{"id":12,"date":"2019-02-01T15:19:29","date_gmt":"2019-02-01T15:19:29","guid":{"rendered":"http:\/\/www.ankenbrand24.de\/?page_id=12"},"modified":"2019-03-27T08:24:38","modified_gmt":"2019-03-27T08:24:38","slug":"articles-check-point","status":"publish","type":"page","link":"https:\/\/www.ankenbrand24.de\/index.php\/articles\/articles-check-point\/","title":{"rendered":"Check Point Overview"},"content":{"rendered":"\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 style=\"text-align: center;\">Check Point Articles<\/h2>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">Architecture<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 71.831%;\">\n<p><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3041-r80x-security-gateway-architecture-logical-packet-flow\">&#8211; R80.x &#8211; Security Gateway Architecture (Logical Packet Flow)<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3073-r80x-security-gateway-architecture-content-inspection\">&#8211; R80.x &#8211; Security Gateway Architecture (Content Inspection)<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3190-r80x-security-gateway-architecture-acceleration-card-offloading\">&#8211; R80.x &#8211; Security Gateway Architecture (Acceleration Card Offloading)<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2740-r80x-ports-used-for-communication-by-various-check-point-modules\">&#8211; R80.x &#8211; Ports Used for Communication by Various Check Point Modules<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/8801-how-does-the-medium-path-pxl-and-content-inspection-work-with-r80\">&#8211; R80.x &#8211; How does the Medium Path (PXL) and Content Inspection work with R80<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3546-r8030-clusterxl-ccp-encryption\">&#8211; R80.x &#8211; ClusterXL CCP Encryption (R80.30+)<\/a><\/p>\n<\/td>\n<td style=\"width: 26.7605%;\"><img loading=\"lazy\" class=\"wp-image-327 alignright\" src=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/02\/Unbenannt.jpg\" alt=\"\" width=\"101\" height=\"158\" srcset=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/02\/Unbenannt.jpg 383w, https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/02\/Unbenannt-96x150.jpg 96w\" sizes=\"(max-width: 101px) 100vw, 101px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">Performance tuning<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 464px;\"><a href=\"https:\/\/community.checkpoint.com\/t5\/General-Management-Topics\/New-R80-x-Performance-Tuning-Intel-Hardware\/m-p\/48697\/highlight\/true#M8306\" target=\"_self\" rel=\"noopener noreferrer\">&#8211; R80.x &#8211; Performance Tuning Tip &#8211; Intel Hardware<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3278-r80x-performance-tuning-tip-aes-ni\">&#8211; R80.x &#8211; Performance Tuning Tip &#8211; AES-NI<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3321-r80x-performance-tuning-tip-smt-hyper-threading\">&#8211; R80.x &#8211; Performance Tuning Tip &#8211; SMT (Hyper Threading)<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3352-r80x-performance-tuning-tip-multi-queue\">&#8211; R80.x &#8211; Performance Tuning Tip &#8211; Multi Queue<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3381-r80x-performance-tuning-tip-connection-table\">&#8211; R80.x &#8211; Performance Tuning Tip &#8211; Connection Table<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3351-r80x-performance-tuning-and-debug-tips-fw-monitor\">&#8211; R80.x &#8211; Performance Tuning and Debug Tips &#8211; fw monitor<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3406-r80x-performance-tuning-and-debug-tips-tcpdump-vs-cppcap\">&#8211; R80.x &#8211; Performance Tuning and Debug Tips &#8211; TCPDUMP vs. CPPCAP<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3407-r80x-performance-tuning-tip-ddos-fw-sam-vs-fwaccel-dos\">&#8211; R80.x &#8211; Performance Tuning Tip &#8211; DDoS \u201efw sam\u201c vs. \u201efwaccel dos\u201c<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/9744-high-performance-gateways-and-tuning\">&#8211; R80.x &#8211; High Performance Gateways and Tuning<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2853-falcon-modules-and-r8020\">&#8211; R80.x &#8211; Falcon Modules and R80.20<\/a><\/td>\n<td style=\"width: 96px;\"><img loading=\"lazy\" class=\" wp-image-349 alignright\" src=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/02\/pt.jpg\" alt=\"\" width=\"126\" height=\"76\" srcset=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/02\/pt.jpg 329w, https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/02\/pt-150x90.jpg 150w\" sizes=\"(max-width: 126px) 100vw, 126px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">Cheat sheets<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p>&#8211; <a class=\"jive-link-wiki-small\" href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3475-r8020-update-cheat-sheet-fw-monitor\" data-containerid=\"2057\" data-containertype=\"14\" data-objectid=\"3475\" data-objecttype=\"102\">R80.x &#8211; cheat sheet &#8211; fw monitor<\/a><br \/>&#8211; <a class=\"jive-link-wiki-small\" href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3741-r8030-cheat-sheet-clusterxl\" data-containerid=\"2057\" data-containertype=\"14\" data-objectid=\"3475\" data-objecttype=\"102\">R80.x &#8211; cheat sheet &#8211; ClusterXL<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">ClusterXL<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3191-r8020-new-clusterxl-commands\">&#8211; R80.20 &#8211; new ClusterXL commands<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3156-r8020-more-clusterxl-state-informations\">&#8211; R80.20 &#8211; More ClusterXL State Information<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3546-r8030-clusterxl-ccp-encryption\">&#8211; R80.30 &#8211; ClusterXL CCP Encryption<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">SecureXL<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><a href=\"https:\/\/community.checkpoint.com\/thread\/10363-r8020-new-fw-monitor-inspection-points\">&#8211; R80.20 &#8211; New FW Monitor inspection points<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3160-r8020-syn-defender-on-securexl-layer\">&#8211; R80.20 &#8211; SYN Defender on SecureXL Level<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3159-r8020-ip-blacklist-in-securexl\">&#8211; R80.20 &#8211; IP blacklist in SecureXL<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/9680-r8020-new-chain-modules\">&#8211; R80.20 &#8211; New Chain Modules?<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3180-r8020-securexl-fw-monitor\">&#8211; R80.20 &#8211; SecureXL + new chain modules + fw monitor<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">CoreXL<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3041-r80x-security-gateway-architecture-logical-packet-flow\">&#8211; R80.x Security Gateway Architecture (Logical Packet Flow)<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3073-r80x-security-gateway-architecture-content-inspection\">&#8211; R80.x Security Gateway Architecture (Content Inspection)<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">Management Server and SmartConsole<br \/><\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3243-r8020-portable-smartconsole\">&#8211; R80.20 &#8211; Portable SmartConsole + Tips and Tricks<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/7234-r8010-syslog-exporter\">&#8211; R80.10 &#8211; Syslog Exporter<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">Sandblast and TEX<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2800-forigate-firewall-icap-and-sandblast-tex\">&#8211; Fortigate Firewall ICAP and Sandblast (TEX)<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2811-symantec-bluecoat-swg-icap-and-sandblast-tex\">&#8211; Symantec (Bluecoat) SG ICAP and Sandblast (TEX)<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2824-icap-and-sandblast-appliance\">&#8211; ICAP and Sandblast Appliance<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">R80.10+<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><a href=\"https:\/\/community.checkpoint.com\/thread\/7234-r8010-syslog-exporter\">&#8211; R80.10 &#8211; Syslog Exporter<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2781\">&#8211; R80.10 &#8211; Bash script to show IP ranges for countrys from GeoProtection (new version)<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2872\">&#8211; R80.10 &#8211; GEO Location Objects in Firewall Policy (with Dynamic Objects)<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">R80.20+<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><a href=\"https:\/\/community.checkpoint.com\/thread\/9676-r8020-new-interesting-commands\">&#8211; R80.20 &#8211; new interesting commands<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3407-r80x-performance-tuning-tip-ddos-fw-sam-vs-fwaccel-dos\">&#8211; R80.20 &#8211; Performance Tuning Tip &#8211; DDoS \u201efw sam\u201c vs. \u201efwaccel dos\u201c<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/10363-r8020-new-fw-monitor-inspection-points\">&#8211; R80.20 &#8211; New FW Monitor inspection points<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3160-r8020-syn-defender-on-securexl-layer\">&#8211; R80.20 &#8211; SYN Defender on SecureXL Level<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3159-r8020-ip-blacklist-in-securexl\">&#8211; R80.20 &#8211; IP blacklist in SecureXL<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/9680-r8020-new-chain-modules\">&#8211; R80.20 &#8211; New Chain Modules?<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3180-r8020-securexl-fw-monitor\">&#8211; R80.20 &#8211; SecureXL + new chain modules + fw monitor<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/10668-r8020-securexl-new-names-in-procppkstatistics\">&#8211; R80.20 &#8211; SecureXL &#8211; new names in &#8220;\/proc\/ppk\/statistics&#8221;?