this information:&amp;nbsp;.1.3.6.1.4.1.2620.1.5.15 ?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 03:57:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174865#M31859</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-15T03:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174868#M31860</link>
      <description>&lt;P&gt;Per the article and what Chris has posted here, you must poll the&amp;nbsp;&lt;SPAN&gt;haCLusterIpTable to get the 'real' IP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In VSX, the 'funny' IP addresses are the actual IP addresses configured on the interfaces, while the 'real' IP is the VIP, floating to the active cluster member. Hence, when you poll for actual IPs you get the 'funny' IPs, because standard SNMP OIDs must also work on standard clusters. VSX functions in a similar to regular clusters where the VIP is on a different subnet than the actual interface IPs. So in order to poll for the IP address you're looking for, you must poll for the VIP, because that's what it actually is inside the code.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 04:09:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174868#M31860</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2023-03-15T04:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP on VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174886#M31862</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24249"&gt;@NUNO_C&lt;/a&gt;&amp;nbsp;your comment was not removed. It was falsely flagged as spam by the automated spam detector. Unfortunately, it happens from time to time. I have released it now. We clear the moderation queue regularly during the day, you just need to be patient.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks for your understanding&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 08:06:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-on-VSX/m-p/174886#M31862</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-03-15T08:06:53Z</dc:date>
    </item>
  </channel>
</rss>

