<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic OK, thanks.   I'll give it in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653160#M197125</link>
    <description>&lt;P&gt;OK, thanks.&amp;nbsp;&amp;nbsp; I'll give it tonight in a maintenance window and see what happens.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jonathan,&lt;/P&gt;</description>
    <pubDate>Wed, 11 Feb 2015 22:42:46 GMT</pubDate>
    <dc:creator>Jonathancert_2</dc:creator>
    <dc:date>2015-02-11T22:42:46Z</dc:date>
    <item>
      <title>Traffic not passing between inside and outside interface</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653158#M197123</link>
      <description>&lt;P&gt;Traffic is being blocked from "interface GigabitEthernet1/3.420" to nameif outside.&amp;nbsp;&amp;nbsp; When i do a ping from inside network, can see traffic hitting ASA but appears to be getting blocked by access group.&amp;nbsp;&amp;nbsp; Tried to motify ACL but nothing helps.&amp;nbsp; Config below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4|Feb 11 2015 18:15:11|106023: Deny icmp src outside:4.2.2.2 dst CHTN-A10-EXTERNAL:40.32.218.2 (type 0, code 0) by access-group "outside" [0x0, 0x0]&lt;BR /&gt;4|Feb 11 2015 18:15:11|106023: Deny icmp src outside:124.40.254.242 dst CHTN-A10-EXTERNAL:40.32.218.29 (type 11, code 0) by access-group "outside" [0x0, 0x0]&lt;BR /&gt;4|Feb 11 2015 18:15:12|106023: Deny icmp src outside:4.2.2.2 dst CHTN-A10-EXTERNAL:40.32.218.2 (type 0, code 0) by access-group "outside" [0x0, 0x0]&lt;BR /&gt;4|Feb 11 2015 18:15:13|106023: Deny icmp src outside:4.2.2.2 dst CHTN-A10-EXTERNAL:40.32.218.2 (type 0, code 0) by access-group "outside" [0x0, 0x0]&lt;BR /&gt;4|Feb 11 2015 18:15:14|106023: Deny icmp src outside:4.2.2.2 dst CHTN-A10-EXTERNAL:40.32.218.2 (type 0, code 0) by access-group "outside" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CHTN-INET-ASA/sec/act#&amp;nbsp;&amp;nbsp; sho running-config&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(1)&lt;BR /&gt;!&lt;BR /&gt;hostname CHTN-INET-ASA&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.120.0.0 A-10.120.0.0 description WDO Internal&lt;BR /&gt;name 10.120.16.13 Orion description Orion&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;description LAN/STATE Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 80.10.149.246 255.255.255.240 standby 80.10.149.247&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 80.10.149.3 255.255.255.192 standby 80.10.149.4&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.121.0.1 255.255.255.248 standby 10.121.0.2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;nameif DMZ-TRUNK&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.420&lt;BR /&gt;&amp;nbsp;description Charleston A10 direct-connect&lt;BR /&gt;&amp;nbsp;vlan 420&lt;BR /&gt;&amp;nbsp;nameif CHTN-A10-EXTERNAL&lt;BR /&gt;&amp;nbsp;security-level 70&lt;BR /&gt;&amp;nbsp;ip address 40.32.218.1 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa911-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj-10.120.100.50&lt;BR /&gt;&amp;nbsp;host 10.120.100.50&lt;BR /&gt;object network Orion&lt;BR /&gt;&amp;nbsp;host 10.120.16.13&lt;BR /&gt;&amp;nbsp;description Created during name migration&lt;BR /&gt;object-group network Outside-Management&lt;BR /&gt;&amp;nbsp;description Outside-Management IP Space&lt;BR /&gt;&amp;nbsp;network-object host 10.121.10.2&lt;BR /&gt;&amp;nbsp;network-object host 10.121.10.3&lt;BR /&gt;&amp;nbsp;network-object host 10.121.10.4&lt;BR /&gt;&amp;nbsp;network-object host 10.121.10.5&lt;BR /&gt;object-group network WDO-Internal&lt;BR /&gt;&amp;nbsp;description WDO-Internal IP Space&lt;BR /&gt;&amp;nbsp;network-object A-10.120.0.0 255.252.0.0&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object icmp&lt;BR /&gt;&amp;nbsp;service-object udp destination eq ntp&lt;BR /&gt;&amp;nbsp;service-object udp destination eq snmp&lt;BR /&gt;&amp;nbsp;service-object udp destination eq snmptrap&lt;BR /&gt;&amp;nbsp;service-object udp destination eq syslog&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq tacacs&lt;BR /&gt;&amp;nbsp;service-object udp destination eq 2055&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object A-10.120.0.0 255.252.0.0&lt;BR /&gt;&amp;nbsp;network-object 80.10.149.240 255.255.255.240&lt;BR /&gt;object-group network CHTN-A10-EXTERNAL&lt;BR /&gt;&amp;nbsp;network-object 40.32.218.0 255.255.255.224&lt;BR /&gt;access-list inside extended permit ip object-group WDO-Internal object-group Outside-Management&lt;BR /&gt;access-list CHTN-A10-EXTERNAL_access_in extended permit ip object-group CHTN-A10-EXTERNAL any&lt;BR /&gt;access-list outside extended permit object-group DM_INLINE_SERVICE_1 object-group Outside-Management object-group WDO-Internal&lt;BR /&gt;access-list outside extended permit icmp object-group DM_INLINE_NETWORK_1 object Orion&lt;BR /&gt;access-list outside remark Migration, ACE (line 3) expanded: permit tcp object-group Outside-Management host 80.10.149.244 eq&lt;BR /&gt;access-list outside extended permit tcp host 10.121.10.2 host 10.120.100.50 eq tacacs&lt;BR /&gt;access-list outside extended permit tcp host 10.121.10.3 host 10.120.100.50 eq tacacs&lt;BR /&gt;access-list outside extended permit tcp host 10.121.10.4 host 10.120.100.50 eq tacacs&lt;BR /&gt;access-list outside extended permit tcp host 10.121.10.5 host 10.120.100.50 eq tacacs&lt;BR /&gt;access-list outside remark Migration: End of expansion&lt;BR /&gt;access-list outside remark Migration, ACE (line 3) expanded: permit tcp object-group Outside-Management host 80.10.149.244 eq&lt;BR /&gt;access-list outside remark Migration: End of expansion&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging standby&lt;BR /&gt;logging buffer-size 100000&lt;BR /&gt;logging trap warnings&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging from-address asa@ntelospcs.net&lt;BR /&gt;logging facility 22&lt;BR /&gt;logging host inside Orion&lt;BR /&gt;logging host inside 10.121.16.231&lt;BR /&gt;logging host inside 10.120.16.231&lt;BR /&gt;logging permit-hostdown&lt;BR /&gt;logging message 106001 level informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ-TRUNK 1500&lt;BR /&gt;mtu CHTN-A10-EXTERNAL 1500&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit secondary&lt;BR /&gt;failover lan interface failover Management0/0&lt;BR /&gt;failover link failover Management0/0&lt;BR /&gt;failover interface ip failover 10.121.0.45 255.255.255.252 standby 10.121.0.46&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-715-100.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source dynamic any interface description PAT for Internet Access&lt;BR /&gt;!&lt;BR /&gt;object network obj-10.120.100.50&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 80.10.149.244 service tcp tacacs tacacs&lt;BR /&gt;access-group outside in interface outside&lt;BR /&gt;access-group inside in interface inside&lt;BR /&gt;access-group CHTN-A10-EXTERNAL_access_in in interface CHTN-A10-EXTERNAL&lt;BR /&gt;!&lt;BR /&gt;router ospf 100&lt;BR /&gt;&amp;nbsp;router-id 10.121.0.1&lt;BR /&gt;&amp;nbsp;network 10.124.252.24 255.255.255.248 area 0&lt;BR /&gt;&amp;nbsp;log-adj-changes&lt;BR /&gt;&amp;nbsp;redistribute connected subnets&lt;BR /&gt;&amp;nbsp;redistribute static subnets&lt;BR /&gt;&amp;nbsp;default-information originate always&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 80.10.149.241 1&lt;BR /&gt;route inside A-10.120.0.0 255.252.0.0 10.121.0.5 1&lt;BR /&gt;route outside 10.121.10.2 255.255.255.255 80.10.149.241 1&lt;BR /&gt;route outside 10.121.10.3 255.255.255.255 80.10.149.241 1&lt;BR /&gt;route outside 10.121.10.4 255.255.255.255 80.10.149.241 1&lt;BR /&gt;route outside 10.121.10.5 255.255.255.255 80.10.149.241 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server tac protocol tacacs+&lt;BR /&gt;aaa-server tac (inside) host 10.121.16.32&lt;BR /&gt;&amp;nbsp;key *****&lt;BR /&gt;aaa-server tac (inside) host 10.120.16.32&lt;BR /&gt;&amp;nbsp;key *****&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console tac LOCAL&lt;BR /&gt;aaa authentication http console tac LOCAL&lt;BR /&gt;aaa authentication ssh console tac LOCAL&lt;BR /&gt;aaa accounting