<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TLS1.3 inspection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127065#M74890</link>
    <description>&lt;P&gt;I analyzed the traces, it looks like the firewall is striping off the supported_versions extension in the outgoing ClientHello now.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Aug 2021 11:37:32 GMT</pubDate>
    <dc:creator>iko</dc:creator>
    <dc:date>2021-08-16T11:37:32Z</dc:date>
    <item>
      <title>TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/126992#M74879</link>
      <description>&lt;P&gt;Hi again,&lt;/P&gt;&lt;P&gt;I managed now to enable TLS1.3 on my R81 Security Gateway.&lt;/P&gt;&lt;P&gt;But the HTTPS Inspection doesn't work in case of TLS1.3 traffic:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="13.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13351i12F2F03F476A02A1/image-size/large?v=v2&amp;amp;px=999" role="button" title="13.png" alt="13.png" /&gt;&lt;/span&gt;&amp;nbsp;Even I have disabled my bypass rule:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="14.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13352i64D1148A4E24CC6A/image-size/large?v=v2&amp;amp;px=999" role="button" title="14.png" alt="14.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Just to be sure you have all in infos her my simple rulebase:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="15.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13353iBFA54D2BF245B718/image-size/large?v=v2&amp;amp;px=999" role="button" title="15.png" alt="15.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Is there any special rule I need to add to catch TLS1.3 traffic?&lt;/P&gt;&lt;P&gt;Thanks, Iko&lt;/P&gt;</description>
      <pubDate>Sun, 15 Aug 2021 11:46:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/126992#M74879</guid>
      <dc:creator>iko</dc:creator>
      <dc:date>2021-08-15T11:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/126996#M74880</link>
      <description>&lt;P&gt;First of all, disabling your bypass rule can cause performance issues.&lt;/P&gt;
&lt;P&gt;Is USFW enabled?&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167052&amp;amp;partition=Basic&amp;amp;product=Quantum" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167052&amp;amp;partition=Basic&amp;amp;product=Quantum&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Aug 2021 15:56:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/126996#M74880</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-15T15:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/126997#M74881</link>
      <description>&lt;P&gt;can you tell me how to verify if usfw is enabled?&lt;/P&gt;</description>
      <pubDate>Sun, 15 Aug 2021 18:04:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/126997#M74881</guid>
      <dc:creator>iko</dc:creator>
      <dc:date>2021-08-15T18:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/126999#M74882</link>
      <description>&lt;P&gt;&lt;EM&gt;cpprod_util FwIsUsermode&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;cpprod_util FwIsUsfwMachine&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Both commands should return 1.&lt;BR /&gt;What precise appliance are you doing this on?&lt;/P&gt;</description>
      <pubDate>Sun, 15 Aug 2021 20:15:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/126999#M74882</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-15T20:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127000#M74883</link>
      <description>&lt;P&gt;I run a R81 Security Gateway with Mgmt-Gateway on same VM&lt;/P&gt;&lt;P&gt;Product version Check Point Gaia R81&lt;BR /&gt;OS build 392&lt;BR /&gt;OS kernel version 3.10.0-957.21.3cpx86_64&lt;BR /&gt;OS edition 64-bit&lt;/P&gt;&lt;P&gt;[Expert@gw-a7234c:0]# cpprod_util FwIsUsermode&lt;BR /&gt;0&lt;BR /&gt;[Expert@gw-a7234c:0]# cpprod_util FwIsUsfwMachine&lt;BR /&gt;0&lt;/P&gt;</description>
      <pubDate>Sun, 15 Aug 2021 21:33:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127000#M74883</guid>
      <dc:creator>iko</dc:creator>
      <dc:date>2021-08-15T21:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127002#M74884</link>
      <description>&lt;P&gt;What are the precise specifications (RAM, cores) on the VM?&lt;BR /&gt;Note that HTTPS Inspection for TLS 1.3 traffic requires three things:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Being on R81 or above, which you are.&lt;/LI&gt;
&lt;LI&gt;Enabling TLSIO, which &lt;A href="https://community.checkpoint.com/t5/Management/change-kernel-parameter-fails/m-p/126986#M27690" target="_self"&gt;you clearly did here&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Enabling User Space Firewall, which is &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167052" target="_self"&gt;only enabled by default for specific appliances&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The two commands indicate USFW is not enabled.&lt;BR /&gt;To enable them, issue the following two commands and reboot:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;cpprod_util FwIsUsermode 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;cpprod_util FwIsUsfwMachine&amp;nbsp; 1&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Once you've done this, HTTPS Inspection of TLS 1.3 should work.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 01:33:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127002#M74884</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-16T01:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127053#M74885</link>
      <description>&lt;P&gt;doesn't work for some reason:&lt;/P&gt;&lt;P&gt;[Expert@gw-a7234c:0]# cpprod_util FwIsUsermode 1&lt;BR /&gt;Unknown/Unsupported command 1&lt;BR /&gt;0 [Expert@gw-a7234c:0]# cpprod_util FwIsUsfwMachine 1&lt;BR /&gt;Unknown/Unsupported command 1&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 10:42:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127053#M74885</guid>
      <dc:creator>iko</dc:creator>
      <dc:date>2021-08-16T10:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127055#M74886</link>
      <description>&lt;P&gt;Should be:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;FwSetUsermode,&amp;nbsp;&lt;/EM&gt;&lt;EM&gt;FwSetUsfwMachine&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 10:50:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127055#M74886</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-08-16T10:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127056#M74887</link>
      <description>&lt;P&gt;Thanks _Val_, this worked:&lt;/P&gt;&lt;P&gt;[Expert@gw-a7234c:0]# cpprod_util FwIsUsermode&lt;BR /&gt;1&lt;BR /&gt;[Expert@gw-a7234c:0]# cpprod_util FwIsUsfwMachine&lt;BR /&gt;1&lt;/P&gt;&lt;P&gt;Thank you both _Val_ and PhoneBoy&lt;/P&gt;&lt;P&gt;Iko&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 10:56:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127056#M74887</guid>
      <dc:creator>iko</dc:creator>
      <dc:date>2021-08-16T10:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127060#M74888</link>
