<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Gateway Performance Optimization - VSX in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32108#M6707</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kaspars, a very interesting post indeed!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was a bit of a late reader, but I do think I have a couple of questions... in case you or anyone else can tackle...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) If you indeed go with the dedicated approach that you propose, with various VSystems getting allocated to different Core pools... Say in a VSLS environment, where a particular VSystem can be active on any of the cluster-members, wouldn't that in essence limit the amount of cores that the particular VSystem will be getting and also render some of the cores needlessly idle?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) I'm pretty sure I've read somewhere that whenever Hyper Threading is enabled, the HT cores will always be getting the second half of Core numbers assigned to them, or something... Was that indeed the rule that you also followed in order to create this core map of yours?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Nov 2018 23:26:53 GMT</pubDate>
    <dc:creator>Ian_Geraris</dc:creator>
    <dc:date>2018-11-08T23:26:53Z</dc:date>
    <item>
      <title>Security Gateway Performance Optimization - VSX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32107#M6706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a feedback to the awesome session by Tim Hall&amp;nbsp;&lt;A href="https://community.checkpoint.com/thread/9630"&gt;TechTalk: Security Gateway Performance Optimization with Tim Hall&lt;/A&gt;&amp;nbsp;- was great presentation. Thanks heaps&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;I thought that it would be worthwhile adding some comments regarding VSX as it has it's own little idiosyncrasies when it comes to SXL, CoreXL, SMT and MQ. In general every&amp;nbsp;technology point that was discussed by Tim actually applies to VSX too and it is vital to understand all of them before you start digging into VSX tuning.&lt;/P&gt;&lt;P&gt;As always - VSX&amp;nbsp;is deployed in so many different ways that making general recommendations is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;impossible: this is&amp;nbsp;merely&amp;nbsp;some "gotcha's" learned over years using it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;AGGRESSIVE AGING&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Watch out for under-dimensioned VS. By default connections table is set to 15000 concurrent connections that is rather low. When AA turns on, it may impact&amp;nbsp;working&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;traffic, i.e. we had issues with some very specific RDP running over SSL when aggressive aging kicked in. Keep close eye on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;fw ctl pstat&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71086_pastedImage_4.png" style="border: 0px; margin: 2px 20px 0px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;64 BIT VS SUPPORT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Make sure that you are utilising R80+ in full by switching (if not done by default) VSes to 64 bit support thus avoiding memory shortage for connections&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71100_pastedImage_6.png" style="border: 0px; margin: 2px 20px 0px;" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;COREXL - FW WORKER RESOURCE POOLS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;By default, all your VSes will share the same resource pool of fw workers. On one hand it is "an easy maintenance" approach, but if you have critical&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;VSes, I would recommend to protect them by allocating them dedicated CPU resources to avoid situations with "elephant connections" and/or "elephant VSes" killing your critical resource access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default split between SXL (0-3) and CoreXL (4-23) on VSX&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71101_pastedImage_9.png" style="border: 0px; margin: 2px 20px 0px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And dedicated approach: VS0,1,2,5 on core 4, VS3,4,7 on core 7, VS6 on 12-21 and VS8 - using default all. It's just an example!&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71114_pastedImage_17.png" style="border: 0px; margin: 2px 20px 0px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;COREXL - "MAPPING" CORES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you do decide to go with strict resource allocation, i.e dedicated CPU cores for each VS, create a "map" of your CPUs to visualize allocation. Especially important with hyper-threaded CPU cores as numbering is not sequential anymore. Couple of rules to keep in mind to keep best performance&lt;/P&gt;&lt;UL style="padding: 0px 0px 0px 30px;"&gt;&lt;LI style="margin: 0.2em 0px;"&gt;do not split one VS across two physical cores (look at VS4 and VS5 below)&lt;/LI&gt;&lt;LI style="margin: 0.2em 0px;"&gt;allocate both "main" core and it's HT sibling, not just main cores or HT instances (look below for example VS0 has two cores 4 and 28 allocated, not 4 and 5)&lt;/LI&gt;&lt;LI style="margin: 0.2em 0px;"&gt;highly loaded VSes keep on the same&amp;nbsp;physical CPU&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;as SXL as you may gain from caching&lt;/LI&gt;&lt;LI style="margin: 0.2em 0px;"&gt;we noticed best performance when we had one to one mapping of a specific fw workers on VS to a CPU core - but that can eat up all your available cores quickly.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Below is a sample of 48 core hyper-threaded system map&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71103_pastedImage_14.png" style="border: 0px; margin: 2px 20px 0px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;COREXL - IDENTITY AWARENESS LARGE DEPLOYMENTS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We learned hard away, especially prior R80.10 release that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;pepd&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;pdpd&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;can go "nuts" and consume a lot of CPU resources, therefore to avoid any impact on fw workers we put them on dedicated cores&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71102_pastedImage_13.png" style="border: 0px; margin: 2px 20px 0px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I realise that I'm digging my own grave here&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;but I'll probably learn something new soo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2018 18:13:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32107#M6706</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-10-01T18:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Performance Optimization - VSX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32108#M6707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kaspars, a very interesting post indeed!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was a bit of a late reader, but I do think I have a couple of questions... in case you or anyone else can tackle...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) If you indeed go with the dedicated approach that you propose, with various VSystems getting allocated to different Core pools... Say in a VSLS environment, where a particular VSystem can be active on any of the cluster-members, wouldn't that in essence limit the amount of cores that the particular VSystem will be getting and also render some of the cores needlessly idle?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) I'm pretty sure I've read somewhere that whenever Hyper Threading is enabled, the HT cores will always be getting the second half of Core numbers assigned to them, or something... Was that indeed the rule that you also followed in order to create this core map of yours?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2018 23:26:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32108#M6707</guid>
