<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Data Updates on Devices SI DNS Lists and Feeds - Failure - Reapair Instructions in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4296287#M1078741</link>
    <description>&lt;P&gt;I checked my 3D7125 running 6.4.0.10 and it does not appear to have a connector.properties anywhere.&lt;/P&gt;
&lt;P&gt;You might have to open a TAC case to resolve that one.&lt;/P&gt;</description>
    <pubDate>Tue, 23 Feb 2021 18:35:16 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2021-02-23T18:35:16Z</dc:date>
    <item>
      <title>Threat Data Updates on Devices SI DNS Lists and Feeds - Failure</title>
      <link>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/3935411#M936514</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone encountered the below error?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Threat Data Updates on Devices SI DNS Lists and Feeds - Failure&lt;/P&gt;&lt;P&gt;I have asa with sfr(6.2.3.6) and after upgrade to 6.4.0.4 i get this error.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any hints?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Konstantinos&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/3935411#M936514</guid>
      <dc:creator>kostasthedelegate</dc:creator>
      <dc:date>2020-02-21T17:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Data Updates on Devices SI DNS Lists and Feeds - Failure</title>
      <link>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/3936154#M936515</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried this command and it was successful.&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;admin@Firepower:~
sudo curl -vvk https://tools.cisco.com&lt;/PRE&gt;&lt;P&gt;It is the same channel with the other updates, right?&lt;/P&gt;&lt;P&gt;What might be wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Konstantinos&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 06:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/3936154#M936515</guid>
      <dc:creator>kostasthedelegate</dc:creator>
      <dc:date>2019-10-07T06:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Data Updates on Devices SI DNS Lists and Feeds - Failure - Reapair Instructions</title>
      <link>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4068937#M1069316</link>
      <description>&lt;P&gt;Sorry for the late reply but hopefully this will be of use to others encountering the problem. It seems to affect 6.4.x and 6.5.x (as recent as 6.5.0.4).&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvs82369" target="_blank" rel="noopener"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvs82369&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;My recent but limited experience with 6.6 hasn't shown it to be an issue there so far.&lt;/P&gt;
&lt;P&gt;The workaround is a bit lacking in details:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;STRONG style="color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;Workaround:&lt;/STRONG&gt;&lt;BR style="color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;" /&gt;&lt;SPAN style="color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;Manually edit /ngfw/etc/sf/connector.properties on all failing devices and set connector_fqdn to the region defined in /ngfw/var/tmp/tds-cloud-events.json on that device.&lt;/SPAN&gt;&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Here's a more thorough explanation:&lt;/P&gt;
&lt;P&gt;1. Log into the device(s) reporting the problem in FMC.&lt;/P&gt;
&lt;P&gt;2. Change to expert mode and then sudo to su (superuser, aka "root").&lt;/P&gt;
&lt;P&gt;3. Inspect the files "/ngfw/var/tmp/tds-cloud-events.json" and "/ngfw/etc/sf/connector.properties".&lt;/P&gt;
&lt;P&gt;4. Make a backup of /ngfw/etc/sf/connector.properties&lt;/P&gt;
&lt;P&gt;5. Edit /ngfw/etc/sf/connector.properties to add the value from the region variable in the json file to the "connector_fqdn=" line. (vi is built into RHEL so just vi the file, switch to insert mode with i, add the text, esc to command mode and then :wq to write and quit).&lt;/P&gt;
&lt;P&gt;6. Verify your changes are as expected.&lt;/P&gt;
&lt;P&gt;7. Wait a few minutes and the alarm should clear in FMC. No restart, deployment or other changes should be necessary.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&amp;gt; expert
**************************************************************
NOTICE - Shell access will be deprecated in future releases
         and will be replaced with a separate expert mode CLI.