      <description>&lt;P&gt;unfortunately, I had to remove the "accept as solution" because the TLS1.3 inspection still has some problem.&lt;/P&gt;&lt;P&gt;In the log I can see that the inspection works, but the client browser shows a "Secure Connection failed" message now.&lt;/P&gt;&lt;P&gt;Is there anything else I am missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 11:09:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127060#M74888</guid>
      <dc:creator>iko</dc:creator>
      <dc:date>2021-08-16T11:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127062#M74889</link>
      <description>&lt;P&gt;Root certificate installed as trusted probably? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 11:17:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127062#M74889</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-08-16T11:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127065#M74890</link>
      <description>&lt;P&gt;I analyzed the traces, it looks like the firewall is striping off the supported_versions extension in the outgoing ClientHello now.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 11:37:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127065#M74890</guid>
      <dc:creator>iko</dc:creator>
      <dc:date>2021-08-16T11:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127069#M74891</link>
      <description>&lt;P&gt;my bad, i didnt reboot.&lt;/P&gt;&lt;P&gt;now HTTPS requests workd again on client, but traffic is bypassed from interception again. but only TLS1.3 traffic&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="16.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13354iCABD939DB7FC649D/image-size/large?v=v2&amp;amp;px=999" role="button" title="16.png" alt="16.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 12:12:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127069#M74891</guid>
      <dc:creator>iko</dc:creator>
      <dc:date>2021-08-16T12:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127143#M74892</link>
      <description>&lt;P&gt;What's the log card say on the bypassed log?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 23:10:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127143#M74892</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-16T23:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127200#M74893</link>
      <description>&lt;P&gt;One request on the client always brings up 3 log entrys:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="17.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13369i45EA556C67149AB9/image-size/large?v=v2&amp;amp;px=999" role="button" title="17.png" alt="17.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;is this the log card?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="18.png" style="width: 778px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13370iEE55A14D3BB0AD97/image-size/large?v=v2&amp;amp;px=999" role="button" title="18.png" alt="18.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Just for clarification: The accessed webserver is TLS1.3 only.&lt;/P&gt;&lt;P&gt;First log entry gets accepted. I think this is the first ClientHello sent without supported_versions extension, which makes it an TLS1.2 request. This is not what the webserver expects, so he replies with some version_alert. So the Firewall sends the ClientHello again, this time with&amp;nbsp;supported_versions extension included (TLS1.3) -&amp;gt; This is what log entries 2 &amp;amp; 3 are about.&lt;/P&gt;&lt;P&gt;I just wonder why the bypass entry comes second!? Wouldn't it make more sense if the decision to intercept or not, is made already before the first request is sent. or is the order not really accurate, since this all happens in very short time?&lt;/P&gt;&lt;P&gt;just my thoughts ...&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 12:03:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127200#M74893</guid>
      <dc:creator>iko</dc:creator>
      <dc:date>2021-08-17T12:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127223#M74894</link>
      <description>&lt;P&gt;The order may not entirely be accurate here, but the Internal System Error would explain why it is bypassing.&lt;BR /&gt;You’ll need to use this SK to debug what’s happening:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112066" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112066&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 13:44:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/127223#M74894</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-17T13:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/135759#M74895</link>
      <description>&lt;P&gt;I have tried these commands multiple times and after a reboot, the values are back to 0&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;cpprod_util FwSetUsermode 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;cpprod_util FwSetUsfwMachine 1&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Also, I tried enabling TLSIO by adding&amp;nbsp;&lt;FONT face="courier new,courier" size="3"&gt;fwtls_enable_tlsio=1&lt;/FONT&gt; to&amp;nbsp;$FWDIR/boot/modules/fwkern.conf; &lt;FONT face="courier new,courier" size="3"&gt;fw ctl get int fwtls_enable_tlsio&lt;/FONT&gt; shows it is 0 after reboot, If I try to set on the fly with&amp;nbsp;&lt;FONT face="courier new,courier" size="3"&gt;fw ctl set int fwtls_enable_tlsio 1&lt;/FONT&gt;, I get the error "Set operation failed: failed to get parameter fwtls_enable_tlsio".&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Dec 2021 00:16:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/135759#M74895</guid>
      <dc:creator>Alex_Lewis</dc:creator>
      <dc:date>2021-12-08T00:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/135775#M74896</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7612"&gt;@Alex_Lewis&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share on which version and platform you are trying to convert to USFW?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Dec 2021 08:24:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/135775#M74896</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2021-12-08T08:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/135803#M74897</link>
      <description>&lt;P&gt;2 gateway HA cluster running R81 Take 36 on Open Platform&lt;/P&gt;</description>
      <pubDate>Wed, 08 Dec 2021 13:07:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/135803#M74897</guid>
      <dc:creator>Alex_Lewis</dc:creator>
      <dc:date>2021-12-08T13:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: TLS1.3 inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/135845#M74898</link>
      <description>&lt;P&gt;in general if it's open platform so it should be USFW by default.&lt;/P&gt;
&lt;P&gt;can you share which type to you have? how many CPU's it has?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Dec 2021 17:23:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS1-3-inspection/m-p/135845#M74898</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2021-12-08T17:23:10Z</dc:date>
    </item>
  </channel>
</rss>

