<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall Decom: Investigating Interface Traffic in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258949#M50796</link>
    <description>&lt;P&gt;CPview showed the 0 traffic interfaces but also trying to see interfaces with syn sent traffic since there has been a lot of uplift in moving to the cloud.&lt;/P&gt;&lt;P&gt;ip route | grep “scope link” | awk ‘{print $1, $3}’&lt;/P&gt;&lt;P&gt;so far in smart view I have a query for (((original:”fw”)(“ethX”)) AND (NOT action:”Drop”)) AND (“Subnet from IP route command)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can create an excel spreadsheet from here but there isn’t a good way to also filter for syn sent traffic to really narrow down which devices are no longer in service behind that interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 03 Oct 2025 19:06:06 GMT</pubDate>
    <dc:creator>Fatalis</dc:creator>
    <dc:date>2025-10-03T19:06:06Z</dc:date>
    <item>
      <title>Firewall Decom: Investigating Interface Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258926#M50786</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’m currently working on decommissioning a soon to be EOL firewall and want to insure we don’t remove any interfaces that are still in use.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;How did others here perform interface traffic investigations to determine which sub-interfaces were still actively used?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;maybe some tips on automating these checks as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance for sharing your experience!&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 15:49:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258926#M50786</guid>
      <dc:creator>Fatalis</dc:creator>
      <dc:date>2025-10-03T15:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Decom: Investigating Interface Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258930#M50790</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk101878" target="_self"&gt;CPView&lt;/A&gt;&lt;/STRONG&gt; provides real-time and historical performance data, including traffic stats per interface. &lt;/SPAN&gt;&lt;CODE&gt;
&lt;/CODE&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Navigate to Network &amp;gt; Interfaces&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;You'll see traffic stats like packets per second, bytes in/out, errors, drops, etc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;CPView stores up to 7 days of historical data&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Use the arrow keys to scroll through time and observe traffic trends&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Look for interfaces with consistent zero traffic &amp;gt; likely candidates for decommissioning&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://community.checkpoint.com/t5/Telemetry/System-Activity-Report-SAR-visualization/m-p/173783/highlight/true#M16" target="_self"&gt;System Activity Report (SAR)&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;easily visualize if there is any traffic on your network interfaces&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/documents/R82/SmartConsole_OLH/EN/Topics-OLH/Home-Page.htm" target="_self"&gt;SmartConsole&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;look up interfaces statics and logs directly in Check Point's SmartConsole in case you have access to it&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 03 Oct 2025 18:27:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258930#M50790</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2025-10-03T18:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Decom: Investigating Interface Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258931#M50791</link>
