<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IP Inspect Overflows in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ip-inspect-overflows/m-p/1678658#M534985</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Anu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see below logs:&lt;/P&gt;&lt;P&gt;038100: Jul 27 09:49:05.597: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1812), 1 packet &lt;/P&gt;&lt;P&gt;038101: Jul 27 09:49:09.605: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1802), 1 packet&amp;nbsp; &lt;BR /&gt;038103: Jul 27 09:49:11.621: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1824), 1 packet &lt;BR /&gt;038104: Jul 27 09:49:13.633: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1821), 1 packet&lt;BR /&gt;038105: Jul 27 09:49:15.649: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1822), 1 packet&lt;BR /&gt;038106: Jul 27 09:49:17.645: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1834), 1 packet &lt;BR /&gt;038107: Jul 27 09:49:21.469: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1864), 1 packet &lt;BR /&gt;038108: Jul 27 09:49:23.665: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1851), 1 packet &lt;BR /&gt;038109: Jul 27 09:49:25.689: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1853), 1 packet &lt;BR /&gt;038110: Jul 27 09:49:27.005: %FW-6-DROP_PKT: Dropping Other session XX.XX.XX.XX:1906 XX.XX.XX.XX:443&amp;nbsp; due to&amp;nbsp; RST &lt;BR /&gt;inside current window with ip ident 1764 tcpflags 0x5014 seq.no 899228843 ack 3486318255&lt;BR /&gt;038111: Jul 27 09:49:27.713: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1846), 1 packet &lt;BR /&gt;038112: Jul 27 09:49:29.725: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1865), 1 packet &lt;BR /&gt;038113: Jul 27 09:49:32.737: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1905), 1 packet &lt;BR /&gt;038114: Jul 27 09:49:35.745: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1884), 1 packet &lt;BR /&gt;038115: Jul 27 09:49:37.829: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1880), 1 packet &lt;BR /&gt;038116: Jul 27 09:49:39.789: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1881), 1 packet &lt;BR /&gt;038117: Jul 27 09:49:43.817: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1916), 1 packet &lt;BR /&gt;038118: Jul 27 09:49:45.813: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1921), 1 packet &lt;BR /&gt;038119: Jul 27 09:49:46.281: %SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 55 packets&lt;BR /&gt;038120: Jul 27 09:49:47.825: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1936), 1 packet &lt;BR /&gt;038121: Jul 27 09:49:49.853: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1917), 1 packet &lt;BR /&gt;038122: Jul 27 09:49:51.849: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1944), 1 packet &lt;BR /&gt;038145: Jul 27 09:49:55.925: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1942), 1 packet &lt;BR /&gt;038146: Jul 27 09:49:57.177: %FW-6-DROP_PKT: Dropping Other session XX.XX.XX.XX:2008 XX.XX.XX.XX:443&amp;nbsp; due to&amp;nbsp; RST&lt;BR /&gt;inside current window with ip ident 5621 tcpflags 0x5014 seq.no 500736543 ack 49297679&lt;BR /&gt;038147: Jul 27 09:49:57.917: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1981), 1 packet &lt;BR /&gt;038148: Jul 27 09:50:01.929: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1962), 1 packet &lt;BR /&gt;038149: Jul 27 09:50:03.013: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(2009), 1 packet &lt;BR /&gt;038150: Jul 27 09:50:07.929: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1990), 1 packet &lt;BR /&gt;038159: Jul 27 09:50:09.941: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1997), 1 packet &lt;BR /&gt;038162: Jul 27 09:50:13.965: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1988), 1 packet &lt;BR /&gt;038164: Jul 27 09:50:15.953: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(2034), 1 packet &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Jul 2011 08:57:22 GMT</pubDate>
    <dc:creator>rahul-joshi</dc:creator>
    <dc:date>2011-07-27T08:57:22Z</dc:date>
    <item>
      <title>IP Inspect Overflows</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-overflows/m-p/1678656#M534982</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have Cisco Router with the below config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM appfw SDM_MEDIUM&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM cuseeme&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM dns&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM ftp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM h323&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM https&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM icmp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM imap reset&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM pop3 reset&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM netshow&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM rcmd&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM realaudio&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM rtsp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM esmtp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM sqlnet&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM streamworks&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM tftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt;description $FW_OUTSIDE$&lt;/P&gt;&lt;P&gt;ip address dhcp&lt;/P&gt;&lt;P&gt;ip access-group 103 in&lt;/P&gt;&lt;P&gt;ip access-group 109 out&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;ip inspect SDM_MEDIUM out&lt;/P&gt;&lt;P&gt;ip virtual-reassembly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am facing problem with Outlook Users in to my Lan Network. They loose connectivity to Exchange Server Intermittently. When they connect their &lt;/P&gt;&lt;P&gt;Laptops directly on BroadBand line, it works perfect. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see following logs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;010303: Jul 25 15:29:41.844: %SEC-6-IPACCESSLOGP: list 103 denied tcp X.X.X.X(80) -&amp;gt; X.X.X.X (2551), 1 packet &lt;/P&gt;&lt;P&gt;010304: Jul 25 15:29:43.848: %SEC-6-IPACCESSLOGP: list 103 denied tcp X.X.X.X (80) -&amp;gt; X.X.X.X (2561), 1 packet &lt;/P&gt;&lt;P&gt;010305: Jul 25 15:29:45.852: %SEC-6-IPACCESSLOGP: list 103 denied tcp X.X.X.X (443) -&amp;gt; X.X.X.X (2557), 1 packet &lt;/P&gt;&lt;P&gt;010303: Jul 25 15:29:41.844: %SEC-6-IPACCESSLOGP: list 103 denied tcp X.X.X.X (443) -&amp;gt; X.X.X.X (2551), 1 packet &lt;/P&gt;&lt;P&gt;010304: Jul 25 15:29:43.848: %SEC-6-IPACCESSLOGP: list 103 denied tcp X.X.X.X (80) -&amp;gt; X.X.X.X (2561), 1 packet &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Users can connect to outlook after some time automatically. I suspect this is issue of IP Inspect for Half Opened Session. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone please suggest the way ahead?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Rahul&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-overflows/m-p/1678656#M534982</guid>
