{"id":1046,"date":"2019-03-19T12:40:56","date_gmt":"2019-03-19T12:40:56","guid":{"rendered":"http:\/\/www.ankenbrand24.de\/?page_id=1046"},"modified":"2019-03-19T15:27:54","modified_gmt":"2019-03-19T15:27:54","slug":"performance-tuning-aes-ni","status":"publish","type":"page","link":"https:\/\/www.ankenbrand24.de\/index.php\/articles\/check-point-articel\/performance-tuning\/performance-tuning-aes-ni\/","title":{"rendered":"AES-NI"},"content":{"rendered":"\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 class=\"message-subject\" style=\"text-align: center;\"><span class=\"lia-message-read\">R80.x Performance Tuning &#8211; AES-NI<\/span><\/h2>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">What is AES-NI<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-1047\" src=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_1.png\" alt=\"\" width=\"324\" height=\"185\" srcset=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_1.png 324w, https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_1-150x86.png 150w\" sizes=\"(max-width: 324px) 100vw, 324px\" \/><\/p>\n<p><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\">Intel\u2018s AES New Instructions AES-NI is a encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data in many processor familys.<\/span><\/p>\n<p><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\">Comprised of seven new instructions, AES-NI gives your environment faster, more affordable data protection and greater security.<\/span><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">Chapter<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><strong>Architecture:<\/strong><br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3041-r80x-security-gateway-architecture-logical-packet-flow\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Security Gateway Architecture (Logical Packet Flow)<\/a><br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3073-r80x-security-gateway-architecture-content-inspection\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Security Gateway Architecture (Content Inspection)<\/a>&nbsp;<br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3190-r80x-security-gateway-architecture-acceleration-card-offloading\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Security Gateway Architecture (Acceleration Card Offloading)<\/a>&nbsp;<br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2740-r80x-ports-used-for-communication-by-various-check-point-modules\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Ports Used for Communication by Various Check Point Modules<\/a>&nbsp;<\/p>\n<p><strong>Performance Tuning:<\/strong><br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3278-r80x-performance-tuning-tip-aes-ni\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Performance Tuning Tip &#8211; AES-NI<\/a>&nbsp;<br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3321-r80x-performance-tuning-tip-smt-hyper-threading\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Performance Tuning Tip &#8211; SMT (Hyper Threading)<\/a>&nbsp;<br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3352-r80x-performance-tuning-tip-multi-queue\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Performance Tuning Tip &#8211; Multi Queue<\/a>&nbsp;<br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3381-r80x-performance-tuning-tip-connection-table\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Performance Tuning Tip &#8211; Connection Table<\/a>&nbsp;<br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3351-r80x-performance-tuning-and-debug-tips-fw-monitor\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Performance Tuning Tip &#8211; fw monitor<\/a><br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3406-r80x-performance-tuning-and-debug-tips-tcpdump-vs-cppcap\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Performance Tuning Tip &#8211; TCPDUMP vs. CPPCAP<\/a>&nbsp;<br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3407-r80x-performance-tuning-tip-ddos-fw-sam-vs-fwaccel-dos\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x Performance Tuning Tip \u2013 DDoS \u201efw sam\u201c vs. \u201efwaccel dos\u201c<\/a>&nbsp;<\/p>\n<p><strong>Cheat Sheet:<\/strong><br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3475-r8020-cheat-sheet-fw-monitor\" target=\"_blank\" rel=\"noopener noreferrer\" data-objecttype=\"102\">R80.x cheat sheet &#8211; fw monitor<\/a>&nbsp;<br><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3741\" target=\"_blank\" rel=\"noopener noreferrer\">R80.x cheat sheet &#8211; ClusterXL<\/a>&nbsp;<\/p>\n<p><strong>More interesting articles:<\/strong><br><a href=\"http:\/\/cp.ankenbrand24.de\" target=\"_blank\" rel=\"noopener noreferrer\">Article list (Heiko Ankenbrand)<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">Appliances and Open Servers with AES-NI<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><span style=\"font-size: 11.0pt;\">Better throughput can be achieved by selecting a faster encryption algorithm. For a comparison of encryption algorithm speeds, refer to sk73980 &#8211; Relative speeds of algorithms for IPsec and SSL.