<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928540#M148226</link>
    <description>&lt;DIV&gt;Hi,&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;P&gt;If &amp;nbsp;we do the below &amp;nbsp;dns traffic will &amp;nbsp;not go outside like ping drops &amp;nbsp;if we did not add the command inspect icmp&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;Please correct me if &amp;nbsp;I am wrong&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;policy-map global_policy&lt;/DIV&gt;
&lt;DIV&gt;class inspection_default&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;no inspect dns&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;Thanks&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 28 Dec 2016 08:57:42 GMT</pubDate>
    <dc:creator>muhsi_2015</dc:creator>
    <dc:date>2016-12-28T08:57:42Z</dc:date>
    <item>
      <title>dns inspect</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928532#M148215</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have dns server (windows only ) &amp;nbsp;which forward &amp;nbsp;the request to an open resolver ,suddenly it does not resolve &amp;nbsp;the &amp;nbsp;dns requestes . So the client (resolver) get &amp;nbsp;timed out &amp;nbsp;message when try to resolve&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is the dns related &amp;nbsp;information on the asa firewall&amp;nbsp;&lt;/P&gt;
&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;/P&gt;
&lt;P&gt;&amp;nbsp;show asp drop frame&lt;/P&gt;
&lt;P&gt;&amp;nbsp;DNS Inspect invalid domain label (inspect-dns-invalid-domain-label) 5101&lt;BR /&gt;&amp;nbsp;DNS Inspect invalid domain label (inspect-dns-invalid-domain-label) 5101&lt;BR /&gt;DNS Inspect id not matched (inspect-dns-id-not-matched) 6902&lt;BR /&gt;&amp;nbsp;DNS Inspect id not matched (inspect-dns-id-not-matched) 6902&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:42:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928532#M148215</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2019-03-12T08:42:28Z</dc:date>
    </item>
    <item>
      <title>To fix the issue, we need to</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928533#M148216</link>
      <description>&lt;P&gt;To fix the issue, we need to understand why these asp drop codes are seen. Below link talks about the same:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/show_asp_drop/show_asp_drop.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now, first thing we need here is to understand is if these asp drop packets are legit packets and still dropped by the firewall. Packet-captures taken on the firewall will help us in identifying this fact.&lt;/P&gt;
&lt;P&gt;If you are 100% sure that these packets are genuine and need to be allowed, then we would need to modify the inspect dns type policy map and allow these parameters keeping in mind that this will create a security hole through the appliance.&lt;/P&gt;
&lt;P&gt;For modifying the policy-map, below link will be useful:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/mpf_inspect_maps.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2016 19:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928533#M148216</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2016-12-26T19:03:09Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928534#M148217</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Actually &amp;nbsp;I am &amp;nbsp;trying to troubleshoot an issue as &amp;nbsp;I discussed in my earlier &amp;nbsp;post .&lt;/P&gt;
&lt;P&gt;Suddenly &amp;nbsp;our dns server cannot resolve &amp;nbsp;the &amp;nbsp;query which is sent by the hosts in the local network.&lt;/P&gt;
&lt;P&gt;and the problem getting resolved after few minutes . And it recurs after sometime .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dns server forward the request to google open resolver (8.8.8.8) and &amp;nbsp;to local isp's dns also .&lt;/P&gt;
&lt;P&gt;So i was thinking it is something related with asa.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;" If you are 100% sure that these packets are genuine and need to be allowed, then we would need to modify the inspect dns type policy map and allow these parameters keeping in mind that this will create a security hole through the appliance. "&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;could you tell me what &amp;nbsp;exactly do i need to modify&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2016 19:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928534#M148217</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2016-12-26T19:13:58Z</dc:date>
    </item>
    <item>
      <title>Can you please attach the</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928535#M148219</link>
      <description>&lt;P&gt;Can you please attach the output of &lt;STRONG&gt;show service-policy inspect dns&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 06:18:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928535#M148219</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2016-12-27T06:18:41Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928536#M148221</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;show service-policy inspect dns&lt;/P&gt;
&lt;P&gt;Global policy:&lt;BR /&gt; Service-policy: global_policy&lt;BR /&gt; Class-map: inspection_default&lt;BR /&gt; Inspect: dns _default_dns_map, packet 86774077, lock fail 0, drop 12328, reset-drop 0, v6-fail-close 0&lt;BR /&gt; dns-guard, count 40828688&lt;BR /&gt; protocol-enforcement, drop 5107&lt;BR /&gt; nat-rewrite, count 0&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 07:16:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928536#M148221</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2016-12-27T07:16:16Z</dc:date>
    </item>
    <item>
      <title>There are too many drops</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928537#M148223</link>
      <description>&lt;P&gt;There are too many drops under 'protocol-enforcement. Lets start by disabling this feature. Please send me output of 'show run policy-map' , I will send you the commands.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please keep in mind that by removing these features, we are making the firewall prone to attacks. I am assuming that you know for sure that traffic dropped is legit traffic.&lt;/P&gt;