      <dc:creator>Ian_Geraris</dc:creator>
      <dc:date>2018-11-08T23:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Performance Optimization - VSX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32109#M6708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ian&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you are absolutely correct regarding point 1 - it's a catch 22 situation so you have to make your own call depending on resources you are trying to protect. If you share all cores to all VSes you may face a situation where one "elephant" flow on one VS will fully utilise one (or more) core for example. That&amp;nbsp;will impact connections on all other VSes that will try to use the same core as VSX does not have dynamic dispatcher so chances are quite high.&amp;nbsp;In nutshell - I try to continuously monitor core utilization and adjust if necessary to have reasonable utilization across all yet having some protection&amp;nbsp;from one VS impacting rest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct about #2 - if HT is enabled, by default cores will be allocated to SXL and CoreXL in corresponding sibling "pairs". So you can always use that as "basis" when creating own maps &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2018 09:07:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32109#M6708</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-09T09:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Performance Optimization - VSX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32110#M6709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the clarifications&amp;nbsp;Kaspars... your approach is also quite interesting!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think i'm going to stick to the "shared cores" approach among all VSystems for my VSLS environments - at least for the time being - since the devices that we have are quite big for the amount of traffic that is supposed to be passing through them and the fact that I just don't want to be worrying&amp;nbsp;about having different cores&amp;nbsp;sitting idle on different boxes - based on which box the various VSystems are going to be active on, if I start statically allocating them to various cores...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only affinities that i'm actually thinking of "playing" with in a VSLS environment, would be those of the Mgmt &amp;amp; Sync interfaces, as well as that of VS0. In an effort to maybe isolate those to one or two specific cores and "protect" them from the other SXL or CXL instances... not sure though if this would also lead to rendering the particular cores pretty much idle on some of the boxes (we mainly have clusters of 4 boxes).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All in all, I think that VSLS and the various core affinities approaches is a "nerve-racking" topic &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/silly.png" /&gt;&amp;nbsp;&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/silly.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers! &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Nov 2018 00:30:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32110#M6709</guid>
      <dc:creator>Ian_Geraris</dc:creator>
      <dc:date>2018-11-12T00:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Performance Optimization - VSX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32111#M6710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great info &lt;A href="https://community.checkpoint.com/migrated-users/47831"&gt;Kaspars Zibarts&lt;/A&gt;, you may want to consider talking about this topic at CPX:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/community/about-checkmates/blog/2018/09/12/call-for-papers-cpx-360-2019"&gt;https://community.checkpoint.com/community/about-checkmates/blog/2018/09/12/call-for-papers-cpx-360-2019&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deadline for submissions is Nov 15th.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Nov 2018 13:13:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32111#M6710</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-11-12T13:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Performance Optimization - VSX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32112#M6711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;let me read T&amp;amp;Cs - I'm not the best "stage/public" speaker. But maybe it's worth trying!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Nov 2018 13:32:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32112#M6711</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-12T13:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Performance Optimization - VSX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32113#M6712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Totally agree - that's how we started, by isolating VS0, Mgmt and Sync! And then it went on and grew little bigger &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;has proven itself effective on some occasions, I must admit &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Nov 2018 13:42:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32113#M6712</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-12T13:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Performance Optimization - VSX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32114#M6713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kaspars,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for sharing such useful information. I always find it hard to find such in depth articles about "how VSX works" and "what you should check" (do you have more articles that i can read?) but that's not what i want to ask you, actually i have a question about the 64 bit VSes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;I just checked our environment and discovered that our VSes are running 32 bit...&lt;/P&gt;&lt;P&gt;We are running R80.10 and we own 2 x 12600 appliance which has the configuration option "set edition 64-bit".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please explain why our VSes are running on 32 bit and how to let them run on 64 bit?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jelle&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2018 19:25:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32114#M6713</guid>
      <dc:creator>_Jelle</dc:creator>
      <dc:date>2018-11-21T19:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Performance Optimization - VSX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32115#M6714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep - the trick with R80.10 is that even your underlying GAIA is set to 64 bit edition as in your example, actual VS kernel by default is set to 32 bits, so you must change it manually to 64bit. I really don't know why and have no answer to that, I even had a little whinge here&amp;nbsp;&lt;A href="https://community.checkpoint.com/thread/9762-vsxutil-reconfigure-wishlist" target="_blank"&gt;https://community.checkpoint.com/thread/9762-vsxutil-reconfigure-wishlist&lt;/A&gt;&amp;nbsp;&lt;IMG id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;but as it goes apparently it's a default setting in R80.20 &lt;IMG id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 09:18:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Performance-Optimization-VSX/m-p/32115#M6714</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2019-06-21T09:18:16Z</dc:date>
    </item>
  </channel>
</rss>

