<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: F5 BIG-IP ICAP and SandBlast (TEX) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40593#M13764</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the F5 BIG-IP it's also posible to queue the connections to the ICAP server when there is a connection limit set on the connections to the ICAP server. I've tested it, and it works. Here is how to do it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Enable Request Queueing on the SandBlast_ICAP_Pool (see Advanced options).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71269" alt="Enable Request Queueing" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71269_enable_request_queueing.png" /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Set connection limit to the SandBlast ICAP Pool member.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;IMG __jive_id="71270" alt="Connection Limit" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71270_connection_limit.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, in this example the limit of connections towards the ICAP server is set to 5 and Request Queing is enabled. See below the benchmark test without these settings applied and another with the settings applied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;10 requests with 10 requests concurrent and as expected 5 are failing, because the limit is set to 5 and there is no queueing.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;IMG __jive_id="71273" alt="example without connection queueing" class="image-5 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71273_ab_failed.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;10 requests with 10 requests concurrent and as expected and no failing connections, because queueing is enabled.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71274" alt="example with connection queueing" class="image-6 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71274_ab_okay.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;I'll add this to the iApp template soon &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The iApp template now sets the default connection limit of the SandBlast ICAP Server to 100 connections and also Requeust Queueing is enabled on the SandBlast ICAP Server pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;--Niels&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 07 Oct 2018 06:50:47 GMT</pubDate>
    <dc:creator>Niels_van_Sluis</dc:creator>
    <dc:date>2018-10-07T06:50:47Z</dc:date>
    <item>
      <title>F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40584#M13755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H3 style="color: #24292e; font-weight: 600; font-size: 1.25em; margin-top: 24px; margin-bottom: 16px;"&gt;Enable SandBlast ICAP server&lt;/H3&gt;&lt;P style="color: #24292e; font-weight: 400; margin-bottom: 16px;"&gt;Login to export mode and start the ICAP server on the TEX appliance or security gateway.&lt;/P&gt;&lt;PRE style="color: #24292e; background-color: #f6f8fa; font-weight: 400; margin-bottom: 16px; padding: 16px;"&gt;[Expert@cp-fw-01:0]# icap_server start&lt;BR /&gt;cpwd_admin:&amp;nbsp; Process CICAP started successfully (pid=31792)&amp;nbsp; &lt;BR /&gt;[Expert@cp-fw-01:0]# &lt;/PRE&gt;&lt;P style="color: #24292e; font-weight: 400; margin-bottom: 16px;"&gt;Check if the ICAP processes are running.&lt;/P&gt;&lt;PRE style="color: #24292e; background-color: #f6f8fa; font-weight: 400; margin-bottom: 16px; padding: 16px;"&gt;[Expert@cp-fw-01:0]#&amp;nbsp; ps -def |grep icap admin&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;31792&amp;nbsp; 4631&amp;nbsp; 0 19:19 ?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00:00:00 c-icap -N -f /opt/CPsuite-R77/fw1/c-icap/etc/c-icap.conf admin&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;31813 31792&amp;nbsp; 0 19:19 ?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00:00:00 c-icap -N -f /opt/CPsuite-R77/fw1/c-icap/etc/c-icap.conf admin&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;31820 31792&amp;nbsp; 0 19:19 ?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00:00:00 c-icap -N -f /opt/CPsuite-R77/fw1/c-icap/etc/c-icap.conf admin&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;31826 31792&amp;nbsp; 0 19:19 ?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00:00:00 c-icap -N -f /opt/CPsuite-R77/fw1/c-icap/etc/c-icap.conf admin&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;31931 31651&amp;nbsp; 0 19:20 pts/1&amp;nbsp;&amp;nbsp;&amp;nbsp; 00:00:00 grep icap &lt;BR /&gt;[Expert@cp-fw-01:0]# &lt;/PRE&gt;&lt;P style="color: #24292e; font-weight: 400; margin-bottom: 16px;"&gt;Enable ICAP logging.&lt;/P&gt;&lt;PRE style="color: #24292e; background-color: #f6f8fa; font-weight: 400; margin-bottom: 16px; padding: 16px;"&gt;[Expert@cp-fw-01:0]# tecli advanced remote emulator logs enable &lt;BR /&gt;remote emulator logs set to enabled successfully &lt;BR /&gt;[Expert@cp-fw-01:0]# &lt;/PRE&gt;&lt;P style="color: #24292e; font-weight: 400; margin-bottom: 16px;"&gt;Also make sure that your firewall rules allow access to the ICAP server port 1344/TCP on the TEX appliance or security gateway.&lt;/P&gt;&lt;P style="color: #24292e; font-weight: 400; margin-bottom: 16px;"&gt;Please note that Jumbo Hotfix Accumulator Take_&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;286&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; border: 0px; text-decoration: none; margin: 0px;"&gt;or higher&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for R77.30 should be used.