&lt;P&gt;I am only suggesting this for your case. Not a solution, but a workaround.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 10:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928537#M148223</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2016-12-27T10:33:08Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928538#M148224</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;here is the &amp;nbsp;output&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect dns&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect http&lt;BR /&gt; class netflow-export-class&lt;BR /&gt; flow-export event-type flow-create destination 192.168.100.100&lt;BR /&gt; flow-export event-type flow-denied destination 192.168.100.100&lt;BR /&gt; flow-export event-type flow-update destination 192.168.100.100&lt;BR /&gt; class class-default&lt;BR /&gt; user-statistics accounting&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 14:41:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928538#M148224</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2016-12-27T14:41:01Z</dc:date>
    </item>
    <item>
      <title>Sorry, I am in a different</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928539#M148225</link>
      <description>&lt;P&gt;Sorry, I am in a different timezone and hence the delay.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Try below commands:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;policy-map type inspect dns preset_dns_map&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;parameters&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;no &lt;SPAN&gt;protocol-enforcement&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let me know if it works. If it still fails, we might have to consider removing the dns policy altogether. Something like:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;policy-map global_policy&lt;BR /&gt;&lt;SPAN&gt;class inspection_default&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;no inspect dns&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;AJ&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2016 05:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928539#M148225</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2016-12-28T05:54:48Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928540#M148226</link>
      <description>&lt;DIV&gt;Hi,&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;P&gt;If &amp;nbsp;we do the below &amp;nbsp;dns traffic will &amp;nbsp;not go outside like ping drops &amp;nbsp;if we did not add the command inspect icmp&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;Please correct me if &amp;nbsp;I am wrong&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;policy-map global_policy&lt;/DIV&gt;
&lt;DIV&gt;class inspection_default&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;no inspect dns&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;Thanks&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 28 Dec 2016 08:57:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928540#M148226</guid>
      <dc:creator>muhsi_2015</dc:creator>
      <dc:date>2016-12-28T08:57:42Z</dc:date>
    </item>
    <item>
      <title>By removing inspect dns, dns</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928541#M148227</link>
      <description>&lt;P&gt;By removing inspect dns, dns will still work but as normal udp traffic.&lt;/P&gt;
&lt;P&gt;The reason why icmp stops working after removing inspect icmp is that icmp is stateless and return traffic is dropped on ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2016 11:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928541#M148227</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2016-12-28T11:04:16Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928542#M148228</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;It seems that the issue was from isp side .Before applying &amp;nbsp;commands in your previous post , It would be great if you clarify few doubts .&lt;/P&gt;
&lt;P&gt;1.How can I verify &amp;nbsp;why and what asa dropped &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;DNS Inspect invalid domain label (inspect-dns-invalid-domain-label) 5101&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;DNS Inspect invalid domain label (inspect-dns-invalid-domain-label) 5101&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;DNS Inspect id not matched (inspect-dns-id-not-matched) 6902&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;DNS Inspect id not matched (inspect-dns-id-not-matched) 6902&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And what will happen if I do the below&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;policy-map global_policy&lt;BR /&gt;...&lt;BR /&gt; inspect dns preset_dns_map&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;....&lt;/P&gt;
&lt;P&gt;(Removed other inspect )&lt;/P&gt;
&lt;P&gt;And &amp;nbsp;you were really helpful&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2016 22:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928542#M148228</guid>
      <dc:creator>elite2010</dc:creator>
      <dc:date>2016-12-28T22:17:16Z</dc:date>
    </item>
    <item>
      <title>1.</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928543#M148229</link>
      <description>&lt;P&gt;1.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To identify the exact packet that was dropped under the asp drop can be seen by applying the asp drop capture:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;something like:&lt;/P&gt;
&lt;P&gt;capture &amp;lt;name&amp;gt; type asp-drop &amp;lt;type&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On your case,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;capture test type asp-drop&amp;nbsp;&lt;SPAN&gt;inspect-dns-invalid-domain-label&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;or&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;capture test type asp-drop &lt;SPAN&gt;inspect-dns-id-not-matched&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;your second question is not clear. Please rephrase.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2016 06:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspect/m-p/2928543#M148229</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2016-12-29T06:32:01Z</dc:date>
    </item>
  </channel>
</rss>

