<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi marc@taylorcorp.co.nz! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932823#M149304</link>
    <description>&lt;P&gt;&lt;G class="gr_ gr_216 gr-alert gr_gramm gr_disable_anim_appear Punctuation only-ins replaceWithoutSep" id="216" data-gr-id="216"&gt;Hi&lt;/G&gt; &lt;A href="https://supportforums.cisco.com/users/marctaylorcorpconz"&gt;marc@taylorcorp.co.nz&lt;/A&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;1) The inside interface is 192.168.2.0/24 and I can ping and remote desktop all machines on the inside interface.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;What device do you have? If you have a net /24 all traffic should communicate by layer 2, so it is okay that you have all permitted.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;2) The dst machine is more often than not 192.168.2.200 which is always connected to the network (wifi).&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Which is the interface wifi, inside too?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;3) The dst port is always 7680 which appears to be used for windows 10 updates??&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I don't know what is this port.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Run the follows commands:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;show running-config same-security-traffic&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;To check if you've permit communication in and out the same interface. It is used generally in environments of VPN.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;show route | grep 192.168.2.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;To check if both hosts are in the same interface, that it should be "inside".&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;show arp | grep 192.168.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;To check the layer 2.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
    <pubDate>Wed, 12 Oct 2016 23:49:10 GMT</pubDate>
    <dc:creator>Matias Ortiz</dc:creator>
    <dc:date>2016-10-12T23:49:10Z</dc:date>
    <item>
      <title>Inbound TCP connection denied from 192.168.2.210/55187 to 192.168.2.200/7680 flags SYN  on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932822#M149303</link>
      <description>&lt;P&gt;Hi helpful people,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have an issue that is confusing me and hoping someone can shed some light on the situation.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am receiving a number of log entries of the nature:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;Inbound TCP connection denied from 192.168.2.210/55187 to 192.168.2.200/7680 flags SYN on interface inside&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have done plenty of googling and can only find situations where the src and dst ip's are on different subnets and interfaces and they have generally been routing issues, but I haven't been able to find anyone having the same issue as me where the src and dst ip's are on the same subnet and interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Important points to note:&lt;/P&gt;
&lt;P&gt;1) The inside interface is 192.168.2.0/24 and I can ping and remote desktop all machines on the inside interface.&lt;/P&gt;
&lt;P&gt;2) The dst machine is more often than not 192.168.2.200 which is not always connected to the network (laptop on wifi).&lt;/P&gt;
&lt;P&gt;3) The dst port is always 7680 which appears to be used for windows 10 updates??&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any assistance in understanding what is going on is appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932822#M149303</guid>
      <dc:creator>marc</dc:creator>
      <dc:date>2019-03-12T08:23:20Z</dc:date>
    </item>
    <item>
      <title>Hi marc@taylorcorp.co.nz!</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932823#M149304</link>
      <description>&lt;P&gt;&lt;G class="gr_ gr_216 gr-alert gr_gramm gr_disable_anim_appear Punctuation only-ins replaceWithoutSep" id="216" data-gr-id="216"&gt;Hi&lt;/G&gt; &lt;A href="https://supportforums.cisco.com/users/marctaylorcorpconz"&gt;marc@taylorcorp.co.nz&lt;/A&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;1) The inside interface is 192.168.2.0/24 and I can ping and remote desktop all machines on the inside interface.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;What device do you have? If you have a net /24 all traffic should communicate by layer 2, so it is okay that you have all permitted.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;2) The dst machine is more often than not 192.168.2.200 which is always connected to the network (wifi).&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Which is the interface wifi, inside too?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;3) The dst port is always 7680 which appears to be used for windows 10 updates??&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I don't know what is this port.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Run the follows commands:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;show running-config same-security-traffic&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;To check if you've permit communication in and out the same interface. It is used generally in environments of VPN.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;show route | grep 192.168.2.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;To check if both hosts are in the same interface, that it should be "inside".&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;show arp | grep 192.168.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;To check the layer 2.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2016 23:49:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932823#M149304</guid>