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #24292e; font-weight: 400; margin-bottom: 16px;"&gt;More information can be found in sk111306:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111306" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111306"&gt;Check Point support for Internet Content Adaptation Protocol (ICAP) server&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;H3 style="color: #24292e; font-weight: 600; font-size: 1.25em; margin-top: 24px; margin-bottom: 16px;"&gt;Prepare the F5 BIG-IP&lt;/H3&gt;&lt;P&gt;&lt;SPAN style="color: #495057; background-color: #ffffff;"&gt;Download the f5.checkpoint_sandblast_icap iApp template from the link below. This is an iApp template that creates ICAP related elements (nodes, pool, internal virtual server, profiles). The newly created request and response adapt profiles can be used by standard virtual servers so they can interact with a Check Point SandBlast ICAP Server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #495057; background-color: #ffffff;"&gt;&lt;A class="link-titled" href="https://github.com/nvansluis/f5.checkpoint_sandblast_icap" title="https://github.com/nvansluis/f5.checkpoint_sandblast_icap"&gt;GitHub - nvansluis/f5.checkpoint_sandblast_icap: iApp template to integrate F5 BIG-IP with Check Point SandBlast ICAP se…&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="color: #495057; background-color: #ffffff;"&gt;Login to the Configuration Utility and Import the iApp template:&amp;nbsp;&lt;STRONG&gt;iApps &amp;gt; Templates &amp;gt; Import&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #495057; background-color: #ffffff;"&gt;&lt;IMG __jive_id="71255" alt="Import the iApp template" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71255_import_template.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Deploy a new application by using the iApp:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold;"&gt;&lt;STRONG&gt;iApps &amp;gt; Application Services &amp;gt; Applications &amp;gt; Create&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Deploy a new application by using the iApp template" class="image-11 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71276_deploy_iapp.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL style="color: #495057; background-color: #ffffff; margin-bottom: 11px;"&gt;&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold;"&gt;&lt;STRONG&gt;&lt;EM&gt;Finished&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to deploy the iApp. You will see the components that have been configured.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71257" alt="Overview of components being created by the iApp" class="image-3 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71257_components.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL style="color: #495057; background-color: #ffffff; margin-bottom: 11px;"&gt;&lt;LI&gt;You can now use the newly created Request and Response Adapt profiles and attach them to a Virtual Server that has been configured with a HTTP profile.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71258" alt="You can now use the created Request and Response Adapt profiles on a Virtual Server" class="image-4 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71258_adapt_profiles.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H1&gt;&lt;SPAN style="color: #000000;"&gt;Testing Check Point SandBlast&lt;/SPAN&gt;&lt;/H1&gt;&lt;P style="color: #495057; background-color: #ffffff; margin: 0px 0px 22px;"&gt;Below you'll see some screenshots of what happens when a user attempts to upload or download malicous files.&lt;/P&gt;&lt;H3 style="color: #24292e; font-weight: 600; font-size: 1.25em; margin-top: 24px; margin-bottom: 16px;"&gt;&lt;SPAN style="color: #808080;"&gt;Malicious uploads&lt;/SPAN&gt;&lt;/H3&gt;&lt;UL style="color: #495057; background-color: #ffffff; margin-bottom: 11px;"&gt;&lt;LI&gt;Upload a file that triggers Threat Emulation (Zero-Day Protection).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71259" alt="Upload malicious file" class="image-5 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71259_upload_zero_day.png" /&gt;&lt;/P&gt;&lt;UL style="color: #495057; background-color: #ffffff; margin-bottom: 11px;"&gt;&lt;LI&gt;The upload of this malicious file is prevented by Check Point SandBlast.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71260" alt="Upload prevented" class="image-6 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71260_zero-day-detection.png" /&gt;&lt;/P&gt;&lt;UL style="color: #495057; background-color: #ffffff; margin-bottom: 11px;"&gt;&lt;LI&gt;Here you can see the log message that is created by Check Point.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71261" alt="Log message" class="image-7 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71261_zero-day_prevent.png" /&gt;&lt;/P&gt;&lt;H3 style="color: #24292e; font-weight: 600; font-size: 1.25em; margin-top: 24px; margin-bottom: 16px;"&gt;&lt;SPAN style="color: #808080;"&gt;Malicious downloads&lt;/SPAN&gt;&lt;/H3&gt;&lt;UL style="color: #495057; background-color: #ffffff; margin-bottom: 11px;"&gt;&lt;LI&gt;A user tries to download a malicious file.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71262" alt="User tries to download a malicious file" class="image-8 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71262_download_file.png" /&gt;&lt;/P&gt;&lt;UL style="color: #495057; background-color: #ffffff; margin-bottom: 11px;"&gt;&lt;LI&gt;The download of a malicious file is prevented by Check Point SandBlast.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71263" alt="download prevented" class="image-9 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71263_download_virus_found_message.png" /&gt;&lt;/P&gt;&lt;UL style="color: #495057; background-color: #ffffff; margin-bottom: 11px;"&gt;&lt;LI&gt;Below of an example what log message is created by Check Point.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71264" alt="Log message" class="image-10 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71264_eicar_log_message.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 15:30:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40584#M13755</guid>
