<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SNMP VSX interface throughput in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46822#M9826</link>
    <description>&lt;P&gt;Actually no. It's on my to do list. I believe there are some ASG SNMP OIDs so they might have cross platform counters.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If SNMP is not that important you can always use asg perf outputs&lt;/P&gt;</description>
    <pubDate>Wed, 13 Mar 2019 20:12:42 GMT</pubDate>
    <dc:creator>Kaspars_Zibarts</dc:creator>
    <dc:date>2019-03-13T20:12:42Z</dc:date>
    <item>
      <title>SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/33925#M9820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a way to monitor an equivalent ifInOctets and ifOutOctets on the interfaces in a VS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have snmpwalked my VS and used the Check Point MIB but I just can't seem to find it. I see&amp;nbsp;fwAcceptPcktsOut and&amp;nbsp;fwAcceptPcktsIn etc. but that is not what I'm looking for. I want raw interface throughput.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I snmpwalk the normal OS I see all the interfaces that is not assigned to a VS so that leads me to think that I have to find them in the VS part of the snmpwalk.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there a way to do this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Ole&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/tag/snmp/tg-p"&gt;&lt;/A&gt;‌&lt;A href="https://community.checkpoint.com/t5/tag/vsx/tg-p"&gt;&lt;/A&gt;‌&lt;A href="https://community.checkpoint.com/t5/tag/monitoring/tg-p"&gt;&lt;/A&gt;‌&lt;A href="https://community.checkpoint.com/t5/tag/interface/tg-p"&gt;&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2018 12:20:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/33925#M9820</guid>
      <dc:creator>Ole_Jakobsen</dc:creator>
      <dc:date>2018-10-09T12:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/33926#M9821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk90860#Query%20VSX%20Gateway%20over%20SNMP"&gt;sk90860 How to configure SNMP on Gaia OS&lt;/A&gt; has a section about VSX including Traffic statistics per Virtual System.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2018 14:28:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/33926#M9821</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-10-09T14:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/33927#M9822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are couple of gotcha's with it: when you crate SNMP v3 user, remember to add access to VSes. This is just an example for you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;add snmp usm user test security-level authNoPriv auth-pass-phrase Vpn12345 authentication-protocol MD5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;set snmp usm user test vsid all&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then the trick is to use correct&amp;nbsp;context naming &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;ctxname_vsid&amp;lt;nbr&amp;gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;For example on VS3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;snmpwalk -v 3 -u test -a MD5 -A Vpn12345 -n &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;ctxname_vsid3&lt;/STRONG&gt;&lt;/SPAN&gt; -l authNoPriv localhost IF-MIB::ifInOctets&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.29 = Counter32: 2901170647&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.34 = Counter32: 82584654&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.38 = Counter32: 699082680&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.45 = Counter32: 3933321372&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.46 = Counter32: 3255273971&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.51 = Counter32: 4075777695&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.52 = Counter32: 2304373236&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.53 = Counter32: 4257852952&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.54 = Counter32: 696217932&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.59 = Counter32: 628306658&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.61 = Counter32: 3247362748&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.62 = Counter32: 4113833701&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.63 = Counter32: 3493776849&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.64 = Counter32: 779627878&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.66 = Counter32: 3388364414&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.72 = Counter32: 2462441968&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.75 = Counter32: 1636515736&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.80 = Counter32: 2985848821&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.81 = Counter32: 4077112618&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.84 = Counter32: 3163729674&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 12px;"&gt;IF-MIB::ifInOctets.86 = Counter32: 2093556065&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2018 08:55:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/33927#M9822</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-10-10T08:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46778#M9823</link>
      <description>Kaspar,&lt;BR /&gt;Do you know how to monitor the VSx on both machines of a VSLS cluster running on 64k?&lt;BR /&gt;Using SMO as the agent host for snmp I only get the VSs that are primary on the SMO machine ;-(&lt;BR /&gt;&lt;BR /&gt;UIPC required?</description>
      <pubDate>Wed, 13 Mar 2019 16:05:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46778#M9823</guid>
      <dc:creator>Declan__McGill</dc:creator>
      <dc:date>2019-03-13T16:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46800#M9824</link>
      <description>&lt;P&gt;One more....&lt;/P&gt;&lt;P&gt;starting from R80.10 you can monitor a VS directly via IP of the VS.&lt;/P&gt;&lt;P&gt;You have to enable&amp;nbsp;&lt;STRONG&gt;vs-direct access Mode&lt;/STRONG&gt;&lt;/P&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="2"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class="tablebodytext"&gt;set snmp vs-direct-access on&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P class="tablebodytext"&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_VSX_AdminGuide/html_frameset.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_VSX_AdminGuide/html_frameset.htm&lt;/A&gt;&lt;/P&gt;&lt;P class="tablebodytext"&gt;Snmp section.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 17:37:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46800#M9824</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2019-03-13T17:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46809#M9825</link>
      <description>&lt;P&gt;One more...&lt;/P&gt;
&lt;P&gt;Starting from R80.30 VSX-IDs are also supported in Netflow&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76958_chknetflow-vsx.JPG" border="0" alt="" /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 18:44:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46809#M9825</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-03-13T18:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46822#M9826</link>
      <description>&lt;P&gt;Actually no. It's on my to do list. I believe there are some ASG SNMP OIDs so they might have cross platform counters.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If SNMP is not that important you can always use asg perf outputs&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 20:12:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46822#M9826</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2019-03-13T20:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46944#M9827</link>
      <description>&lt;P&gt;You might want to use High Capacity MiBs -&amp;nbsp;&lt;SPAN&gt;ifHCInOctets/ifHCOutOctets instead of&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;ifInOctets/ifOutOctets. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.ietf.org/rfc/rfc2233.txt" target="_self"&gt;RFC 2233&lt;/A&gt; adopted expanded 64-bit counters for high capacity interfaces in which 32-bit counters do not provide enough&amp;nbsp;capacity and wrap too fast.&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;As the speed of network media increase, the minimum time in which
   a 32 bit counter will wrap decreases.  For example, a 10Mbs stream
   of back-to-back, full-size packets causes ifInOctets to wrap in
   just over 57 minutes; at 100Mbs, the minimum wrap time is 5.7
   minutes, and at 1Gbs, the minimum is 34 seconds.  Requiring that
   interfaces be polled frequently enough not to miss a counter wrap
   is increasingly problematic.
