<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site vpn with ipsec in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604614#M604539</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Then how the traffic can have access to Internet? can this be done together? if not ehat is the solution for this issue?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;This can't be done together, you can't NAT and NOT NAT the same subnet at the same time.&lt;/P&gt;&lt;P&gt;I think this is impossible with an ASA because as far as I know you can't have 2 outside interfaces.&lt;/P&gt;&lt;P&gt;With a router you could VPN on one link and not VPN on another link but again not for the same traffic flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you want only http/https not going into VPN and everything else into then this is possible using NAT 0 feature, you exempt some traffic&lt;/P&gt;&lt;P&gt;from nat and then you permit this same traffic in your crypto ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 02 Feb 2011 08:41:28 GMT</pubDate>
    <dc:creator>cadet alain</dc:creator>
    <dc:date>2011-02-02T08:41:28Z</dc:date>
    <item>
      <title>Site to Site vpn with ipsec</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604613#M604538</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 2 ASA 5520, in 2 different sites and I am going to stablish site to site vpn with ipsec.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to allow all traffic be transmited trhough this tunel and also all subnets in each site can have internet acceess with NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can this be done together? if not what is the solution for this issue? I know that ipsec doesn't work with NAT and the traffic needs to be excluded from NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then how the traffic can have access to Internet? can this be done together? if not ehat is the solution for this issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Rouzbeh&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:43:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604613#M604538</guid>
      <dc:creator>rouzbehta</dc:creator>
      <dc:date>2019-03-11T19:43:22Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site vpn with ipsec</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604614#M604539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Then how the traffic can have access to Internet? can this be done together? if not ehat is the solution for this issue?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;This can't be done together, you can't NAT and NOT NAT the same subnet at the same time.&lt;/P&gt;&lt;P&gt;I think this is impossible with an ASA because as far as I know you can't have 2 outside interfaces.&lt;/P&gt;&lt;P&gt;With a router you could VPN on one link and not VPN on another link but again not for the same traffic flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you want only http/https not going into VPN and everything else into then this is possible using NAT 0 feature, you exempt some traffic&lt;/P&gt;&lt;P&gt;from nat and then you permit this same traffic in your crypto ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 08:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604614#M604539</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-02-02T08:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site vpn with ipsec</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604615#M604540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want to direct traffic from site 1 to site 2 and in reverse, just build a tunnel access-list wich permits traffic between both subnets&lt;BR /&gt;Then create a nat0 statement to deny nat trough the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;ASA1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 0 access-list inside_outbound_nat0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;BR /&gt; nat (inside) 0 access-list inside_outbound_nat0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way internet traffic wil match on the default nat for example en wil be directed to the world wide web &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 13:11:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604615#M604540</guid>
      <dc:creator>Niels van der Made</dc:creator>
      <dc:date>2011-02-02T13:11:17Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site vpn with ipsec</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604616#M604541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Niels is correct but dont forget the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set My_Tset esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 10 match address 100&lt;BR /&gt;crypto map outside_map 10 set peer {Outside IP}&lt;BR /&gt;crypto map outside_map 10 set transform-set My_Tset&lt;BR /&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group {Outside IP} type ipsec-l2l&lt;BR /&gt;tunnel-group {Outside IP} ipsec-attributes&lt;BR /&gt; pre-shared-key {key}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show crypto isakmp sa&lt;BR /&gt;show crypto ipsec sa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 14:15:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604616#M604541</guid>
      <dc:creator>ciscona728</dc:creator>
      <dc:date>2011-02-02T14:15:38Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site vpn with ipsec</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604617#M604542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@&lt;A class="jiveTT-hover-user jive-username-link" href="https://community.cisco.com/people/ciscona728" id="jive-8639547,238,652,840,194,611"&gt;ciscona728&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Correct, but i assumed he already had an VPN config and was only having trouble with the nat/no nat part &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 14:21:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604617#M604542</guid>
      <dc:creator>Niels van der Made</dc:creator>
      <dc:date>2011-02-02T14:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site vpn with ipsec</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604618#M604543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for answer, but I confused a bit, is this way let me to have access to internet along with site to site vpn with same subnet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, again&lt;/P&gt;&lt;P&gt;-Rouzbeh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 14:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604618#M604543</guid>
      <dc:creator>rouzbehta</dc:creator>
      <dc:date>2011-02-02T14:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site vpn with ipsec</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604619#M604544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's right.&lt;/P&gt;&lt;P&gt;With the nat 0 statement you have to deny nat between the subnets of site 1 and 2.&lt;/P&gt;&lt;P&gt;And in the above examples the nat (inside) 192.168.1.0 255.255.255.0 wil nat traffic to the outside interface (wich in this case is internet)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 15:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604619#M604544</guid>
      <dc:creator>Niels van der Made</dc:creator>
      <dc:date>2011-02-02T15:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site vpn with ipsec</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604620#M604545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cool, am I right on the configuration below? basically are different subnets all need access to Internet and some of them site to site vpn, I will add the neccessary configuration if you would please approve that this is ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really appreciate your help,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;-Rouzbeh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;interface GigabitEthernet0/0
&lt;BR /&gt; nameif outside
&lt;BR /&gt; security-level 0
&lt;BR /&gt; no ip address
&lt;BR /&gt;!