enable console tac&lt;BR /&gt;aaa accounting serial console tac&lt;BR /&gt;aaa accounting ssh console tac&lt;BR /&gt;aaa accounting telnet console tac&lt;BR /&gt;aaa accounting command tac&lt;BR /&gt;http server enable&lt;BR /&gt;http A-10.120.0.0 255.255.0.0 inside&lt;BR /&gt;http 10.120.9.0 255.255.255.0 inside&lt;BR /&gt;http 10.120.16.22 255.255.255.255 inside&lt;BR /&gt;snmp-server host inside 10.120.16.10 poll community ***** version 2c&lt;BR /&gt;snmp-server host inside Orion community ***** version 2c&lt;BR /&gt;snmp-server host inside 10.120.16.231 community ***** version 2c&lt;BR /&gt;snmp-server host inside 10.120.9.120 poll community ***** version 2c&lt;BR /&gt;snmp-server host inside 10.121.16.231 community ***** version 2c&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh A-10.120.0.0 255.252.0.0 inside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat shun duration 3600&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 10.121.10.0 source inside prefer&lt;BR /&gt;ntp server 10.121.10.1 source inside&lt;BR /&gt;ssl encryption 3des-sha1 des-sha1&lt;BR /&gt;username admin password suAq/dPwstP7b0/A encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname priority state&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:b9c9506a6efa5d3a332c90dc7f2a6496&lt;BR /&gt;: end&lt;BR /&gt;CHTN-INET-ASA/sec/act#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653158#M197123</guid>
      <dc:creator>Jonathancert_2</dc:creator>
      <dc:date>2019-03-12T05:29:25Z</dc:date>
    </item>
    <item>
      <title>You need to allow ICMP echo</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653159#M197124</link>
      <description>&lt;P&gt;You need to allow ICMP echo-reply from the destination.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;access-list outside extended permit icmp host 4.2.2.2 any eq echo-reply&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2015 22:35:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653159#M197124</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-02-11T22:35:45Z</dc:date>
    </item>
    <item>
      <title>OK, thanks.   I'll give it</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653160#M197125</link>
      <description>&lt;P&gt;OK, thanks.&amp;nbsp;&amp;nbsp; I'll give it tonight in a maintenance window and see what happens.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jonathan,&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2015 22:42:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653160#M197125</guid>
      <dc:creator>Jonathancert_2</dc:creator>
      <dc:date>2015-02-11T22:42:46Z</dc:date>
    </item>
    <item>
      <title>Or you can add ICMP</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653161#M197126</link>
      <description>&lt;P&gt;Or you can add ICMP inspection to your Global Policy map&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2015 07:39:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653161#M197126</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-02-12T07:39:03Z</dc:date>
    </item>
    <item>
      <title>Andre, I liked your options. </title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653162#M197127</link>
      <description>&lt;P&gt;Andre,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I liked your options.&amp;nbsp; Gave it a try and it solved the problem, thanks.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2015 14:39:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653162#M197127</guid>
      <dc:creator>Jonathancert_2</dc:creator>
      <dc:date>2015-02-12T14:39:04Z</dc:date>
    </item>
    <item>
      <title>it's a pleasure to be of</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653163#M197128</link>
      <description>&lt;P&gt;it's a pleasure to be of assistance.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2015 05:14:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-between-inside-and-outside-interface/m-p/2653163#M197128</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-02-13T05:14:33Z</dc:date>
    </item>
  </channel>
</rss>

