<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate for IPAD and PEAP still needed in ISE? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708489#M543586</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321306"&gt;@Francesco Molino&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd like to know how to perform that procedure you mentioned (sending cert via email).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have played around with certbot and I just can't get it to work.&amp;nbsp; For example, if I own the domain mycompany.com, but I have not registered any of my hosts in the public DNS, e.g. ise01.mycompany.com is not in the public DNS, but of course it's on my internal DNS, then how does letsencrypt get around the NXDOMAIN issue (non existent domain) ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying this "certbot certonly" procedure, but getting stuck at the domain validation.&amp;nbsp; I would like to know how you get around that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Arne&lt;/P&gt;</description>
    <pubDate>Tue, 18 Sep 2018 03:20:29 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2018-09-18T03:20:29Z</dc:date>
    <item>
      <title>Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708455#M543581</link>
      <description>&lt;P&gt;Hi we have a new installation of ISE version 2.4 in a distributed deployment with two nodes. We have a legacy WLAN that we use for IPADS that does mac authentication and uses AD suthingication via PEAP on ACS 5 that I need to migrate to ISE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Previously I had to generate a Certificate from one of our domain controllers to allow the IPAD's to accept the certificate and send out to the IPADs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has there been an option in ISE that I can just allow the IPAD's on the network without verifying the certificate, such has on our windows computers via Group Policy I have that option disabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And if not is there any updated online walk thru to to generate this certificate with Windows Active Directory IIS and install on ISE?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 08:49:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708455#M543581</guid>
      <dc:creator>dan hale</dc:creator>
      <dc:date>2019-03-11T08:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708465#M543582</link>
      <description>&lt;P&gt;With EAP-PEAP, the Authenticating Server (ISE in this case) will always present a certificate to the Supplicant (in this case iPad) and the iPad has to decide whether or not to trust it (as you mentioned, in Windows you can untick that check box).&amp;nbsp; In iOS I have not seen that option - I think you will always get a certificate warning.&amp;nbsp; I would have thought that users can accept that warning once and then never see it again. It's ugly of course.&lt;/P&gt;
&lt;P&gt;Because you have two ISE nodes and I assume both of them run the Policy Service (Radius), the proper way to do this is to&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Create a System Certificate for each ISE node signed by a central PKI server&lt;/LI&gt;
&lt;LI&gt;Push the PKI Root CA to the iPad (via Apple Configurator or other MDM)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;The issue with not doing the above method, is that users might connect to ISE01 on Monday, accept the self-signed cert, and then on Tuesday they connect again and get ISE02, which has its own self-signed cert.&amp;nbsp; Therefore, the best way is to create an ISE certificate (for EAP purpose) that is signed by the Root CA.&amp;nbsp; Then it doesn't matter which ISE node the clients hit.&amp;nbsp; By the way, you can also get away with one certificate that you can re-use on both ISE nodes.&amp;nbsp; But rather create two CSR's (Certificate Signing Requests), one per ISE node, and then bind them to the appropriate ISE node.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for doing this in AD, it requires a bit of setup, but once done, it's quite simple.&amp;nbsp; I did a bunch of google searches and figured it out.&amp;nbsp; Here are some high level things - let's assume you have Server 2012 R2&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Add the Certificate Authority role to the server&lt;/LI&gt;
&lt;LI&gt;Enable the IIS server to use https (a bit involved but necessary to allow you to browse to https://myserver/certsrv for the CSR submission)&lt;/LI&gt;
&lt;LI&gt;Create a certificate template that is a duplicate of the default web server.&amp;nbsp; Change the validity of the cert to say, 5 years.&amp;nbsp; And all the Client Auth EKU (in addition to the Web auth EKU).&amp;nbsp; Set the certificate to be exportable (this allows you to create a cert that you can import into multiple ISE nodes)&lt;/LI&gt;
&lt;LI&gt;Publish the template to the CA service&lt;/LI&gt;
&lt;LI&gt;Create the CSR on ISE nodes - get the resulting CSR as a PEM text output&lt;/LI&gt;
&lt;LI&gt;open IE to https://myserver2012/certsrv&amp;nbsp;&amp;nbsp; and login as the admin user&lt;/LI&gt;
&lt;LI&gt;Request cert, select ISE profile, paste in the CSR and then download the cert&lt;/LI&gt;
&lt;LI&gt;Bind the cert to ISE&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I really summarised a lot of stuff - but that's the high level outline.&amp;nbsp; I might get around to writing a blog about this but I fiddle my way around some of the more Microsofty-things - I only know what I know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Arne&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 01:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708465#M543582</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-09-18T01:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708477#M543583</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only way to get rid of the certificate warning on iPads, it will be to present a public cert signed by a trusted authority. You can achieve this using let's encrypt certificates.&lt;/P&gt;
