<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Zone-based Firewall and Applicaiton Inspect in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-applicaiton-inspect/m-p/2060196#M396099</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Short of modifying TCP parameters / timeouts I haven't played with parameter maps much, but I did just see this in the reference: (﻿&lt;A href="http://www.cisco.com/en/US/docs/ios/security/command/reference/sec_p1.html#wp1091787"&gt;http://www.cisco.com/en/US/docs/ios/security/command/reference/sec_p1.html#wp1091787&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;STRONG style="text-decoration: underline; "&gt;﻿&lt;/STRONG&gt;&lt;STRONG style="text-decoration: underline; "&gt;parameter-map type protocol-info&lt;/STRONG&gt;&lt;P&gt;&lt;A name="wp1091788"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To create or modify a protocol-specific parameter map and enter parameter-map type configuration mode, use the &lt;STRONG&gt;parameter-map type protocol-info &lt;/STRONG&gt;command in global configuration mode. To delete a protocol-specific parameter map from the configuration, use the &lt;STRONG&gt;no&lt;/STRONG&gt; form of this command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1091789"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;parameter-map type protocol-info &lt;/STRONG&gt;[&lt;STRONG&gt;msrpc&lt;/STRONG&gt; | &lt;STRONG&gt;sip&lt;/STRONG&gt; | &lt;STRONG&gt;stun-ice&lt;/STRONG&gt;]&lt;STRONG style="font-weight: bold;"&gt; &lt;/STRONG&gt;&lt;EM style="font-weight: normal;"&gt;parameter-map-name&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1091790"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no parameter-map type protocol-info &lt;/STRONG&gt;[&lt;STRONG&gt;msrpc&lt;/STRONG&gt; | &lt;STRONG&gt;sip&lt;/STRONG&gt; | &lt;STRONG&gt;stun-ice&lt;/STRONG&gt;]&lt;STRONG style="font-weight: bold;"&gt; &lt;/STRONG&gt;&lt;EM style="font-weight: normal;"&gt;parameter-map-name &lt;/EM&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It also goes on to state that this command became available in 15.1(4)M, so I'll upgrade when I get a second and play with this rev. Hopefully the full inpsect will be available for MSRPC. (To include the EPM pinholes)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 04 Nov 2012 04:42:13 GMT</pubDate>
    <dc:creator>cstep</dc:creator>
    <dc:date>2012-11-04T04:42:13Z</dc:date>
    <item>
      <title>Zone-based Firewall and Applicaiton Inspect</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-applicaiton-inspect/m-p/2060195#M396096</link>
      <description>&lt;P&gt;We're having trouble determining whether the ZBF match protocol statements provide deep inspection. For example, the following doesn't appear to actually allow the ephemerous ports to open. Or at least in what I've found to try and test, attempting to make an RPC call across the firewall, the call fails with communication failure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Router# show ip port msrpc&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Default mapping:&amp;nbsp; msrpc&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp port 135&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; system defined&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Router# configure terminal &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Router(config)# class-map type inspect match-any msrpc-cmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Router(config-cmap)# match protocol msrpc&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Router(config-cmap)# exit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Router(config)# policy-map type inspect msrpc-pmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Router(config-pmap)# class type inspect msrpc-cmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Router(config-pmap-c)# inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;Router(config-pmap-c)# end&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using PortQry, shows that the port is listening and dumps a bunch of data to the screen about the RPC End Point Mapper.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I know that TCP port 135 is at least opened. But I don't think the port is being inspected at layer 7 and hence the End Point Mapper is allocating the ephemerous ports, but the firewall doesn't know to open the pinholes. Is there a way, other than simply statically opening the ports to pinhole the RPC EPM Ports? Amy I missing an obvious here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have noticed that in IOS-XR and IOS-XE DPI is available in the ALG for msrpc, for example:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/routers/asr1000/technical_references/asr1000alg_support.pdf" target="_blank"&gt;http://www.cisco.com/en/US/docs/routers/asr1000/technical_references/asr1000alg_support.pdf&lt;/A&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/docs/ios-xml/ios/ipaddr_nat/configuration/xe-3s/fw-msrpc-supp.pdf" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios-xml/ios/ipaddr_nat/configuration/xe-3s/fw-msrpc-supp.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: Courier; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I also have done this on an ASA before using the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;policy-map type inspect dcerpc dcerpc_map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;timeout pinhole 0:10:00&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;class-map dcerpc&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;match port tcp eq 135&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;policy-map global-policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;class dcerpc&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; inspect dcerpc dcerpc-map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: courier new,courier; "&gt;service-policy global-policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point, I'm thinking IOS doesn't support ALG functions except for whats actually listed in the '&lt;EM&gt;show ip inspect ?&lt;/EM&gt;' list:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;aol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for IM-AOL protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;edonkey&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eDonkey&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;fasttrack&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FastTrack Traffic - KaZaA, Morpheus, Grokster...