<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Management interface on virtual systems in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-interface-on-virtual-systems/m-p/69521#M9572</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have just enabled SNMP access to virtual systems on VSX hosts using direct SNMP access:&lt;/P&gt;&lt;P&gt;set snmp mode vs&lt;BR /&gt;set snmp vs-direct-access on&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We have confirmed that this is working with both SNMP v2 and v3 using the internal interface of the virtual systems that is used for data traffic.&lt;/P&gt;&lt;P&gt;We are now planning to create a separate management interface for each vs, so that the SNMP traffic is separated and routed correctly. Would you recommend using the same VLAN for this interface as the management interface of the VSX hosts or do you see any advantage of using a separate monitoring VLAN on the virtual systems?&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;P&gt;Harry&lt;/P&gt;</description>
    <pubDate>Fri, 06 Dec 2019 10:59:13 GMT</pubDate>
    <dc:creator>net-harry</dc:creator>
    <dc:date>2019-12-06T10:59:13Z</dc:date>
    <item>
      <title>Management interface on virtual systems</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-interface-on-virtual-systems/m-p/69521#M9572</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have just enabled SNMP access to virtual systems on VSX hosts using direct SNMP access:&lt;/P&gt;&lt;P&gt;set snmp mode vs&lt;BR /&gt;set snmp vs-direct-access on&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We have confirmed that this is working with both SNMP v2 and v3 using the internal interface of the virtual systems that is used for data traffic.&lt;/P&gt;&lt;P&gt;We are now planning to create a separate management interface for each vs, so that the SNMP traffic is separated and routed correctly. Would you recommend using the same VLAN for this interface as the management interface of the VSX hosts or do you see any advantage of using a separate monitoring VLAN on the virtual systems?&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;P&gt;Harry&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2019 10:59:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-interface-on-virtual-systems/m-p/69521#M9572</guid>
      <dc:creator>net-harry</dc:creator>
      <dc:date>2019-12-06T10:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: Management interface on virtual systems</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-interface-on-virtual-systems/m-p/69523#M9573</link>
      <description>&lt;P&gt;I would personally keep out of the VSX Cluster Management Interface VLAN, I like to keep that just for the actual VSX Management Traffic&lt;/P&gt;&lt;P&gt;SNMPv3 is already encrypted (we always use the option to encrypt anyway) so not sure from a Security perspective too much benefit there and are you really generating enough traffic with SNMP that going to impact regular network traffic.&lt;/P&gt;&lt;P&gt;If you already have a separate Management Network that already using for monitoring/management of other Network Devices etc then would suggest that wouldn't hurt to add an Interface in the VS to that VLAN as already done the majority of the work.&lt;/P&gt;&lt;P&gt;Obviously need to ensure that the SNMP connection wouldn't be reachable by multiple interfaces though of course that would be normal network design practice anyway.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2019 11:15:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-interface-on-virtual-systems/m-p/69523#M9573</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2019-12-06T11:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: Management interface on virtual systems</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-interface-on-virtual-systems/m-p/69537#M9574</link>
      <description>&lt;P&gt;Thank you very much for the feedback!&lt;/P&gt;&lt;P&gt;We have a separate management network, but I agree that it is worth considering if a new VLAN only for the SNMP traffic is actually valuable.&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Harry&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2019 13:22:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-interface-on-virtual-systems/m-p/69537#M9574</guid>
      <dc:creator>net-harry</dc:creator>
      <dc:date>2019-12-06T13:22:51Z</dc:date>
    </item>
    <item>
      <title>Re: Management interface on virtual systems</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-interface-on-virtual-systems/m-p/69539#M9575</link>
      <description>Don't forget to also add access to the VS's for the V3 user:&lt;BR /&gt;set snmp usm user &amp;lt;v3-user&amp;gt; vsid 1-5</description>
      <pubDate>Fri, 06 Dec 2019 13:25:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-interface-on-virtual-systems/m-p/69539#M9575</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-12-06T13:25:37Z</dc:date>
    </item>
  </channel>
</rss>