&lt;BR /&gt;&amp;lt;...&amp;gt;

   Instead, this memo adopts expanded, 64 bit, counters.  These
   counters are provided in new "high capacity" groups.  The old,
   32-bit, counters have not been deprecated.  The 64-bit counters
   are to be used only when the 32-bit counters do not provide enough
   capacity; that is, when the 32 bit counters could wrap too fast.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 15:50:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/46944#M9827</guid>
      <dc:creator>Maria_Pologova</dc:creator>
      <dc:date>2019-03-14T15:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/47009#M9828</link>
      <description>Thanks Kaspar. I'm already doing a real spaghetti job to get the info required from the chassis; python scripts to pull asg and vsx info and translate to json for telegraf + all the SNMP stuff that is usable. Everbody I asked assumed (including me) that cross chassis support was there. Will probably go the UIPC route.</description>
      <pubDate>Fri, 15 Mar 2019 08:41:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/47009#M9828</guid>
      <dc:creator>Declan__McGill</dc:creator>
      <dc:date>2019-03-15T08:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/47011#M9829</link>
      <description>&lt;P&gt;For sure! The 32bit counters overrun in a few hours on some interfaces.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Doesn't help with getting the info from the VSs on the second chassis though.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 08:48:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/47011#M9829</guid>
      <dc:creator>Declan__McGill</dc:creator>
      <dc:date>2019-03-15T08:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/76983#M9830</link>
      <description>&lt;P&gt;one thing to note - it is not possible to get the interface utilization for warp interfaces via these oids.&lt;/P&gt;&lt;P&gt;/Henrik&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 12:11:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/76983#M9830</guid>
      <dc:creator>Henrik_Noerr1</dc:creator>
      <dc:date>2020-03-03T12:11:04Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/77541#M9831</link>
      <description>&lt;P&gt;Hello!&lt;BR /&gt;I found this thread via googling, so I thought I may give some of the insight I've acquired.&lt;/P&gt;&lt;P&gt;As someone already stated, WRP interfaces as of R80.30 is not possible to get counters from.&lt;BR /&gt;I haven't found an OID which does give this info, nor does CPVIEW in expert mode in that VS-instance give correct either.&lt;BR /&gt;&lt;BR /&gt;I have however, found OIDs that seems good enough, and they have promised that R80.40 will show better / accurate data in CPview for VSs.&lt;BR /&gt;Here's hoping that we can see WRP-data ....&lt;BR /&gt;&lt;BR /&gt;Regardless, I wrote a python program to test some OIDs out.&lt;BR /&gt;The ones I found to work best in accordance to CPView is:&lt;/P&gt;&lt;P&gt;RX:&amp;nbsp;1.3.6.1.4.1.2620.1.6.50.1.1.13&lt;BR /&gt;TX:&amp;nbsp;1.3.6.1.4.1.2620.1.6.50.1.1.17&lt;BR /&gt;&lt;BR /&gt;Also as some have mentioned, I recommend enabling VS direct access via SNMP, so far it works really well.&lt;BR /&gt;I do not know as of yet if it has any lack of support compared to the other SNMP models, but from what I've seen, it works.&lt;BR /&gt;&lt;BR /&gt;Seeing as you're looking for interface data, I assume you will be looking at CPU sooner or later.&lt;BR /&gt;Unfortunately I can say it seems to be even worse there.&lt;BR /&gt;&lt;BR /&gt;Best way from what I've found, if you want to gather rather correct data, is to use the top command in VS0, and look for the FWK-process for each VS.&lt;/P&gt;&lt;P&gt;E.g.:&lt;BR /&gt;top -n 1 | grep fwk&lt;BR /&gt;Should give something like:&lt;/P&gt;&lt;P&gt;27618 admin 0 -20 4436m 3.6g 613m S 12 2.8 6258:39 fwk6_dev_0&lt;/P&gt;&lt;P&gt;12 % CPU utilization (where 1 core is 100 %), and this is for VS 6, as you see in fwk"6".&lt;BR /&gt;&lt;BR /&gt;It seems to be a bit of a hassle to monitor this easily via your own means....&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2020 07:34:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/77541#M9831</guid>
      <dc:creator>HenrikJ</dc:creator>
      <dc:date>2020-03-07T07:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP VSX interface throughput</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/101375#M9832</link>
      <description>&lt;P&gt;Do you know how to get the correct number of cores reported in Solarwinds or PRTG?&lt;/P&gt;&lt;P&gt;At this point I'm using SNMPv3 and pointing to the VS IPs, which has been discovered, but I've noted that each VS discovered is just picking up the total number of cores on the physical appliance which is really annoying.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Nov 2020 16:03:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SNMP-VSX-interface-throughput/m-p/101375#M9832</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2020-11-07T16:03:39Z</dc:date>
    </item>
  </channel>
</rss>