      <dc:creator>rahul-joshi</dc:creator>
      <dc:date>2019-03-11T21:03:44Z</dc:date>
    </item>
    <item>
      <title>IP Inspect Overflows</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-overflows/m-p/1678657#M534983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rahul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The logs seem to be for HTTP and HTTPS traffic. Can you enable "ip inspect log drop" and post the output of "sh log" here collected when the issue occurs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 14:03:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-overflows/m-p/1678657#M534983</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-07-26T14:03:46Z</dc:date>
    </item>
    <item>
      <title>IP Inspect Overflows</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-overflows/m-p/1678658#M534985</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Anu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see below logs:&lt;/P&gt;&lt;P&gt;038100: Jul 27 09:49:05.597: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1812), 1 packet &lt;/P&gt;&lt;P&gt;038101: Jul 27 09:49:09.605: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1802), 1 packet&amp;nbsp; &lt;BR /&gt;038103: Jul 27 09:49:11.621: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1824), 1 packet &lt;BR /&gt;038104: Jul 27 09:49:13.633: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1821), 1 packet&lt;BR /&gt;038105: Jul 27 09:49:15.649: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1822), 1 packet&lt;BR /&gt;038106: Jul 27 09:49:17.645: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1834), 1 packet &lt;BR /&gt;038107: Jul 27 09:49:21.469: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1864), 1 packet &lt;BR /&gt;038108: Jul 27 09:49:23.665: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1851), 1 packet &lt;BR /&gt;038109: Jul 27 09:49:25.689: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1853), 1 packet &lt;BR /&gt;038110: Jul 27 09:49:27.005: %FW-6-DROP_PKT: Dropping Other session XX.XX.XX.XX:1906 XX.XX.XX.XX:443&amp;nbsp; due to&amp;nbsp; RST &lt;BR /&gt;inside current window with ip ident 1764 tcpflags 0x5014 seq.no 899228843 ack 3486318255&lt;BR /&gt;038111: Jul 27 09:49:27.713: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1846), 1 packet &lt;BR /&gt;038112: Jul 27 09:49:29.725: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1865), 1 packet &lt;BR /&gt;038113: Jul 27 09:49:32.737: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1905), 1 packet &lt;BR /&gt;038114: Jul 27 09:49:35.745: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1884), 1 packet &lt;BR /&gt;038115: Jul 27 09:49:37.829: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1880), 1 packet &lt;BR /&gt;038116: Jul 27 09:49:39.789: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1881), 1 packet &lt;BR /&gt;038117: Jul 27 09:49:43.817: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1916), 1 packet &lt;BR /&gt;038118: Jul 27 09:49:45.813: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1921), 1 packet &lt;BR /&gt;038119: Jul 27 09:49:46.281: %SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 55 packets&lt;BR /&gt;038120: Jul 27 09:49:47.825: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1936), 1 packet &lt;BR /&gt;038121: Jul 27 09:49:49.853: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1917), 1 packet &lt;BR /&gt;038122: Jul 27 09:49:51.849: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1944), 1 packet &lt;BR /&gt;038145: Jul 27 09:49:55.925: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1942), 1 packet &lt;BR /&gt;038146: Jul 27 09:49:57.177: %FW-6-DROP_PKT: Dropping Other session XX.XX.XX.XX:2008 XX.XX.XX.XX:443&amp;nbsp; due to&amp;nbsp; RST&lt;BR /&gt;inside current window with ip ident 5621 tcpflags 0x5014 seq.no 500736543 ack 49297679&lt;BR /&gt;038147: Jul 27 09:49:57.917: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1981), 1 packet &lt;BR /&gt;038148: Jul 27 09:50:01.929: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1962), 1 packet &lt;BR /&gt;038149: Jul 27 09:50:03.013: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(2009), 1 packet &lt;BR /&gt;038150: Jul 27 09:50:07.929: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1990), 1 packet &lt;BR /&gt;038159: Jul 27 09:50:09.941: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1997), 1 packet &lt;BR /&gt;038162: Jul 27 09:50:13.965: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(1988), 1 packet &lt;BR /&gt;038164: Jul 27 09:50:15.953: %SEC-6-IPACCESSLOGP: list 103 denied tcp XX.XX.XX.XX(443) -&amp;gt; XX.XX.XX.XX(2034), 1 packet &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 08:57:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-overflows/m-p/1678658#M534985</guid>
      <dc:creator>rahul-joshi</dc:creator>
      <dc:date>2011-07-27T08:57:22Z</dc:date>
    </item>
    <item>
      <title>IP Inspect Overflows</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-overflows/m-p/1678659#M534988</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rahul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the logs on the router, do you se any logs related to the exchange server or the client's IP address? i can not see much because all i see acl drops and some fw drops with Xs in place of IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Aug 2011 21:00:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-overflows/m-p/1678659#M534988</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2011-08-10T21:00:55Z</dc:date>
    </item>
  </channel>
</rss>