<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3243-r8020-portable-smartconsole\">&#8211; R80.20 &#8211; Portable SmartConsole + Tips and Tricks<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/10571-new-daemon-or-processes-under-r8020\">&#8211; R80.20 &#8211; New daemon or processes under R80.20!<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/9667-new-cpasxl-path\">&#8211; R80.20 &#8211; New SecureXL path in R80.20 (CPASXL)<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">R80.30+<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3552-r8030-new-interesting-commands\">&#8211; R80.30 &#8211; new interesting commands<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3546-r8030-clusterxl-ccp-encryption\">&#8211; R80.30 &#8211; ClusterXL CCP Encryption<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">CLI<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 86.6197%;\">\n<p><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3410-clish-commands-in-expert-mode\">&#8211; CLISH Commands in Expert Mode easier<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3021-show-vpn-routing-on-cli\">&#8211; Show VPN Routing on CLI<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2990-show-address-spoofing-networks-via-cli\">&#8211; Show Address Spoofing Networks via CLI<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/7056-interface-speed-and-duplex-as-list\">&#8211; Interface speed and duplex as list<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2982-fw-ctl-zdebug-helpful-command-combinations\">&#8211; &#8220;fw ctl zdebug&#8221; Helpful Command Combinations<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/9676-r8020-new-interesting-commands\">&#8211; R80.20 &#8211; new interesting commands<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3552-r8030-new-interesting-commands\">&#8211; R80.30 &#8211; new interesting commands<\/a><br \/>&#8211; <a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-3540-ccpanalyzer-what-is-it\">ccp_analyzer &#8211; what is it!<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/thread\/8304-check-point-hex-to-ip-converter-tool\">&#8211; Check Point &#8211; HEX to IP Converter Tool?<\/a><\/p>\n<\/td>\n<td style=\"width: 11.9718%;\"><img loading=\"lazy\" class=\" wp-image-357 alignright\" src=\"https:\/\/www.ankenbrand24.de\/wp-content\/uploads\/2019\/02\/cmd_r8020.jpg\" alt=\"\" width=\"126\" height=\"80\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">Script<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2781\">&#8211; Bash script to show IP ranges for countrys from GeoProtection (new version)<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2872\">&#8211; GEO Location Objects in Firewall Policy (with Dynamic Objects)<\/a><\/p>\n<table style=\"border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;\" width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><span style=\"color: #ffffff; font-size: large;\">More<\/span><\/th>\n<\/tr>\n<\/thead>\n<\/table>\n<p><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2662-appliance-model-from-cli-and-dmi-code\">&#8211; Appliance model from CLI and dmidecode with full model list<\/a><br \/><a href=\"https:\/\/community.checkpoint.com\/docs\/DOC-2851-voip-issue-and-smb-appliance-600100012001400-new-version\">&#8211; VoIP Issue and SMB Appliance (600\/1000\/1200\/1400)<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>Note:<\/strong><br>I would like to keep all articles on this website up to date. Therefore I have all old 3.1b, 4.0, 4.1, R.5x, R6x and R7x articles from this website deleted. You can find the old original articles in the CPUG or in the Checkmates forum or in Google cache:-)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check Point Articles Architecture &#8211; R80.x &#8211; Security Gateway Architecture (Logical Packet Flow)&#8211; R80.x &#8211; Security Gateway Architecture (Content Inspection)&#8211; R80.x &#8211; Security Gateway Architecture (Acceleration Card Offloading)&#8211; R80.x &#8211; Ports Used for Communication by Various Check Point Modules&#8211; R80.x &#8211; How does the Medium Path (PXL) and Content Inspection work with R80&#8211; R80.x &#8211;<\/p>\n<p><a class=\"button\" href=\"https:\/\/www.ankenbrand24.de\/index.php\/articles\/articles-check-point\/\" title=\"More\">  Read More \u2192<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":253,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/pages\/12"}],"collection":[{"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":107,"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":1236,"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/pages\/12\/revisions\/1236"}],"up":[{"embeddable":true,"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/pages\/253"}],"wp:attachment":[{"href":"https:\/\/www.ankenbrand24.de\/index.php\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}