<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic asa internal to dmz in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071015#M438387</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;object network obj-10.168.1.0&lt;/P&gt;&lt;P&gt; subnet 10.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.2.0&lt;/P&gt;&lt;P&gt; subnet 192.168.2.0 255.255.255.248&lt;/P&gt;&lt;P&gt;nat (Int,DMZ) source static &lt;/P&gt;&lt;P&gt;object network obj-10.168.1.0 object network obj-10.168.1.0 destination static obj-192.168.2.0 obj-192.168.2.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OutsidetoDMZ extended permit tcp any host 192.168.2.1 eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit tcp object Int-Mail host 192.168.2.1 eq lotusnotes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have made the unbolded changes, the acl is listed above no changes it remains the same. The internal mail host is on another subnet on my internal network, i can access the dmz server from the directly connected internal subnet using https but not from my other routed vlans inside my network. i need the internal mail server to communicate with the dmz server using port 1352. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 18 Sep 2012 16:15:55 GMT</pubDate>
    <dc:creator>mafarah123</dc:creator>
    <dc:date>2012-09-18T16:15:55Z</dc:date>
    <item>
      <title>asa internal to dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071011#M438383</link>
      <description>&lt;DIV&gt;&lt;DIV&gt;i want to allow a server on my Internal to communicate with a server on my dmz over a specific port (i.e 5555) and vice versa, from outside i can connect to the dmz server over https. here is my config, i have only replaced the ips with dumy ip's. i use different vlans in my internal network i can connect to the server using a pc on the same internal vlan as the ASA but not from my other routed vlans.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;P&gt;ASA Version 8.4(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname Cisco-FW&lt;/P&gt;&lt;P&gt;enable password otJaxP2LrPGCkYkU encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif Ext&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 212.1.1.2 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.2.10 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;nameif Int&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.168.1.15 252 255.255.255.0&lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup Ext&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;name-server 2.2.2.2&lt;/P&gt;&lt;P&gt;name-server 3.3.3.3&lt;/P&gt;&lt;P&gt;object network Dmz_outside&lt;/P&gt;&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network Traveler-from-outside&lt;/P&gt;&lt;P&gt;host 192.168.2.1&lt;/P&gt;&lt;P&gt;object network Traveler-from-inside&lt;/P&gt;&lt;P&gt;host 192.168.2.1&lt;/P&gt;&lt;P&gt;access-list OutsidetoDMZ extended permit tcp any host 192.168.2.1 eq https&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp object Int-Mail host 192.168.2.1 eq lotusnotes&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu Ext 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu Int 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any Int&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network Dmz_outside&lt;/P&gt;&lt;P&gt;nat (DMZ,Ext) dynamic interface&lt;/P&gt;&lt;P&gt;object network Traveler-from-outside&lt;/P&gt;&lt;P&gt;nat (DMZ,Ext) static 212.1.1.3 service tcp https https&lt;/P&gt;&lt;P&gt;object network Traveler-from-inside&lt;/P&gt;&lt;P&gt;nat (DMZ,Int) static 212.1.1.3 service tcp https https&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (any,Ext) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group OutsidetoDMZ in interface Ext&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;route Ext 0.0.0.0 0.0.0.0 212.1.1.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:6afc555ee13fa87dd87a61a1f774beed&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071011#M438383</guid>
      <dc:creator>mafarah123</dc:creator>
      <dc:date>2019-03-11T23:55:38Z</dc:date>
    </item>
    <item>
      <title>asa internal to dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071012#M438384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-10.168.1.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; subnet 10.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.2.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; subnet 192.168.2.0 255.255.255.248&lt;/P&gt;&lt;P&gt;nat (Int,DMZ) source static obj-10.168.1.0 obj-10.168.1.0 destination static obj-192.168.2.0 obj-192.168.2.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 11:16:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071012#M438384</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-09-18T11:16:17Z</dc:date>
    </item>
    <item>
      <title>asa internal to dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071013#M438385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; i'm sorry we have tried the recomended but it did not work&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 14:08:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071013#M438385</guid>
      <dc:creator>mafarah123</dc:creator>
      <dc:date>2012-09-18T14:08:45Z</dc:date>
    </item>
    <item>