      <dc:creator>Matias Ortiz</dc:creator>
      <dc:date>2016-10-12T23:49:10Z</dc:date>
    </item>
    <item>
      <title>Hi Matias,</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932824#M149305</link>
      <description>&lt;P&gt;Hi Matias,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your reply.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1) It is a Cisco ASA 5505&lt;/P&gt;
&lt;P&gt;2) Correction, the device at 192.168.2.200 is NOT always connected to the network as it is a laptop that comes and goes via wifi. Yes the wifi ap is on the inside network.&lt;/P&gt;
&lt;P&gt;3) Results in no output. I don't have this enabled as I didn't think it neccessary. I have always been able to ping and connect to any machine/device on the inside interface network without this enabled, and I still can. I just don't understand why the ASA is all of a sudden saying it is denying inbound TCP connections between machines on the same interface (inside).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"SyslogID 106001&amp;nbsp;Inbound TCP connection denied from 192.168.2.210/55187 to 192.168.2.200/7680 flags SYN on interface inside"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This shows in the log as a critical error, hence why I am trying to figure out what is going on.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Correct me if I am wrong but doesn't this imply that the machine at 192.168.2.210 is trying to connect to the machine at 192.168.2.200 but the ASA is denying this traffic. Why is this? I thought machines on the inside subnet would be able to communicate with each other. Sorry I am new to a lot of this but learning.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;4) Hosts are in the same interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks again&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 01:11:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932824#M149305</guid>
      <dc:creator>marc</dc:creator>
      <dc:date>2016-10-13T01:11:30Z</dc:date>
    </item>
    <item>
      <title>Do you have below command in</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932825#M149306</link>
      <description>&lt;P&gt;Do you have below command in your Firewall&amp;nbsp;config if not then add and test it&amp;nbsp;&lt;/P&gt;
&lt;P&gt;same-security-traffic permit intra-interface&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 06:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932825#M149306</guid>
      <dc:creator>Pawan Raut</dc:creator>
      <dc:date>2016-10-13T06:41:58Z</dc:date>
    </item>
    <item>
      <title>Hi! You are right, this flow</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932826#M149307</link>
      <description>&lt;P&gt;Hi! You are right, this flow should not be caught by the ASA. But if you have the log it's because something is wrong with the configuration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is the description of the message:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Error Message %ASA-2-106001: Inbound TCP connection denied from IP_address/port to IP_address/port flags tcp_flags on interface interface_name&lt;/P&gt;
&lt;P&gt;Explanation An attempt was made to connect to an inside address is denied by the security policy that is defined for the specified traffic type. The IP address displayed is the real IP address instead of the IP address that appears through NAT. Possible tcp_flags values correspond to the flags in the TCP header that were present when the connection was denied. For example, a TCP packet arrived for which no connection state exists in the ASA, and it was dropped. The tcp_flags in this packet are FIN and ACK.&lt;/P&gt;
&lt;P&gt;The tcp_flags are as follows:&lt;/P&gt;
&lt;P&gt;ACK—The acknowledgment number was received&lt;BR /&gt;FIN—Data was sent&lt;BR /&gt;PSH—The receiver passed data to the application&lt;BR /&gt;RST—The connection was reset&lt;BR /&gt;SYN—Sequence numbers were synchronized to start a connection&lt;BR /&gt;URG—The urgent pointer was declared valid&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Is the issue always with these two IP? It may be that the problem comes for this reason. Remember, the ASA5505 is a mix of switch and firewall.&amp;nbsp;When you ran "show arp". Do you see OK the table ARP?&amp;nbsp;Maybe the moving of the laptop makes some noise with &lt;G class="gr_ gr_145 gr-alert gr_spell gr_run_anim ContextualSpelling" id="145" data-gr-id="145"&gt;arp&lt;/G&gt;, &lt;G class="gr_ gr_146 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="146" data-gr-id="146"&gt;xlate&lt;/G&gt; or conn.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Check this command:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;packet-tracer input inside tcp 192.168.2.210 1245 192.168.2.200 7680&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Do you have NAT to the flow by internet?&lt;BR /&gt;Is the connection denied by spoofing?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards.-&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 15:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932826#M149307</guid>