<\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\">AES-NI is Intel&#8217;s dedicated instruction set, which significantly improves the speed of Encrypt-Decrypt actions and allows one to increase AES throughput for:<\/span><\/p>\n<ul>\n<li style=\"margin-left: 36.0pt; text-indent: -18.0pt;\"><span style=\"font-size: 11.0pt;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/span> <span style=\"font-size: 11.0pt;\"><strong>Site-to-Site VPN<\/strong><\/span><\/li>\n<li style=\"margin-left: 36.0pt; text-indent: -18.0pt;\"><span style=\"font-size: 11.0pt;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/span> <span style=\"font-size: 11.0pt;\"><strong>Remote Access VPN<\/strong><\/span><\/li>\n<li style=\"margin-left: 36.0pt; text-indent: -18.0pt;\"><span style=\"font-size: 11.0pt;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/span> <span style=\"font-size: 11.0pt;\"><strong>Mobile Access<\/strong><\/span><\/li>\n<li style=\"margin-left: 36.0pt; text-indent: -18.0pt;\"><span style=\"font-size: 11.0pt;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/span> <span style=\"font-size: 11.0pt;\"><strong>HTTPS Interception<\/strong><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 11.0pt;\">The general speed of the system depends on additional parameters.<\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\">Check Point supports AES-NI on many appliances, only when running Gaia OS with 64-bit kernel. On these appliances AES-NI is enabled by default. AES-NI is also supported on Open Servers.<\/span><\/p>\n<p>Affected encryption algorithms include:<\/p>\n<ul>\n<li>AES-CBC (128-bit and 256-bit)<\/li>\n<li>AES-GCM (128-bit and 256-bit), which shows the most significant improvement &#8211; with AES-NI, it is faster than AES-CBC, when both sides support AES-NI. Without AES-NI support, it is slightly slower than AES-CBC + HMAC-SHA1.<\/li>\n<\/ul>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">Check if AES-NI is activated<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><span style=\"font-size: 11.0pt;\"><strong># dmesg | grep &#8220;AES-NI&#8221;<\/strong><\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\"><strong><img loading=\"lazy\" class=\"alignnone size-full wp-image-1048\" src=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_2.png\" alt=\"\" width=\"605\" height=\"53\" srcset=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_2.png 605w, https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_2-150x13.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/strong><\/span><\/p>\n<p><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\">If it is not available, the following message is displayed:<\/span><\/p>\n<p><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-1049\" src=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_3.png\" alt=\"\" width=\"605\" height=\"50\" srcset=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_3.png 605w, https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_3-150x12.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/span><\/p>\n<p><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\">If AES-NI is not enabled, it must be turned on in the BIOS (if available). Typical way for Open Servers.<\/span><\/p>\n<p><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\">It can also be checked if the CPU provides AES-NI. For this the following command should be executed. Here &#8220;aes&#8221; should now be displayed.<\/span><\/p>\n<p><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\"><strong># grep -m1 -o aes \/proc\/cpuinfo<\/strong><\/span><\/p>\n<p><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\"><strong><img loading=\"lazy\" class=\"alignnone size-full wp-image-1050\" src=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_4.png\" alt=\"\" width=\"605\" height=\"25\" srcset=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_4.png 605w, https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_4-150x6.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/strong><\/span><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">AES-NI performance measurement<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><span style=\"font-size: 11.0pt;\">A little bit of reverse engineering.<\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\">Check Point uses OpenSSL as library. Therefore the command &#8220;openssl&#8221; is provided as &#8220;cpopenssl&#8221;. This gives us the possibility to execute all openssl commands. With this I tested a little bit and came to the conclusion that performance measurements are possible with the following command. So you can test the performance differences with enabled and disabled AES-NI.<\/span><\/p>\n<p><span style=\"color: #ff0000; font-size: 11.0pt;\"><strong>Warning notice:<\/strong><\/span> <span style=\"font-size: 11.0pt;\">If you execute this command you have 100% CPU usage on the firewall for 20 sec.<\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\"><strong># cpopenssl speed aes-256-cbc<\/strong><\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\">Enabled AES-NI:<\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-1051\" src=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_5.png\" alt=\"\" width=\"605\" height=\"46\" srcset=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_5.png 605w, https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_5-150x11.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\">Disabled AES-NI:<\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-1052\" src=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_6.png\" alt=\"\" width=\"605\" height=\"48\" srcset=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_6.png 605w, https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_6-150x12.