&lt;P&gt;If you already have a public cert with the private key, you can import it into ise and you can use alias cli command to decide to present another hostname/fqdn different from the one setup during configuration phase.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can sign your ISE cert using your Microsoft PKI following the below steps:&lt;/P&gt;
&lt;P&gt;- generate csr from ISE nodes&lt;/P&gt;
&lt;P&gt;- go to https://your-windows-authority/certsrv --&amp;gt; depends on how it's been setup, it could be http also&lt;/P&gt;
&lt;P&gt;- sign the csr using Web Server certificate template (it should be presented in the web portal otherwise you need to check this out with your windows experts)&lt;/P&gt;
&lt;P&gt;- bind the cert to your csr on ise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can generate 1 certificate and import on both ise servers as well if you want.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyway, the root certificate, even if accepted by a user won't be trusted. To do so, you need to do on setting app, then general, then information and go the menu trusted certificates and put on your root certificate. If you want to do it automatically, you'll need to create a profile using Apple configurator and send it to all of users, then they'll just need to click on it and everything is going to be done automatically.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 02:33:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708477#M543583</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-09-18T02:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708481#M543584</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321306"&gt;@Francesco Molino&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How does one go about getting a certificate from &lt;A href="https://letsencrypt.org/" target="_blank"&gt;https://letsencrypt.org/&lt;/A&gt; ?&amp;nbsp; I thought you had to run an agent on the server that requests the cert - because ISE is so locked down, you won't be able to run the agent.&amp;nbsp; But perhaps you have found a way?&amp;nbsp; That would be brilliant!&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 02:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708481#M543584</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-09-18T02:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708485#M543585</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I didn't say it would be automatic because as you mentioned, you can't do it automatically. It was an example like i would have said GoDaddy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By the way, what i do usually for ISE, for those who don't want to pay for a public cert, i install a Linux machine with a script running every quite 3 months, it gets the cert from let's encrypt, and send it by email. With this process, people don't forget to renew it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry for the confusion! I hope one day we will have a module on ise for that or at least, API to be able to modify certificates.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 03:04:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708485#M543585</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-09-18T03:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708489#M543586</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321306"&gt;@Francesco Molino&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd like to know how to perform that procedure you mentioned (sending cert via email).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have played around with certbot and I just can't get it to work.&amp;nbsp; For example, if I own the domain mycompany.com, but I have not registered any of my hosts in the public DNS, e.g. ise01.mycompany.com is not in the public DNS, but of course it's on my internal DNS, then how does letsencrypt get around the NXDOMAIN issue (non existent domain) ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying this "certbot certonly" procedure, but getting stuck at the domain validation.&amp;nbsp; I would like to know how you get around that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Arne&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 03:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708489#M543586</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-09-18T03:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708491#M543587</link>
      <description>Most of the time, i use wildcard certificates because they'll be used on different devices. &lt;BR /&gt;To do so using certbot, you need to add a dns txt entry on your public dns name. If you look on let's encrypt it's explained. Otherwise you can Audi search for wildcard certificate let's encrypt and you'll find some posts how to achieve this using certbot.&lt;BR /&gt;&lt;BR /&gt;At the end, you'll need to do something on your public dns to be able to get your domain validated and dns txt record is the simplest way.</description>
      <pubDate>Tue, 18 Sep 2018 03:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3708491#M543587</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-09-18T03:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3710835#M543588</link>