      <dc:creator>Niels_van_Sluis</dc:creator>
      <dc:date>2018-10-06T15:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40585#M13756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/42756"&gt;Niels van Sluis&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nice!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have one problem with this configuration! On the F5 config, you can not set the max. ICAP connections setting. If the maximum ICAP connection number is exceeded, you will get an ICAP error.&amp;nbsp;I had a big customer who had a real problem with that. During testing this is not noticeable at first, because the max. connection number is usually not reached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the iApp, there is also no entry for max. connections to see in your pictures. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I work a lot with F5 and I have not found a solution for this problem. No iRules or other solutions are possible.&lt;/P&gt;&lt;P&gt;I already had a ticket for this topic at F5 and Check Point open. But without success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a solution write it here please. I'd be very happy if there was a solution.&lt;/P&gt;&lt;P&gt;Otherwise I'd be careful!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With a Symantec (Bluecoat) SG, Fortigate, Squid or McAfee Web Gateway this works without problems.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2811"&gt;Symantec (Bluecoat) SG ICAP and Sandblast (TEX)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2800"&gt;Fortigate Firewall ICAP and Sandblast (TEX)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2814"&gt;McAfee Web Gateway ICAP and Sandblast Appliance (TEX)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe &lt;A href="https://community.checkpoint.com/migrated-users/2060"&gt;Thomas Werner&lt;/A&gt; from Check Point has a solution or more informations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 17:15:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40585#M13756</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-06T17:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40586#M13757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;&lt;A _jive_internal="true" data-containerid="-1" data-containertype="-1" data-objectid="42756" data-objecttype="3" href="https://community.checkpoint.com/people/nielsbdc7ec62-af12-4ae0-bbe9-09ee3c6683ab"&gt;Niels van Sluis&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just looked at the iApp template.&lt;/P&gt;&lt;P&gt;In the iApps template I also didn't see anything about max ICAP connections!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I find the article great but please be careful without max. ICAP connection settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 17:40:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40586#M13757</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-06T17:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40587#M13758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your feedback, I'll look in to this. I didn't know this to be an issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;--Niels&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 17:44:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40587#M13758</guid>
      <dc:creator>Niels_van_Sluis</dc:creator>
      <dc:date>2018-10-06T17:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40588#M13759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I assume setting the Connection Limit on the SandBlast_ICAP_Pool pool member didn't work? Do you have an easy way of reproducing this error?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been testing, but all seems okay (although my firewall had a load of 64). See the below output.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[nielsvs@localhost ~]$ ab -n 1000 -c 200 &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://10.23.98.219/F5/upload/uploads/eicar_com.zip" rel="nofollow"&gt;http://10.23.98.219/F5/upload/uploads/eicar_com.zip&lt;/A&gt;&lt;BR /&gt;This is ApacheBench, Version 2.3 &amp;lt;$Revision: 1706008 $&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;Copyright 1996 Adam Twiss, Zeus Technology Ltd, &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.zeustech.net/" rel="nofollow"&gt;http://www.zeustech.net/&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;Licensed to The Apache Software Foundation, &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.apache.org/" rel="nofollow"&gt;http://www.apache.org/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Benchmarking 10.23.98.219 (be patient)&lt;BR /&gt;Completed 100 requests&lt;BR /&gt;Completed 200 requests&lt;BR /&gt;Completed 300 requests&lt;BR /&gt;Completed 400 requests&lt;BR /&gt;Completed 500 requests&lt;BR /&gt;Completed 600 requests&lt;BR /&gt;Completed 700 requests&lt;BR /&gt;Completed 800 requests&lt;BR /&gt;Completed 900 requests&lt;BR /&gt;Completed 1000 requests&lt;BR /&gt;Finished 1000 requests&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Server