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\">After these results I would always recommend to activate AES-NI and AES is preferred to 3DES because it offers many performance advantages through the hardware acceleration.<br><br><\/span><span style=\"font-size: 11.0pt;\">With the following command you can test and compare <strong>all encryption methods<\/strong>. After these results I would always recommend to activate AES-NI and AES is preferred to 3DES because it offers many performance advantages through the hardware acceleration.<\/span><span style=\"font-size: 11.0pt;\">&nbsp;<\/span><\/p>\n<p><span style=\"color: #ff0000; font-size: 11.0pt;\"><strong>Warning notice:<\/strong><\/span> <span style=\"font-size: 11.0pt;\">If you execute this command you have 100% CPU usage for a long time!<\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\"><strong># cpopenssl speed<\/strong><\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\"><strong><img loading=\"lazy\" class=\"alignnone size-full wp-image-1053\" src=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_7.png\" alt=\"\" width=\"609\" height=\"433\" srcset=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_7.png 609w, https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_7-150x107.png 150w, https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/03\/aesni_7-211x150.png 211w\" sizes=\"(max-width: 609px) 100vw, 609px\" \/><\/strong><\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\">This makes it possible to compare encryption algorithms. It shows that e.g. AES 256 is more performant than DES. Therefore AES 256 should rather be used for VPN connections than DES or 3DES. This is also well described in the following SK <span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\"><a title=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk73980\" href=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk73980\" target=\"_blank\" rel=\"noopener noreferrer\">Relative speeds of algorithms for IPsec and SSL<\/a>.<\/span><br><\/span><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">References<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\"><a title=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk73980\" href=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk73980\" target=\"_blank\" rel=\"noopener noreferrer\">Relative speeds of algorithms for IPsec and SSL<\/a>&nbsp;<br><\/span><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\"><a title=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk105119&amp;partition=General&amp;product=IPSec\" href=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk105119&amp;partition=General&amp;product=IPSec\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices &#8211; VPN Performance<\/a>&nbsp;<br><\/span><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\"><a title=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk110549&amp;partition=General&amp;product=vSEC\" href=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk110549&amp;partition=General&amp;product=vSEC\" target=\"_blank\" rel=\"noopener noreferrer\">vSEC Virtual Edition (VE) Gateway support for AES-NI on VMware ESX<\/a>&nbsp;<br><\/span><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\"><a class=\"link-titled\" title=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk105119\" href=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk105119\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices &#8211; VPN Performance<\/a>&nbsp;<br><\/span><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\"><a class=\"link-titled\" title=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk118097\" href=\"https:\/\/supportcenter.checkpoint.com\/supportcenter\/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk118097\" target=\"_blank\" rel=\"noopener noreferrer\">MultiCore Support for IPsec VPN in R80.10 and above<\/a>&nbsp;<\/span><\/p>\n<p><span style=\"font-size: 11.0pt; font-family: 'Arial','sans-serif';\">Copyright by Heiko Ankenbrand1994-2019<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>R80.x Performance Tuning &#8211; AES-NI What is AES-NI Intel\u2018s AES New Instructions AES-NI is a encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data in many processor familys. Comprised of seven new instructions, AES-NI gives your environment faster, more affordable data protection and greater security. Chapter<\/p>\n<p><a class=\"button\" href=\"https:\/\/www.ankenbrand24.de\/index.php\/articles\/check-point-articel\/performance-tuning\/performance-tuning-aes-ni\/\" title=\"More\">  Read More \u2192<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1068,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/pages\/1046"}],"collection":[{"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/comments?post=1046"}],"version-history":[{"count":5,"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/pages\/1046\/revisions"}],"predecessor-version":[{"id":1079,"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/pages\/1046\/revisions\/1079"}],"up":[{"embeddable":true,"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/pages\/1068"}],"wp:attachment":[{"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/media?parent=1046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}