<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Insert https x-forwarded-for in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389272#M28856</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ACE 4700 and It is balancing a web aplication using tcp ports 80 (http) and 443 (https). The configuration of ACE is in One-Arm, it means that the ACE does a NAT to client IP source address.&lt;/P&gt;&lt;P&gt;For requeriment legal the web aplication must to show the client IP source address in the web site, but with configurationin One-Arm only shows the IP address ACE.&lt;/P&gt;&lt;P&gt;Whit the next configuration I can insert into the http packet the client IP source address&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;policy-map type loadbalance first-match L7_LB_POLICY_SURA.COM.CO&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;&amp;nbsp; class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm sura.com.co&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-size: 12pt; font-family: Trebuchet MS; "&gt;&lt;SPAN style="color: #002060;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: red; "&gt;&amp;nbsp;&amp;nbsp; insert-http X-Forwarded-For header-value "%is"&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;but that don´t work with HTTPS (443)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I do in HTTPS?&lt;/P&gt;&lt;P&gt;If I buy this licenses, Can I do this?&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;ACE-AP-SSL-05K-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;ACE-AP-SSL-07K-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;ACE-AP-SSL-100-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;ACE-AP-SSL-UP1-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;ACE-AP-SSLUP-5K-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Haiver Bermon&lt;/P&gt;</description>
    <pubDate>Fri, 26 Feb 2010 20:35:08 GMT</pubDate>
    <dc:creator>Haiver Bermon</dc:creator>
    <dc:date>2010-02-26T20:35:08Z</dc:date>
    <item>
      <title>Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389272#M28856</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ACE 4700 and It is balancing a web aplication using tcp ports 80 (http) and 443 (https). The configuration of ACE is in One-Arm, it means that the ACE does a NAT to client IP source address.&lt;/P&gt;&lt;P&gt;For requeriment legal the web aplication must to show the client IP source address in the web site, but with configurationin One-Arm only shows the IP address ACE.&lt;/P&gt;&lt;P&gt;Whit the next configuration I can insert into the http packet the client IP source address&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;policy-map type loadbalance first-match L7_LB_POLICY_SURA.COM.CO&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;&amp;nbsp; class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm sura.com.co&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-size: 12pt; font-family: Trebuchet MS; "&gt;&lt;SPAN style="color: #002060;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: red; "&gt;&amp;nbsp;&amp;nbsp; insert-http X-Forwarded-For header-value "%is"&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;but that don´t work with HTTPS (443)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I do in HTTPS?&lt;/P&gt;&lt;P&gt;If I buy this licenses, Can I do this?&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;ACE-AP-SSL-05K-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;ACE-AP-SSL-07K-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;ACE-AP-SSL-100-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;ACE-AP-SSL-UP1-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Trebuchet MS; color: #002060; font-size: 12pt;"&gt;ACE-AP-SSLUP-5K-K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Haiver Bermon&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2010 20:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389272#M28856</guid>
      <dc:creator>Haiver Bermon</dc:creator>
      <dc:date>2010-02-26T20:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389273#M28857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Haiver,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The X-Forwarded-For option appends the client IP within the HTTP header of the packet.&amp;nbsp; HTTPS will not work if you are not performing SSL acceleration as the inbound HTTPS packets are encrypted. You will need one of the SSL licenses on the ACE to perform SSL acceleration and have the load balancer insert the X-Forwarded-For value within the decrypted HTTPS traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Feb 2010 22:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389273#M28857</guid>
      <dc:creator>jason.espino</dc:creator>
      <dc:date>2010-02-26T22:04:08Z</dc:date>
    </item>
    <item>
      <title>Re: Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389274#M28858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks very much Jason, do you know which SSL licenses I have to use?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Feb 2010 23:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389274#M28858</guid>
      <dc:creator>Haiver Bermon</dc:creator>
      <dc:date>2010-02-26T23:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389275#M28859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Haiver,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any of the following licenses should work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACE-AP-SSL-05K-K9 ---- SSL 5,000 TPS License&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACE-AP-SSL-7K-K9 ---- SSL 7,500 TPS License&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will not require an "UP" SSL license as you are not upgrading from an existing license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Feb 2010 00:22:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389275#M28859</guid>