Software: C-ICAP&lt;BR /&gt;Server Hostname: 10.23.98.219&lt;BR /&gt;Server Port: 80&lt;/P&gt;&lt;P&gt;Document Path: /F5/upload/uploads/eicar_com.zip&lt;BR /&gt;Document Length: 459 bytes&lt;/P&gt;&lt;P&gt;Concurrency Level: 200&lt;BR /&gt;Time taken for tests: 155.535 seconds&lt;BR /&gt;Complete requests: 1000&lt;BR /&gt;Failed requests: 0&lt;BR /&gt;Non-2xx responses: 1000&lt;BR /&gt;Total transferred: 625000 bytes&lt;BR /&gt;HTML transferred: 459000 bytes&lt;BR /&gt;Requests per second: 6.43 [#/sec] (mean)&lt;BR /&gt;Time per request: 31106.983 [ms] (mean)&lt;BR /&gt;Time per request: 155.535 [ms] (mean, across all concurrent requests)&lt;BR /&gt;Transfer rate: 3.92 [Kbytes/sec] received&lt;/P&gt;&lt;P&gt;Connection Times (ms)&lt;BR /&gt; min mean[+/-sd] median max&lt;BR /&gt;Connect: 0 2 2.6 1 10&lt;BR /&gt;Processing: 1219 29546 7854.4 29687 56783&lt;BR /&gt;Waiting: 1219 29545 7854.3 29687 56782&lt;BR /&gt;Total: 1229 29548 7853.1 29688 56787&lt;/P&gt;&lt;P&gt;Percentage of the requests served within a certain time (ms)&lt;BR /&gt; 50% 29688&lt;BR /&gt; 66% 32377&lt;BR /&gt; 75% 34387&lt;BR /&gt; 80% 35846&lt;BR /&gt; 90% 38867&lt;BR /&gt; 95% 41347&lt;BR /&gt; 98% 43732&lt;BR /&gt; 99% 45058&lt;BR /&gt; 100% 56787 (longest request)&lt;BR /&gt;[nielsvs@localhost ~]$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;--Niels&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 18:36:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40588#M13759</guid>
      <dc:creator>Niels_van_Sluis</dc:creator>
      <dc:date>2018-10-06T18:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40589#M13760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;&lt;A _jive_internal="true" data-containerid="-1" data-containertype="-1" data-objectid="42756" data-objecttype="3" href="https://community.checkpoint.com/people/nielsbdc7ec62-af12-4ae0-bbe9-09ee3c6683ab"&gt;Niels van Sluis&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This does not describe the maximum number of connections over the F5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is the maximum number of connections between ICAP Server and ICAP Client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can limit this on a Symantec (Bluecoat) SG as follows:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71265_pastedImage_1.png" /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;It doesn't work on F5. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, the TE Appliance provides 100 ICAP TCP sockets and the 101 connection between F5 and TEX Appliance is established, an ICAP error occurs. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 19:27:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40589#M13760</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-06T19:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40590#M13761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When setting the pool members (read: the pool member is the SandBlast ICAP server) connection limit to for example 50, it does limit the ICAP connections being sent to the SandBlast ICAP server. However, this seems to result in the virtual server that has the adapt profiles attached become unavailable (connections being rejected). What happens on the Bluecoat when the Maximum number of connections to the SandBlast ICAP server is being reached? Will it just serve the requests without content scanning (fail-open) or will it reject requests&amp;nbsp;until resources become available again?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;--Niels&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 19:44:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40590#M13761</guid>
      <dc:creator>Niels_van_Sluis</dc:creator>
      <dc:date>2018-10-06T19:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40591#M13762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Bluecoat SG is running a queuing of objects until one of the ICAP TCP connections can process a request. This may make everything very slow. But there are no ICAP errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, you can adjust the parameters on the TEX Appliance in the following file:&lt;/P&gt;&lt;P&gt;$FWDIR/c-icap/etc/c-icap.conf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't have a system to test right now. Please read the infos under the following link:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="http://c-icap.sourceforge.net/c-icap.conf-0.5.x.html" title="http://c-icap.sourceforge.net/c-icap.conf-0.5.x.html"&gt;The c-icap project&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 20:01:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40591#M13762</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-06T20:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40592#M13763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I said, I do not think it is reasonable to limit it to the F5.&lt;/P&gt;&lt;P&gt;So I wouldn't use it in critical environments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm a big fan of F5 and Check Point. But here I don't see any solution for the problem at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But maybe ask &lt;A _jive_internal="true" data-containerid="-1" data-containertype="-1" data-objectid="2060" data-objecttype="3" href="https://community.checkpoint.com/people/twern0985bf30-0028-461b-b9ff-e29148674fe2"&gt;Thomas Werner&lt;/A&gt; from Check Point.