<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec Site-to-Site in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489629#M1055925</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what r u talking about?!!!!!&lt;/P&gt;&lt;P&gt;I need IOS solution not Microsoft one (for every PC).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 24 Sep 2005 13:48:43 GMT</pubDate>
    <dc:creator>paltel</dc:creator>
    <dc:date>2005-09-24T13:48:43Z</dc:date>
    <item>
      <title>IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489610#M1055856</link>
      <description>&lt;P&gt;I have configured IPSec site-to-site tunnel btw. cisco router and Cisco VPN Concentrator and everythink OK. I have a question, now if the clients behind Cisco router wants to access private site behind VPN Concentrator, they will use its name, but they can't because they need first to establish a tunnel, but this tunnel will not be established cause no public DNS server will resolve this private web server. How can we solve this issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489610#M1055856</guid>
      <dc:creator>paltel</dc:creator>
      <dc:date>2020-02-21T08:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489611#M1055857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just want to clarity with you that if there is a need still for this, as the user behind the router can use the lan-lan vpn between the router and the cvpn.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2005 23:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489611#M1055857</guid>
      <dc:creator>rating_is_vital</dc:creator>
      <dc:date>2005-09-14T23:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489612#M1055861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Yes, i read many documents but still did not find a good solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Sep 2005 10:26:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489612#M1055861</guid>
      <dc:creator>paltel</dc:creator>
      <dc:date>2005-09-15T10:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489613#M1055865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;maybe installing a dns server on the remote end is an answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2005 00:46:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489613#M1055865</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-09-16T00:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489614#M1055867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, I'm asking how the client gets the remote site ip address before establishing the IPSec site-to-site tunnel to let the ios check if this ip address is permitted to establish a tunnel or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2005 13:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489614#M1055867</guid>
      <dc:creator>paltel</dc:creator>
      <dc:date>2005-09-16T13:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489615#M1055869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;dns server &amp;lt;--&amp;gt; lan1 &amp;lt;--&amp;gt; router &amp;lt;--&amp;gt; www &amp;lt;--&amp;gt; concentrator &amp;lt;--&amp;gt; lan2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when a lan1 user clicks off an application that has a lan2 hostname as a destination, it sends a dns request to the local dns server. the server then responses with the a lan2 ip, which the router will be able to determine whether the tunnel should be initiated or not. making sense?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2005 15:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489615#M1055869</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-09-16T15:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489616#M1055874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No dns server at lan1, lan1 user type a hostname and the IOS must determine first (before establishing a tunnel) if this hostname ip address is permitted to establish a tunnel or not.&lt;/P&gt;&lt;P&gt;Do you have an idea who the IOS do this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2005 18:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489616#M1055874</guid>
      <dc:creator>paltel</dc:creator>
      <dc:date>2005-09-16T18:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489617#M1055886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a DNS Server at the remote end atleast ? I have also heard you can do a local mapping but iam aint sure how&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2005 11:12:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489617#M1055886</guid>
      <dc:creator>attrgautam</dc:creator>
      <dc:date>2005-09-17T11:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489618#M1055891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sure. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2005 13:44:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489618#M1055891</guid>
      <dc:creator>paltel</dc:creator>
      <dc:date>2005-09-17T13:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489619#M1055894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;dns server &amp;lt;--&amp;gt; lan1 &amp;lt;--&amp;gt; router &amp;lt;--&amp;gt; www &amp;lt;--&amp;gt; concentrator &amp;lt;--&amp;gt; lan2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the router, configure&lt;/P&gt;&lt;P&gt;ip name-server &lt;LAN2 dns="" server=""&gt;&lt;/LAN2&gt;&lt;/P&gt;&lt;P&gt;ip forward-protocol udp 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip forward-protocol&lt;/P&gt;&lt;P&gt;To specify which protocols and ports the router forwards when forwarding broadcast packets, use the ip forward-protocol global configuration command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then include the router wan ip as part of the lan-lan vpn. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in theory, &lt;/P&gt;&lt;P&gt;1. lan1 user kicks off the app by hostname&lt;/P&gt;&lt;P&gt;2. router tries to resolve the name by contacting the dns&lt;/P&gt;&lt;P&gt;3. since router wan ip is part of the lan-lan vpn, the vpn should be initiated&lt;/P&gt;&lt;P&gt;4. bingo lan1 user gets in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;let me know if this works as i've never try this before&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Sep 2005 02:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489619#M1055894</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-09-19T02:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489620#M1055897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah i think that will work. Include the DNS server in your IPSec traffic, DNS request will get forwarded to the remote end DNS server. So your DNS query will trigger the tunnel. But for this , a DNS server is needed at the other end atleast&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Sep 2005 10:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489620#M1055897</guid>
      <dc:creator>attrgautam</dc:creator>