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;gnutella&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gnutella Version2 Traffic - BearShare, Shareeza, Morpheus ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;h323&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for H323 protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;http&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for HTTP protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;icq&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for IM-ICQ protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;imap&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for IMAP protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;kazaa2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Kazaa Version 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;msnmsgr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for IM-MSN protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;pop3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for POP3 protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;sip&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for SIP protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;smtp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for SMTP protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;sunrpc&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for RPC protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;winmsgr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for IM-WINMSGR protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;ymsgr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure Firewall class-map for IM-YAHOO protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would also be nice if I could create a custom nbar match criteria and map a udp port number and timeout to the match. This could make a hell of an ALG within IOS.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:18:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-applicaiton-inspect/m-p/2060195#M396096</guid>
      <dc:creator>cstep</dc:creator>
      <dc:date>2019-03-12T00:18:46Z</dc:date>
    </item>
    <item>
      <title>Zone-based Firewall and Applicaiton Inspect</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-applicaiton-inspect/m-p/2060196#M396099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Short of modifying TCP parameters / timeouts I haven't played with parameter maps much, but I did just see this in the reference: (﻿&lt;A href="http://www.cisco.com/en/US/docs/ios/security/command/reference/sec_p1.html#wp1091787"&gt;http://www.cisco.com/en/US/docs/ios/security/command/reference/sec_p1.html#wp1091787&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;STRONG style="text-decoration: underline; "&gt;﻿&lt;/STRONG&gt;&lt;STRONG style="text-decoration: underline; "&gt;parameter-map type protocol-info&lt;/STRONG&gt;&lt;P&gt;&lt;A name="wp1091788"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To create or modify a protocol-specific parameter map and enter parameter-map type configuration mode, use the &lt;STRONG&gt;parameter-map type protocol-info &lt;/STRONG&gt;command in global configuration mode. To delete a protocol-specific parameter map from the configuration, use the &lt;STRONG&gt;no&lt;/STRONG&gt; form of this command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1091789"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;parameter-map type protocol-info &lt;/STRONG&gt;[&lt;STRONG&gt;msrpc&lt;/STRONG&gt; | &lt;STRONG&gt;sip&lt;/STRONG&gt; | &lt;STRONG&gt;stun-ice&lt;/STRONG&gt;]&lt;STRONG style="font-weight: bold;"&gt; &lt;/STRONG&gt;&lt;EM style="font-weight: normal;"&gt;parameter-map-name&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1091790"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no parameter-map type protocol-info &lt;/STRONG&gt;[&lt;STRONG&gt;msrpc&lt;/STRONG&gt; | &lt;STRONG&gt;sip&lt;/STRONG&gt; | &lt;STRONG&gt;stun-ice&lt;/STRONG&gt;]&lt;STRONG style="font-weight: bold;"&gt; &lt;/STRONG&gt;&lt;EM style="font-weight: normal;"&gt;parameter-map-name &lt;/EM&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It also goes on to state that this command became available in 15.1(4)M, so I'll upgrade when I get a second and play with this rev. Hopefully the full inpsect will be available for MSRPC. (To include the EPM pinholes)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2012 04:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-applicaiton-inspect/m-p/2060196#M396099</guid>
      <dc:creator>cstep</dc:creator>
      <dc:date>2012-11-04T04:42:13Z</dc:date>
    </item>
    <item>
      <title>Zone-based Firewall and Applicaiton Inspect</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-applicaiton-inspect/m-p/2060197#M396103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Christopher,&lt;/P&gt;&lt;H3 style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 14px 0em 7px -0.1in;"&gt;Configuring an MSRPC Firewall Policy&lt;/H3&gt;&lt;P style="margin: 0px 0em -10px -0.25in; text-indent: -0.5em; color: #000000; font-size: 12px;"&gt;&lt;IMG src="http://www.cisco.com/en/US/i/templates/note.gif" /&gt;&lt;/P&gt;&lt;HR style="margin-left: 0in; margin-right: 0em; margin-top: 5px; text-align: right; border-style: solid; border-color: #808080; background-color: #aaaaaa; color: #000000; font-size: 12px;" /&gt;&lt;P&gt; &lt;A name="wp1138392" style="color: #000000; font-size: 12px;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; margin: 3px 0em 3px 0in; text-indent: -0.3in;"&gt;&lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;If you are inspecting an RPC protocol (that is, you specified the &lt;STRONG&gt;match protocol msrpc&lt;/STRONG&gt; command in the Layer 4 class map), the Layer 7 Microsoft Remote Procedure Call (MSRPC) policy map is required.&lt;/P&gt;&lt;P&gt; &lt;A href="http://www.cisco.com/en/US/docs/ios/sec_data_plane/configuration/guide/sec_zone_polcy_firew.html#wp1138391"&gt;http://www.cisco.com/en/US/docs/ios/sec_data_plane/configuration/guide/sec_zone_polcy_firew.html#wp1138391&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2012 19:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-applicaiton-inspect/m-p/2060197#M396103</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-04T19:21:29Z</dc:date>
    </item>
  </channel>
</rss>