&amp;nbsp;He's very good at TEX and ICAP&amp;nbsp; themes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 20:10:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40592#M13763</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-06T20:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40593#M13764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the F5 BIG-IP it's also posible to queue the connections to the ICAP server when there is a connection limit set on the connections to the ICAP server. I've tested it, and it works. Here is how to do it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Enable Request Queueing on the SandBlast_ICAP_Pool (see Advanced options).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71269" alt="Enable Request Queueing" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71269_enable_request_queueing.png" /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Set connection limit to the SandBlast ICAP Pool member.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;IMG __jive_id="71270" alt="Connection Limit" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71270_connection_limit.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, in this example the limit of connections towards the ICAP server is set to 5 and Request Queing is enabled. See below the benchmark test without these settings applied and another with the settings applied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;10 requests with 10 requests concurrent and as expected 5 are failing, because the limit is set to 5 and there is no queueing.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;IMG __jive_id="71273" alt="example without connection queueing" class="image-5 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71273_ab_failed.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;10 requests with 10 requests concurrent and as expected and no failing connections, because queueing is enabled.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71274" alt="example with connection queueing" class="image-6 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71274_ab_okay.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;I'll add this to the iApp template soon &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The iApp template now sets the default connection limit of the SandBlast ICAP Server to 100 connections and also Requeust Queueing is enabled on the SandBlast ICAP Server pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;--Niels&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2018 06:50:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40593#M13764</guid>
      <dc:creator>Niels_van_Sluis</dc:creator>
      <dc:date>2018-10-07T06:50:47Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40594#M13765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very nice! I'll give you 100 points&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more small question. Which F5 version do you use 12 or 13?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2018 19:07:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40594#M13765</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-07T19:07:22Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40595#M13766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the point and feedback. In my lab I have version 14 running. But the functionality being used in the iApp template is also available in version 12 and 13. But I guess also in version 11.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; --Niels&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Oct 2018 07:05:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40595#M13766</guid>
      <dc:creator>Niels_van_Sluis</dc:creator>
      <dc:date>2018-10-08T07:05:25Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40596#M13767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko, Niels,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Israel I talked with Heiko about the cons/pros of ICAP as mentioned here, and we talked about an idea to implement the ThreatPrevention API via an iRule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you guys think. Will it work ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Martijn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2018 09:29:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40596#M13767</guid>
      <dc:creator>MartijnElzenaar</dc:creator>
      <dc:date>2018-10-26T09:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: F5 BIG-IP ICAP and SandBlast (TEX)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40597#M13768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;SPAN class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/people/1b537802-442a-4bae-9d5b-a881323044a2"&gt;Martijn,&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Hi &lt;A _jive_internal="true" href="https://community.checkpoint.com/people/bdc7ec62-af12-4ae0-bbe9-09ee3c6683ab"&gt;Niels,&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Yes, I had an interesting conversation with &lt;SPAN class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/people/1b537802-442a-4bae-9d5b-a881323044a2"&gt;Martijn&lt;/A&gt;&lt;/SPAN&gt; in Israel.&amp;nbsp;Sometimes the world is small:-) I think it is possible to send the file via iRule directly to the Sandblast API via https. I'm gonna take a look at this in a quiet minute. It won't be easy, but it should work.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Regard&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Heiko&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2018 11:45:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/F5-BIG-IP-ICAP-and-SandBlast-TEX/m-p/40597#M13768</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-26T11:45:39Z</dc:date>
    </item>
  </channel>
</rss>