      <dc:creator>jason.espino</dc:creator>
      <dc:date>2010-02-27T00:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389276#M28860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ace that you have should have some SSL tps from the base license. you can check here based on your model that you purchased and then what is installed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_x/release/note/RACEA3X.html#wp248237"&gt;http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_x/release/note/RACEA3X.html#wp248237&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Mar 2010 14:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389276#M28860</guid>
      <dc:creator>Eric Rose</dc:creator>
      <dc:date>2010-03-01T14:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389277#M28861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric, Jason, thanks.&lt;/P&gt;&lt;P&gt;I checked the url and my ACE has 100 SSL TPS by default. Do You know how configure a policy to do this? I want to probe in a LAB context, if it work I'll buy the license to 5000 TPS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Mar 2010 17:20:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389277#M28861</guid>
      <dc:creator>Haiver Bermon</dc:creator>
      <dc:date>2010-03-01T17:20:52Z</dc:date>
    </item>
    <item>
      <title>Re: Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389278#M28862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jason, thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I checked the url and my ACE has 100 SSL TPS by default. Do You know how configure a policy to do this? I want to probe in a LAB context, if it work I'll buy the license to 5000 TPS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Mar 2010 18:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389278#M28862</guid>
      <dc:creator>Haiver Bermon</dc:creator>
      <dc:date>2010-03-01T18:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389279#M28863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you don't need to buy any license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default the ACE can do SSL Offload (1000 Transactions per Second). This means that the HTTS session is terminated at the ACE (and no longer at the server).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at following example on how to configure ssl offload:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/modules/ps2706/products_configuration_example09186a00809c3045.shtml"&gt;http://www.cisco.com/en/US/products/hw/modules/ps2706/products_configuration_example09186a00809c3045.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;BR /&gt;Dario&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Mar 2010 09:14:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389279#M28863</guid>
      <dc:creator>dario.didio</dc:creator>
      <dc:date>2010-03-02T09:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389280#M28864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, everybody, thanks for help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I probed a configuration in a context LAB and It works. I used the examples that I found in this url, &lt;A href="http://docwiki.cisco.com/wiki/Cisco_Application_Control_Engine_%28ACE%29_Configuration_Examples_--_SSL_Configuration_Examples"&gt;http://docwiki.cisco.com/wiki/Cisco_Application_Control_Engine_%28ACE%29_Configuration_Examples_--_SSL_Configuration_Examples&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a final question. How do this configuration impact the ACE CPU?. Today the ACE has 2000 connections and the CPU level is 2%&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Mar 2010 19:30:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389280#M28864</guid>
      <dc:creator>Haiver Bermon</dc:creator>
      <dc:date>2010-03-02T19:30:19Z</dc:date>
    </item>
    <item>
      <title>Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389281#M28865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have somewhat same scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I offloaded the SSL on ACE to insert client ip in http. Then again encrypted the http which is getting offloaded on server. But it is not working. Is this a wrong approach?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jan 2012 12:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389281#M28865</guid>
      <dc:creator>akhil.abrol</dc:creator>
      <dc:date>2012-01-13T12:12:06Z</dc:date>
    </item>
    <item>
      <title>Insert https x-forwarded-for</title>
      <link>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389282#M28866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Akhil&lt;/P&gt;&lt;P&gt;It should work. There is no limitation that this traffic can't be&amp;nbsp; encrypted again. So if you decrypted and then inserted header properly&amp;nbsp; it should work. &lt;/P&gt;&lt;P&gt;If your config looks ok - the best way to&amp;nbsp; troubleshoot just to perform capturing and then decrypt it with private&amp;nbsp; key of the server.&lt;/P&gt;&lt;P&gt;I guess it'd be better if you open a new topic for your issue just not to continue some old closed topics. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jan 2012 15:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/insert-https-x-forwarded-for/m-p/1389282#M28866</guid>
      <dc:creator>Borys Berlog</dc:creator>
      <dc:date>2012-01-13T15:23:52Z</dc:date>
    </item>
  </channel>
</rss>