      <description>Thanks for the detail on this Arne!</description>
      <pubDate>Fri, 21 Sep 2018 00:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3710835#M543588</guid>
      <dc:creator>dan hale</dc:creator>
      <dc:date>2018-09-21T00:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3780893#M543589</link>
      <description>&lt;P&gt;Hello Francesco,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry to be adding a question to this thread but I presume it is related.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding "The only way to get rid of the certificate warning on iPads, it will be to present a public cert signed by a trusted authority.", I have recently worked on a new ISE 2.3 deployment and migrated services across from the old 2.1 deployment, and have initially utilized a public cert signed by a trusted authority for EAP. It worked fine without any warnings on browsers however we had to accept / trust the certificate on Microsoft and Apple client devices, or with a wireless gpo for windows workstations to trust the top CA in the certificate hierarchy. Just wondering if there is any specific requirement on the public cert to work on EAP without manually requiring to trust the certificate? Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Lay&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 08:17:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3780893#M543589</guid>
      <dc:creator>layhlaing</dc:creator>
      <dc:date>2019-01-16T08:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3781289#M543590</link>
      <description>&lt;P&gt;Unfortunately for APPLE devices you&amp;nbsp;would have to accept the untrusted certificate warning once&amp;nbsp;unless you FORGET the network BUT if you are using more than 1 PSN and you&amp;nbsp;do not have a SAN/Wildcard cert for EAP on ISE, then when you are roaming, the 802.1x reauthentication could alternate PSN's causing the untrusted certificate warning to be displayed on the enduser device at any time. You cannot cache more than 1&amp;nbsp;untrusted cert on the enduser device&amp;nbsp;and that's why the warning keeps showing up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.apple.com/en-ca/HT204132" target="_blank"&gt;https://support.apple.com/en-ca/HT204132&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I am not wrong, I think you can distribute via GPO the Root and Intermediate CA into the&amp;nbsp;enduser Trusted Certificate Authorities DB on windows devices so you can get rid of that warning for that kind of devices no matter if you are using PEAP or EAP-TLS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 16:42:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3781289#M543590</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2019-01-16T16:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3781292#M543591</link>
      <description>Apple devices require you to trust every certificate that is used for EAP. Regardless of the chain and trust. Wildcard should be used in environments where devices are going to roam between PSNs on a frequent basis. With this they only trust the cert once and then it will work on all PSNs&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.networkworld.com/article/2225032/infrastructure-management/what-are-wildcard-certificates-and-how-do-i-use-them-with-ciscos-ise.html" target="_blank"&gt;https://www.networkworld.com/article/2225032/infrastructure-management/what-are-wildcard-certificates-and-how-do-i-use-them-with-ciscos-ise.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_0111.html#concept_8ECCCAF1252E40DDB9A786C0AC7BC3B2" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_0111.html#concept_8ECCCAF1252E40DDB9A786C0AC7BC3B2&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 16 Jan 2019 16:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3781292#M543591</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-01-16T16:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate for IPAD and PEAP still needed in ISE?</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3781310#M543592</link>
      <description>&lt;P&gt;I am not quite sure that a ROOT CA&amp;nbsp;included in the Apple Trusted Certificate Authorities List x iOS that signed the ISE Certificate for EAP (not chained cert) when is presented to the enduser for EAP authentication would trigger the untrusted certificate warning. I will give a try. I am also aware of:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(98, 97, 94); text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: Muli, sans-serif; font-size: 14px; font-style: normal; font-weight: 300; word-spacing: 0px; float: none; display: inline !important; white-space: normal; orphans: 2; widows: 2; background-color: rgb(255, 255, 255); font-variant-ligatures: normal; font-variant-caps: normal; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;An intermediate CA certificate is a subordinate certificate issued by the trusted root specifically to issue end-entity server certificates. The result is a trust-chain that begins at the trusted root CA, through the intermediate and finally ending with the SSL certificate issued to you. Such certificates are called chained root certificates. &lt;U&gt;&lt;STRONG&gt;The usage of an intermediate certificate thus provides an added level of security as the CA does not need to issue certificates directly from the CA root certificate.&lt;/STRONG&gt;&lt;/U&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 16:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-for-ipad-and-peap-still-needed-in-ise/m-p/3781310#M543592</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2019-01-16T16:48:39Z</dc:date>
    </item>
  </channel>
</rss>