**************************************************************
admin@fw1:~$ cd /ngfw/var/tmp
admin@fw1:/ngfw/var/tmp$ ls -al | grep tds
-rw-r--r--  1 root root   140 Apr 18 16:00 tds-cloud-events.json
-rw-r--r--  1 root root   351 Apr 19 02:34 tds_health.status
admin@fw1:/ngfw/var/tmp$ cat tds-cloud-events.json 
{
   "events" : {
      "connection" : 0,
      "file" : 0,
      "intrusion" : 0
   },
   "csd" : "1",
   "region" : "&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;api-sse.cisco.com&lt;/STRONG&gt;&lt;/FONT&gt;"
}
admin@fw1:/ngfw/var/tmp$ cd /ngfw/etc/sf/
admin@fw1:/ngfw/etc/sf$ cat connector.properties 
registration_interval=180
connector_port=8989
&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;connector_fqdn=&lt;/FONT&gt;&lt;/STRONG&gt;
region_discovery_endpoint=https://api-sse.cisco.com/providers/sse/api/v1/regions
admin@fw1:/ngfw/etc/sf$ 
admin@fw1:/ngfw/etc/sf$ sudo su -

We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:

    #1) Respect the privacy of others.
    #2) Think before you type.
    #3) With great power comes great responsibility.

Password: 
root@fw1:~# pwd
/root
root@fw1:~# cd /ngfw/etc/sf
root@fw1:sf# cp connector.properties connector.properties.old
root@fw1:sf# vi connector.properties
root@fw1:sf# cat connector.properties
registration_interval=180
connector_port=8989
connector_fqdn=api-sse.cisco.com
region_discovery_endpoint=https://api-sse.cisco.com/providers/sse/api/v1/regions
root@fw1:sf# cat /ngfw/etc/sf/connector.properties
registration_interval=180
connector_port=8989
&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;connector_fqdn=api-sse.cisco.com&lt;/STRONG&gt;&lt;/FONT&gt;
region_discovery_endpoint=https://api-sse.cisco.com/providers/sse/api/v1/regions
root@fw1:sf# 
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Apr 2020 03:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4068937#M1069316</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-04-19T03:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Data Updates on Devices SI DNS Lists and Feeds - Failure - Reapair Instructions</title>
      <link>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4296196#M1078736</link>
      <description>&lt;P&gt;Marvin, but what about sensors (7000-8000 series)&amp;nbsp; giving this same health alert.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I looked in /etc/sf&amp;nbsp;&amp;nbsp; and /var/tmp&amp;nbsp;&amp;nbsp; since NGFW is not a directory on the sensors,&amp;nbsp; but did not see these files.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did find the health status that does show a failure, but no indications of what failed,&amp;nbsp;&amp;nbsp; when I go into the&amp;nbsp; /var/sf/ directory and reviewing the files in&amp;nbsp; iprep_download, sidns_download, they appear to be up to date.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;:/var/tmp# more tds_health.status&lt;BR /&gt;{&lt;BR /&gt;"modules" : {&lt;BR /&gt;"Siurl" : "Success",&lt;BR /&gt;"ThreatConf" : "Success",&lt;BR /&gt;"SHAList" : "Success",&lt;BR /&gt;"Siip" : "Failure",&lt;BR /&gt;"Clam" : "Success",&lt;BR /&gt;"CloudEvents" : "Success",&lt;BR /&gt;"Sidns" : "Failure",&lt;BR /&gt;"Bcdb" : "Success",&lt;BR /&gt;"DynamicAnalysis" : "Success"&lt;BR /&gt;},&lt;BR /&gt;"timestamp" : 1614091171&lt;BR /&gt;}&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 16:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4296196#M1078736</guid>
      <dc:creator>Solutionary</dc:creator>
      <dc:date>2021-02-23T16:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Data Updates on Devices SI DNS Lists and Feeds - Failure - Reapair Instructions</title>
      <link>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4296287#M1078741</link>
      <description>&lt;P&gt;I checked my 3D7125 running 6.4.0.10 and it does not appear to have a connector.properties anywhere.&lt;/P&gt;