      <dc:date>2005-09-19T10:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489621#M1055904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jackko,&lt;/P&gt;&lt;P&gt;Thank you. Let us say the following:&lt;/P&gt;&lt;P&gt;DNS public --&amp;gt; 1.1.1.1&lt;/P&gt;&lt;P&gt;DNS LAN2 ip address --&amp;gt; 10.5.5.5&lt;/P&gt;&lt;P&gt;LAN1 users configured for 1.1.1.1 DNS at this time, they must be configured for 10.5.5.5? But this will make the session active all the time since all the dns requests will be checked through this private DNS at LAN2.&lt;/P&gt;&lt;P&gt;I need from the IOS to check the ip address for any hostname if it is from the LAN2 ip addresses then this will trigger the site-to-site IPSec session, otherwise keep this session inactive and forward it to the internet. Is this possible?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Sep 2005 18:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489621#M1055904</guid>
      <dc:creator>paltel</dc:creator>
      <dc:date>2005-09-19T18:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489622#M1055908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not sure if it's possible. however there are cisco experts reading this forum every seconds around the world and no one seems suggesting the ios code. so maybe it's not very straight forward.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wondering how many user are we talking about. if only a few, maybe edit the local host file on the pc is an option.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Sep 2005 23:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489622#M1055908</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-09-19T23:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489623#M1055912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;just wondering how you go. figured out a workaround?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2005 01:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489623#M1055912</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-09-23T01:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489624#M1055916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jackko,&lt;/P&gt;&lt;P&gt;The best solution till now is to let LAN1 clients get LAN2 DNS (i configured DHCP at LAN1 router). This make the IPSec session to be active all the time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2005 06:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489624#M1055916</guid>
      <dc:creator>paltel</dc:creator>
      <dc:date>2005-09-23T06:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489625#M1055920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i guess one of the cons is that all the dns requests now going through the vpn and comsuming the bandwidth. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in case bandwidth is a concern, i guess you can manipulate the host file of the primary user pc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2005 10:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489625#M1055920</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-09-23T10:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489626#M1055922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wonder why should IPSec be active all the time. The IPSec is going to trigger whenever there is going to be interesting traffic to the server, in this case the traffic will be the DNS request.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2005 10:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489626#M1055922</guid>
      <dc:creator>attrgautam</dc:creator>
      <dc:date>2005-09-23T10:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489627#M1055923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Attrgautam,&lt;/P&gt;&lt;P&gt;I see this is not a good solution, but if they got a public DNS server, and a LAN1 user typed a LAN2 hostname it will not trigger the IPSec tunnel because the public DNS server will return failed DNS reply.&lt;/P&gt;&lt;P&gt;I tried your suggestion to use ip forward-protocol udp 53, but did not successed! I don't have another solution!&lt;/P&gt;&lt;P&gt;...........&lt;/P&gt;&lt;P&gt;Please can you give more details about "manipulate the host file of the primary user pc"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2005 13:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489627#M1055923</guid>
      <dc:creator>paltel</dc:creator>
      <dc:date>2005-09-23T13:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489628#M1055924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the issue is due to the fact that lan2 pc cannot resolve the ip by the server name, since there is no dns server installed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this issue can be resolved by adding an entry to the pc host file. windows machine looks up the host file first and then after the dsn server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to edit the host file, open it with notepad&lt;/P&gt;&lt;P&gt;C:\WINDOWS\system32\drivers\etc\hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below is the default host file&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Copyright (c) 1993-1999 Microsoft Corp.&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;# This file contains the mappings of IP addresses to host names. Each&lt;/P&gt;&lt;P&gt;# entry should be kept on an individual line. The IP address should&lt;/P&gt;&lt;P&gt;# be placed in the first column followed by the corresponding host name.&lt;/P&gt;&lt;P&gt;# The IP address and the host name should be separated by at least one&lt;/P&gt;&lt;P&gt;# space.&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;# Additionally, comments (such as these) may be inserted on individual&lt;/P&gt;&lt;P&gt;# lines or following the machine name denoted by a '#' symbol.&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;# For example:&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;#      102.54.94.97     rhino.acme.com          # source server&lt;/P&gt;&lt;P&gt;#       38.25.63.10     x.acme.com              # x client host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;127.0.0.1       localhost&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;under the first entry, put in the lan2 ip address, hit the &lt;TAB&gt; key and put in the server name.&lt;/TAB&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;127.0.0.1       localhost&lt;/P&gt;&lt;P&gt;192.168.0.1     server_xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the catch with this workaround is that it's a manual process, so you will need to do this on every single pc. however, you may do it on the primary user pc instead. that means the lan2 office will need to depend on this primary user/pc to initiate the vpn.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Sep 2005 10:59:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489628#M1055924</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-09-24T10:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Site-to-Site</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489629#M1055925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what r u talking about?!!!!!&lt;/P&gt;&lt;P&gt;I need IOS solution not Microsoft one (for every PC).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Sep 2005 13:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-site-to-site/m-p/489629#M1055925</guid>
      <dc:creator>paltel</dc:creator>
      <dc:date>2005-09-24T13:48:43Z</dc:date>
    </item>
  </channel>
</rss>