      <description>&lt;P&gt;I would agree with Danny that cpview is definitely your best bet. You can also use ethtool -S as well, below is example from my lab.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;[Expert@CP-GW:0]# ethtool -S eth0&lt;BR /&gt;NIC statistics:&lt;BR /&gt;Tx Queue#: 0&lt;BR /&gt;TSO pkts tx: 0&lt;BR /&gt;TSO bytes tx: 0&lt;BR /&gt;ucast pkts tx: 334970&lt;BR /&gt;ucast bytes tx: 45103164&lt;BR /&gt;mcast pkts tx: 0&lt;BR /&gt;mcast bytes tx: 0&lt;BR /&gt;bcast pkts tx: 0&lt;BR /&gt;bcast bytes tx: 0&lt;BR /&gt;pkts tx err: 0&lt;BR /&gt;pkts tx discard: 0&lt;BR /&gt;drv dropped tx total: 0&lt;BR /&gt;too many frags: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;hdr err: 0&lt;BR /&gt;tso: 0&lt;BR /&gt;ring full: 0&lt;BR /&gt;pkts linearized: 0&lt;BR /&gt;hdr cloned: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;Tx Queue#: 1&lt;BR /&gt;TSO pkts tx: 0&lt;BR /&gt;TSO bytes tx: 0&lt;BR /&gt;ucast pkts tx: 153593388&lt;BR /&gt;ucast bytes tx: 13252708906&lt;BR /&gt;mcast pkts tx: 0&lt;BR /&gt;mcast bytes tx: 0&lt;BR /&gt;bcast pkts tx: 359&lt;BR /&gt;bcast bytes tx: 15078&lt;BR /&gt;pkts tx err: 0&lt;BR /&gt;pkts tx discard: 0&lt;BR /&gt;drv dropped tx total: 0&lt;BR /&gt;too many frags: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;hdr err: 0&lt;BR /&gt;tso: 0&lt;BR /&gt;ring full: 0&lt;BR /&gt;pkts linearized: 0&lt;BR /&gt;hdr cloned: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;Tx Queue#: 2&lt;BR /&gt;TSO pkts tx: 0&lt;BR /&gt;TSO bytes tx: 0&lt;BR /&gt;ucast pkts tx: 348933&lt;BR /&gt;ucast bytes tx: 28255078&lt;BR /&gt;mcast pkts tx: 0&lt;BR /&gt;mcast bytes tx: 0&lt;BR /&gt;bcast pkts tx: 0&lt;BR /&gt;bcast bytes tx: 0&lt;BR /&gt;pkts tx err: 0&lt;BR /&gt;pkts tx discard: 0&lt;BR /&gt;drv dropped tx total: 0&lt;BR /&gt;too many frags: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;hdr err: 0&lt;BR /&gt;tso: 0&lt;BR /&gt;ring full: 0&lt;BR /&gt;pkts linearized: 0&lt;BR /&gt;hdr cloned: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;Tx Queue#: 3&lt;BR /&gt;TSO pkts tx: 0&lt;BR /&gt;TSO bytes tx: 0&lt;BR /&gt;ucast pkts tx: 347901&lt;BR /&gt;ucast bytes tx: 56831727&lt;BR /&gt;mcast pkts tx: 0&lt;BR /&gt;mcast bytes tx: 0&lt;BR /&gt;bcast pkts tx: 0&lt;BR /&gt;bcast bytes tx: 0&lt;BR /&gt;pkts tx err: 0&lt;BR /&gt;pkts tx discard: 0&lt;BR /&gt;drv dropped tx total: 0&lt;BR /&gt;too many frags: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;hdr err: 0&lt;BR /&gt;tso: 0&lt;BR /&gt;ring full: 0&lt;BR /&gt;pkts linearized: 0&lt;BR /&gt;hdr cloned: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;Tx Queue#: 4&lt;BR /&gt;TSO pkts tx: 0&lt;BR /&gt;TSO bytes tx: 0&lt;BR /&gt;ucast pkts tx: 76955137&lt;BR /&gt;ucast bytes tx: 6682824805&lt;BR /&gt;mcast pkts tx: 0&lt;BR /&gt;mcast bytes tx: 0&lt;BR /&gt;bcast pkts tx: 0&lt;BR /&gt;bcast bytes tx: 0&lt;BR /&gt;pkts tx err: 0&lt;BR /&gt;pkts tx discard: 0&lt;BR /&gt;drv dropped tx total: 0&lt;BR /&gt;too many frags: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;hdr err: 0&lt;BR /&gt;tso: 0&lt;BR /&gt;ring full: 0&lt;BR /&gt;pkts linearized: 0&lt;BR /&gt;hdr cloned: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;Tx Queue#: 5&lt;BR /&gt;TSO pkts tx: 0&lt;BR /&gt;TSO bytes tx: 0&lt;BR /&gt;ucast pkts tx: 869589&lt;BR /&gt;ucast bytes tx: 762671634&lt;BR /&gt;mcast pkts tx: 0&lt;BR /&gt;mcast bytes tx: 0&lt;BR /&gt;bcast pkts tx: 0&lt;BR /&gt;bcast bytes tx: 0&lt;BR /&gt;pkts tx err: 0&lt;BR /&gt;pkts tx discard: 0&lt;BR /&gt;drv dropped tx total: 0&lt;BR /&gt;too many frags: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;hdr err: 0&lt;BR /&gt;tso: 0&lt;BR /&gt;ring full: 0&lt;BR /&gt;pkts linearized: 0&lt;BR /&gt;hdr cloned: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;Tx Queue#: 6&lt;BR /&gt;TSO pkts tx: 0&lt;BR /&gt;TSO bytes tx: 0&lt;BR /&gt;ucast pkts tx: 440299&lt;BR /&gt;ucast bytes tx: 132009956&lt;BR /&gt;mcast pkts tx: 0&lt;BR /&gt;mcast bytes tx: 0&lt;BR /&gt;bcast pkts tx: 0&lt;BR /&gt;bcast bytes tx: 0&lt;BR /&gt;pkts tx err: 0&lt;BR /&gt;pkts tx discard: 0&lt;BR /&gt;drv dropped tx total: 0&lt;BR /&gt;too many frags: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;hdr err: 0&lt;BR /&gt;tso: 0&lt;BR /&gt;ring full: 0&lt;BR /&gt;pkts linearized: 0&lt;BR /&gt;hdr cloned: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;Tx Queue#: 7&lt;BR /&gt;TSO pkts tx: 0&lt;BR /&gt;TSO bytes tx: 0&lt;BR /&gt;ucast pkts tx: 471514&lt;BR /&gt;ucast bytes tx: 45065140&lt;BR /&gt;mcast pkts tx: 0&lt;BR /&gt;mcast bytes tx: 0&lt;BR /&gt;bcast pkts tx: 0&lt;BR /&gt;bcast bytes tx: 0&lt;BR /&gt;pkts tx err: 0&lt;BR /&gt;pkts tx discard: 0&lt;BR /&gt;drv dropped tx total: 0&lt;BR /&gt;too many frags: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;hdr err: 0&lt;BR /&gt;tso: 0&lt;BR /&gt;ring full: 0&lt;BR /&gt;pkts linearized: 0&lt;BR /&gt;hdr cloned: 0&lt;BR /&gt;giant hdr: 0&lt;BR /&gt;Rx Queue#: 0&lt;BR /&gt;LRO pkts rx: 5035613&lt;BR /&gt;LRO byte rx: 7623453773&lt;BR /&gt;ucast pkts rx: 236157971&lt;BR /&gt;ucast bytes rx: 48848667488&lt;BR /&gt;mcast pkts rx: 2&lt;BR /&gt;mcast bytes rx: 238&lt;BR /&gt;bcast pkts rx: 1748031&lt;BR /&gt;bcast bytes rx: 106465947&lt;BR /&gt;pkts rx OOB: 0&lt;BR /&gt;pkts rx err: 0&lt;BR /&gt;drv dropped rx total: 0&lt;BR /&gt;err: 0&lt;BR /&gt;fcs: 0&lt;BR /&gt;rx buf alloc fail: 0&lt;BR /&gt;Rx Queue#: 1&lt;BR /&gt;LRO pkts rx: 0&lt;BR /&gt;LRO byte rx: 0&lt;BR /&gt;ucast pkts rx: 0&lt;BR /&gt;ucast bytes rx: 0&lt;BR /&gt;mcast pkts rx: 0&lt;BR /&gt;mcast bytes rx: 0&lt;BR /&gt;bcast pkts rx: 0&lt;BR /&gt;bcast bytes rx: 0&lt;BR /&gt;pkts rx OOB: 0&lt;BR /&gt;pkts rx err: 0&lt;BR /&gt;drv dropped rx total: 0&lt;BR /&gt;err: 0&lt;BR /&gt;fcs: 0&lt;BR /&gt;rx buf alloc fail: 0&lt;BR /&gt;Rx Queue#: 2&lt;BR /&gt;LRO pkts rx: 0&lt;BR /&gt;LRO byte rx: 0&lt;BR /&gt;ucast pkts rx: 0&lt;BR /&gt;ucast bytes rx: 0&lt;BR /&gt;mcast pkts rx: 0&lt;BR /&gt;mcast bytes rx: 0&lt;BR /&gt;bcast pkts rx: 0&lt;BR /&gt;bcast bytes rx: 0&lt;BR /&gt;pkts rx OOB: 0&lt;BR /&gt;pkts rx err: 0&lt;BR /&gt;drv dropped rx total: 0&lt;BR /&gt;err: 0&lt;BR /&gt;fcs: 0&lt;BR /&gt;rx buf alloc fail: 0&lt;BR /&gt;Rx Queue#: 3&lt;BR /&gt;LRO pkts rx: 0&lt;BR /&gt;LRO byte rx: 0&lt;BR /&gt;ucast pkts rx: 0&lt;BR /&gt;ucast bytes rx: 0&lt;BR /&gt;mcast pkts rx: 0&lt;BR /&gt;mcast bytes rx: 0&lt;BR /&gt;bcast pkts rx: 0&lt;BR /&gt;bcast bytes rx: 0&lt;BR /&gt;pkts rx OOB: 0&lt;BR /&gt;pkts rx err: 0&lt;BR /&gt;drv dropped rx total: 0&lt;BR /&gt;err: 0&lt;BR /&gt;fcs: 0&lt;BR /&gt;rx buf alloc fail: 0&lt;BR /&gt;Rx Queue#: 4&lt;BR /&gt;LRO pkts rx: 0&lt;BR /&gt;LRO byte rx: 0&lt;BR /&gt;ucast pkts rx: 0&lt;BR /&gt;ucast bytes rx: 0&lt;BR /&gt;mcast pkts rx: 0&lt;BR /&gt;mcast bytes rx: 0&lt;BR /&gt;bcast pkts rx: 0&lt;BR /&gt;bcast bytes rx: 0&lt;BR /&gt;pkts rx OOB: 0&lt;BR /&gt;pkts rx err: 0&lt;BR /&gt;drv dropped rx total: 0&lt;BR /&gt;err: 0&lt;BR /&gt;fcs: 0&lt;BR /&gt;rx buf alloc fail: 0&lt;BR /&gt;Rx Queue#: 5&lt;BR /&gt;LRO pkts rx: 