&lt;P&gt;You might have to open a TAC case to resolve that one.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 18:35:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4296287#M1078741</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-02-23T18:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Data Updates on Devices SI DNS Lists and Feeds - Failure - Reapair Instructions</title>
      <link>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4317354#M1079822</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for you explanation, i am also getting similar alerts on my FMC.I have verified region and connector_fqdn filed on FTD but they seems to be okay, could you please suggest further.Below&amp;nbsp; are logs for your reference.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;XXXX:/ngfw/var/tmp$ cat tds-cloud-events.json&lt;BR /&gt;{&lt;BR /&gt;"events" : {&lt;BR /&gt;"connection" : 1,&lt;BR /&gt;"file" : 1,&lt;BR /&gt;"prioritizedConnection" : 0,&lt;BR /&gt;"intrusion" : 1&lt;BR /&gt;},&lt;BR /&gt;"csd" : "0",&lt;BR /&gt;"region" : "api.eu.sse.itd.cisco.com"&lt;BR /&gt;}&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;XXXX:/ngfw/etc/sf$ cat connector.properties&lt;BR /&gt;registration_interval=180&lt;BR /&gt;connector_port=8989&lt;BR /&gt;connector_fqdn=api.eu.sse.itd.cisco.com&lt;BR /&gt;region_discovery_endpoint=&lt;A href="https://api-sse.cisco.com/providers/sse/api/v1/regions" target="_blank"&gt;https://api-sse.cisco.com/providers/sse/api/v1/regions&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Apr 2021 12:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4317354#M1079822</guid>
      <dc:creator>rohan.govindjiwala1</dc:creator>
      <dc:date>2021-04-01T12:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Data Updates on Devices SI DNS Lists and Feeds - Failure - Reapair Instructions</title>
      <link>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4317541#M1079829</link>
      <description>&lt;P&gt;If you have verified the settings (as as you noted) and continue to have the error, I suggest opening a TAC case to investigate and resolve the issue.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Apr 2021 17:02:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4317541#M1079829</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-04-01T17:02:26Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Data Updates on Devices SI DNS Lists and Feeds - Failure - Reapair Instructions</title>
      <link>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4317788#M1079836</link>
      <description>&lt;P&gt;Okay Marvin, will do the same. Thanks for your response.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Apr 2021 09:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/4317788#M1079836</guid>
      <dc:creator>rohan.govindjiwala1</dc:creator>
      <dc:date>2021-04-02T09:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Data Updates on Devices SI DNS Lists and Feeds - Failure -</title>
      <link>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/5085256#M1111952</link>
      <description>&lt;P&gt;hi Marvin&lt;/P&gt;&lt;P&gt;I just updateed our FTD's all over the world to 7.2.6 due to this security-flaw CSCwj10955 - and after that i have got this error in some regions - our FMC is located in northern Europe - and the FTD is in China.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since the update the FTD in China has a warning "SI URL Lists and Feeds - failure"&lt;/P&gt;&lt;P&gt;If i look for similar configs like those just showen in this chat i have:&lt;BR /&gt;cat tds-cloud-events.json&lt;BR /&gt;{&lt;BR /&gt;"csd" : "0",&lt;BR /&gt;"events" : {&lt;BR /&gt;"connection" : 0,&lt;BR /&gt;"file" : 0,&lt;BR /&gt;"connection_all" : 0,&lt;BR /&gt;"intrusion" : 0&lt;BR /&gt;},&lt;BR /&gt;"csn" : {&lt;BR /&gt;"has_been_asked_to_participate" : "1",&lt;BR /&gt;"cisco_success_network" : "1",&lt;BR /&gt;"is_sse_enrolled_first_use" : "1"&lt;BR /&gt;},&lt;BR /&gt;"region" : "api.eu.sse.itd.cisco.com",&lt;BR /&gt;"ltp" : null&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This of course worries me a bit that the region is defined to something in europe and not asia but on the other hand it doesnt look as if the is a connectivity problme - curl connects fine:&lt;BR /&gt;curl -vvk &lt;A href="https://api.eu.sse.itd.cisco.com" target="_blank"&gt;https://api.eu.sse.itd.cisco.com&lt;/A&gt;&lt;BR /&gt;* Trying 18.158.186.55...