      <title>asa internal to dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071014#M438386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you pls advise what you have tried?&lt;/P&gt;&lt;P&gt;What is the source and destination IP that you have tested and also what protocol/ports?&lt;/P&gt;&lt;P&gt;Can you ping between the 2 hosts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 14:11:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071014#M438386</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-09-18T14:11:11Z</dc:date>
    </item>
    <item>
      <title>asa internal to dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071015#M438387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;object network obj-10.168.1.0&lt;/P&gt;&lt;P&gt; subnet 10.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.2.0&lt;/P&gt;&lt;P&gt; subnet 192.168.2.0 255.255.255.248&lt;/P&gt;&lt;P&gt;nat (Int,DMZ) source static &lt;/P&gt;&lt;P&gt;object network obj-10.168.1.0 object network obj-10.168.1.0 destination static obj-192.168.2.0 obj-192.168.2.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OutsidetoDMZ extended permit tcp any host 192.168.2.1 eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit tcp object Int-Mail host 192.168.2.1 eq lotusnotes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have made the unbolded changes, the acl is listed above no changes it remains the same. The internal mail host is on another subnet on my internal network, i can access the dmz server from the directly connected internal subnet using https but not from my other routed vlans inside my network. i need the internal mail server to communicate with the dmz server using port 1352. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 16:15:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071015#M438387</guid>
      <dc:creator>mafarah123</dc:creator>
      <dc:date>2012-09-18T16:15:55Z</dc:date>
    </item>
    <item>
      <title>asa internal to dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071016#M438388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no &lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;nat (Int,DMZ) source static&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt; &lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt; obj-10.168.1.0 obj-10.168.1.0 destination static obj-192.168.2.0 obj-192.168.2.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;nat (Int,DMZ) 1 source static&amp;nbsp; obj-10.168.1.0 obj-10.168.1.0 destination static obj-192.168.2.0 obj-192.168.2.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to innitiate the connections from the DMZ to the inside you will need to set the following ACL&lt;/P&gt;&lt;P&gt;access-list &lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;DMZ_access_in permit tcp 192.168.2.x x.x.x.x 10.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Regards,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Any other question..Sure.. Just remember to rate all of my answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 17:07:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071016#M438388</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-18T17:07:43Z</dc:date>
    </item>
    <item>
      <title>asa internal to dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071017#M438389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Adding the above worked but it had a counter effect now we can not access internet we are using the below nat for internet. we have also limited the above static nats to a host instead of a network we only want to communicate with one server from our internal to dmz. The command worked but we can't access internet now.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (any,Ext) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 09:33:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071017#M438389</guid>
      <dc:creator>mafarah123</dc:creator>
      <dc:date>2012-09-21T09:33:14Z</dc:date>
    </item>
    <item>
      <title>asa internal to dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071018#M438390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For internet from the internal network, pls configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Int_outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; subnet 10.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (Int,Ext) dynamic interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 10:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071018#M438390</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-09-21T10:56:39Z</dc:date>
    </item>
    <item>
      <title>asa internal to dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071019#M438391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;guys thanks for your inputs, i don't think there is anything wrong with the nats but i have a routing problem, i can't ping or connect to any vlan on my distribution switch from asa i can only ping the internal interface but no other ip inside my network, the server i need my dmz host to connect to in sitting inside my service vlan all vlans are routed but yet i can't reach any of them from asa. i need to create a static route any assistance on how.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 20:53:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-to-dmz/m-p/2071019#M438391</guid>
      <dc:creator>mafarah123</dc:creator>
      <dc:date>2012-09-21T20:53:53Z</dc:date>
    </item>
  </channel>
</rss>