0&lt;BR /&gt;LRO byte rx: 0&lt;BR /&gt;ucast pkts rx: 0&lt;BR /&gt;ucast bytes rx: 0&lt;BR /&gt;mcast pkts rx: 0&lt;BR /&gt;mcast bytes rx: 0&lt;BR /&gt;bcast pkts rx: 0&lt;BR /&gt;bcast bytes rx: 0&lt;BR /&gt;pkts rx OOB: 0&lt;BR /&gt;pkts rx err: 0&lt;BR /&gt;drv dropped rx total: 0&lt;BR /&gt;err: 0&lt;BR /&gt;fcs: 0&lt;BR /&gt;rx buf alloc fail: 0&lt;BR /&gt;Rx Queue#: 6&lt;BR /&gt;LRO pkts rx: 0&lt;BR /&gt;LRO byte rx: 0&lt;BR /&gt;ucast pkts rx: 0&lt;BR /&gt;ucast bytes rx: 0&lt;BR /&gt;mcast pkts rx: 0&lt;BR /&gt;mcast bytes rx: 0&lt;BR /&gt;bcast pkts rx: 0&lt;BR /&gt;bcast bytes rx: 0&lt;BR /&gt;pkts rx OOB: 0&lt;BR /&gt;pkts rx err: 0&lt;BR /&gt;drv dropped rx total: 0&lt;BR /&gt;err: 0&lt;BR /&gt;fcs: 0&lt;BR /&gt;rx buf alloc fail: 0&lt;BR /&gt;Rx Queue#: 7&lt;BR /&gt;LRO pkts rx: 0&lt;BR /&gt;LRO byte rx: 0&lt;BR /&gt;ucast pkts rx: 0&lt;BR /&gt;ucast bytes rx: 0&lt;BR /&gt;mcast pkts rx: 0&lt;BR /&gt;mcast bytes rx: 0&lt;BR /&gt;bcast pkts rx: 0&lt;BR /&gt;bcast bytes rx: 0&lt;BR /&gt;pkts rx OOB: 0&lt;BR /&gt;pkts rx err: 0&lt;BR /&gt;drv dropped rx total: 0&lt;BR /&gt;err: 0&lt;BR /&gt;fcs: 0&lt;BR /&gt;rx buf alloc fail: 0&lt;BR /&gt;tx timeout count: 0&lt;BR /&gt;[Expert@CP-GW:0]#&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 17:09:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258931#M50791</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-03T17:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Decom: Investigating Interface Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258937#M50792</link>
      <description>&lt;P&gt;Just use Smart Console, all traffic logs are send there. In here you can filter specific on interface. Every log entry shows the incomming interface you should check. I would not trust interface counts because even if there are zero computers connected to the interface packets still come in, like broadcast etc. They will increase the counter but there is no actual traffic&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Lesley_0-1759513688846.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31600i45CE739D8DA9DB86/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Lesley_0-1759513688846.png" alt="Lesley_0-1759513688846.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Right click between the firewall(blade) icon and origin icon:&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 17:48:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258937#M50792</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-10-03T17:48:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Decom: Investigating Interface Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258949#M50796</link>
      <description>&lt;P&gt;CPview showed the 0 traffic interfaces but also trying to see interfaces with syn sent traffic since there has been a lot of uplift in moving to the cloud.&lt;/P&gt;&lt;P&gt;ip route | grep “scope link” | awk ‘{print $1, $3}’&lt;/P&gt;&lt;P&gt;so far in smart view I have a query for (((original:”fw”)(“ethX”)) AND (NOT action:”Drop”)) AND (“Subnet from IP route command)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can create an excel spreadsheet from here but there isn’t a good way to also filter for syn sent traffic to really narrow down which devices are no longer in service behind that interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 19:06:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-Decom-Investigating-Interface-Traffic/m-p/258949#M50796</guid>
      <dc:creator>Fatalis</dc:creator>
      <dc:date>2025-10-03T19:06:06Z</dc:date>
    </item>
  </channel>
</rss>