&lt;BR /&gt;* TCP_NODELAY set&lt;BR /&gt;* Connected to api.eu.sse.itd.cisco.com (18.158.186.55) port 443 (#0)&lt;BR /&gt;* successfully set FIPS mode: 0&lt;BR /&gt;* ALPN, offering http/1.1&lt;BR /&gt;* successfully set certificate verify locations:&lt;BR /&gt;* CAfile: none&lt;BR /&gt;CApath: /etc/ssl/certs&lt;BR /&gt;* TLSv1.3 (OUT), TLS handshake, Client hello (1):&lt;BR /&gt;* successfully set FIPS mode: 0&lt;BR /&gt;* successfully set FIPS mode: 0&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, Server hello (2):&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, [no content] (0):&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):&lt;BR /&gt;* successfully set FIPS mode: 0&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, [no content] (0):&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, Certificate (11):&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, [no content] (0):&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, CERT verify (15):&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, [no content] (0):&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, Finished (20):&lt;BR /&gt;* TLSv1.3 (OUT), TLS change cipher, Client hello (1):&lt;BR /&gt;* TLSv1.3 (OUT), TLS handshake, [no content] (0):&lt;BR /&gt;* TLSv1.3 (OUT), TLS handshake, Finished (20):&lt;BR /&gt;* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384&lt;BR /&gt;* ALPN, server accepted to use http/1.1&lt;BR /&gt;* Server certificate:&lt;BR /&gt;* subject: C=US; ST=California; L=San Jose; O=Cisco Systems Inc.; CN=api.eu.sse.itd.cisco.com&lt;BR /&gt;* start date: Feb 29 16:52:10 2024 GMT&lt;BR /&gt;* expire date: Feb 28 16:51:10 2025 GMT&lt;BR /&gt;* issuer: C=US; O=IdenTrust; OU=HydrantID Trusted Certificate Service; CN=HydrantID Server CA O1&lt;BR /&gt;* SSL certificate verify ok.&lt;BR /&gt;* TLSv1.3 (OUT), TLS app data, [no content] (0):&lt;BR /&gt;&amp;gt; GET / HTTP/1.1&lt;BR /&gt;&amp;gt; Host: api.eu.sse.itd.cisco.com&lt;BR /&gt;&amp;gt; User-Agent: curl/7.61.0&lt;BR /&gt;&amp;gt; Accept: */*&lt;BR /&gt;&amp;gt;&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, [no content] (0):&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, [no content] (0):&lt;BR /&gt;* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):&lt;BR /&gt;* TLSv1.3 (IN), TLS app data, [no content] (0):&lt;BR /&gt;&amp;lt; HTTP/1.1 403 Forbidden&lt;BR /&gt;&amp;lt; Date: Wed, 01 May 2024 05:32:30 GMT&lt;BR /&gt;&amp;lt; Content-Type: text/plain; charset=utf-8&lt;BR /&gt;&amp;lt; Content-Length: 9&lt;BR /&gt;&amp;lt; Connection: keep-alive&lt;BR /&gt;&amp;lt; Keep-Alive: timeout=5&lt;BR /&gt;&amp;lt; ETag: "6615b447-9"&lt;BR /&gt;&amp;lt; Cache-Control: no-store&lt;BR /&gt;&amp;lt; Pragma: no-cache&lt;BR /&gt;&amp;lt; Content-Security-Policy: default-src https: ;&lt;BR /&gt;&amp;lt; X-Content-Type-Options: nosniff&lt;BR /&gt;&amp;lt; X-XSS-Protection: 1; mode=block&lt;BR /&gt;&amp;lt; X-Frame-Options: SAMEORIGIN&lt;BR /&gt;&amp;lt; Strict-Transport-Security: max-age=31536000; includeSubDomains&lt;BR /&gt;&amp;lt;&lt;BR /&gt;* Connection #0 to host api.eu.sse.itd.cisco.com left intact&lt;BR /&gt;&lt;BR /&gt;Any ideas - suggestions?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2024 05:42:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/threat-data-updates-on-devices-si-dns-lists-and-feeds-failure/m-p/5085256#M1111952</guid>
      <dc:creator>tiwang</dc:creator>
      <dc:date>2024-05-01T05:42:03Z</dc:date>
    </item>
  </channel>
</rss>