      <dc:creator>Matias Ortiz</dc:creator>
      <dc:date>2016-10-13T15:30:36Z</dc:date>
    </item>
    <item>
      <title>Hi Pawan,</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932827#M149308</link>
      <description>&lt;P&gt;Hi Pawan,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your reply. &amp;nbsp;I tried your suggestion and it does resolve the issue however I don't wont to make the change permanent until I understand WHY it is required. &amp;nbsp;Could you possibly explain why this issue is happening and how your suggested fix is appropriate.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 20:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932827#M149308</guid>
      <dc:creator>marc</dc:creator>
      <dc:date>2016-10-13T20:10:14Z</dc:date>
    </item>
    <item>
      <title>Thanks again for taking the</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932828#M149309</link>
      <description>&lt;P&gt;Thanks again for taking the time to assist! Much appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I agree! I wouldn't think the ASA would bother itself with this traffic as it is all on the inside. What puzzles me is if the ASA is denying hosts on the inside the ability to connect to each other then how am I am to remote desktop from one host to another!!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The issue is not always with these two IPs HOWEVER the destination IP/port is almost ALWAYS 192.168.2.200/7680 which leads me to believe it is something to do with Windows 10 P2P updates as explained here&amp;nbsp;&lt;A href="http://www.computerworld.com/article/2955288/microsoft-windows/windows-10-commandeers-users-upload-bandwidth.html"&gt;Windows 10 shared updates&lt;/A&gt;&amp;nbsp;.&lt;/P&gt;
&lt;P&gt;I'm not sure how P2P works but could it be that the src host &amp;nbsp;(eg 192.168.2.210) is initially connecting to an outside (microsoft) server to get details about machines to send updates to and getting redirected back to the public IP on the outside interface&amp;nbsp;of the ASA which is then trying to forward the packet back to 192.168.2.200 in order to establish communication between 192.168.2.210 and 192.168.2.200 so that the host at 192.168.2.210 can send updates to the host 192.168.2.200??&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I checked the ARP table and the entries&amp;nbsp;look fine.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The result of the packet trace is as follows and shows the packet is being dropped by an implicit rule.&lt;/P&gt;
&lt;P&gt;Result of the command: "packet-tracer input inside tcp 192.168.2.210 1245 192.168.2.200 7680"&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 192.168.2.0 255.255.255.0 inside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As suggested by Pawan,&amp;nbsp;'&lt;SPAN&gt;same-security-traffic permit intra-interface' does work and the traffic is allowed however I am not comfortable about permitting or enabling things without understanding why it is required so I removed it from configuration for now.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 20:11:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932828#M149309</guid>
      <dc:creator>marc</dc:creator>
      <dc:date>2016-10-13T20:11:10Z</dc:date>
    </item>
    <item>
      <title>Hi Marc,</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932829#M149310</link>
      <description>&lt;P&gt;Hi Marc,&lt;/P&gt;
&lt;P&gt;Bydefault Firewall not allowed traffic to enter and exit on same interface (here in your case it is inside interface). But the scenario where level 3 interface (gateway for host) configured on Firewall then in that case traffic should enter and exit on same L3 interface (gateway) hence to allow this traffic we required this command.&lt;/P&gt;
&lt;H2 class="pCRC_CmdRefCommand"&gt;same-security-traffic&lt;/H2&gt;
&lt;P&gt;&lt;A name="wp1392815"&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;To permit communication between interfaces with equal security levels, or to allow traffic to enter and exit the same interface, use the &lt;B class="cBold"&gt;same-security-traffic&amp;nbsp;&lt;/B&gt;command in global configuration mode&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;Kindly refer below Cisco link and rate for useful Post&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/command/reference/cmd_ref/s1.html#wp1392814&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2016 04:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/2932829#M149310</guid>
      <dc:creator>Pawan Raut</dc:creator>
      <dc:date>2016-10-14T04:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: Do you have below command in</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/3832180#M149311</link>
      <description>&lt;P&gt;Thanks Pawan it works for me.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 11:59:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-from-192-168-2-210-55187-to-192/m-p/3832180#M149311</guid>
      <dc:creator>harish.sable@wipro.com</dc:creator>
      <dc:date>2019-04-04T11:59:13Z</dc:date>
    </item>
  </channel>
</rss>