&lt;BR /&gt;interface GigabitEthernet0/1
&lt;BR /&gt; description ***LAN***
&lt;BR /&gt; no nameif
&lt;BR /&gt; no security-level
&lt;BR /&gt; no ip address
&lt;BR /&gt;!
&lt;BR /&gt;interface GigabitEthernet0/1.4
&lt;BR /&gt; description ***Polycom CoIP***
&lt;BR /&gt; vlan 4
&lt;BR /&gt; nameif inside4
&lt;BR /&gt; security-level 100
&lt;BR /&gt; ip address 10.10.52.1 255.255.255.0
&lt;BR /&gt;!
&lt;BR /&gt;interface GigabitEthernet0/1.5
&lt;BR /&gt; description ***VoIP***
&lt;BR /&gt; vlan 5
&lt;BR /&gt; nameif inside5
&lt;BR /&gt; security-level 100
&lt;BR /&gt; ip address 10.10.59.1 255.255.255.0
&lt;BR /&gt;!
&lt;BR /&gt;interface GigabitEthernet0/1.8
&lt;BR /&gt; description ***Office LAN***
&lt;BR /&gt; vlan 8
&lt;BR /&gt; nameif inside8
&lt;BR /&gt; security-level 100
&lt;BR /&gt; ip address 10.10.60.1 255.255.255.0
&lt;BR /&gt;!
&lt;BR /&gt;interface GigabitEthernet0/1.9
&lt;BR /&gt; description ***email***
&lt;BR /&gt; vlan 9
&lt;BR /&gt; nameif inside9
&lt;BR /&gt; security-level 100
&lt;BR /&gt; ip address 10.10.61.1 255.255.255.0
&lt;BR /&gt;!
&lt;BR /&gt;interface GigabitEthernet0/1.801
&lt;BR /&gt; description ***Management***
&lt;BR /&gt; vlan 801
&lt;BR /&gt; nameif inside801
&lt;BR /&gt; security-level 100
&lt;BR /&gt; ip address 10.10.50.1 255.255.255.0
&lt;BR /&gt;!
&lt;BR /&gt;interface GigabitEthernet0/1.802
&lt;BR /&gt; description ***Access-Cameras***
&lt;BR /&gt; vlan 802
&lt;BR /&gt; nameif inside802
&lt;BR /&gt; security-level 100
&lt;BR /&gt; ip address 10.10.48.1 255.255.255.0
&lt;BR /&gt;!
&lt;BR /&gt;interface GigabitEthernet0/1.803
&lt;BR /&gt; description ***Colubris-WiFi***
&lt;BR /&gt; vlan 803
&lt;BR /&gt; nameif inside803
&lt;BR /&gt; security-level 100
&lt;BR /&gt; ip address 10.10.51.1 255.255.255.0
&lt;BR /&gt;!
&lt;BR /&gt;interface GigabitEthernet0/2
&lt;BR /&gt; shutdown
&lt;BR /&gt; no nameif
&lt;BR /&gt; no security-level
&lt;BR /&gt; no ip address
&lt;BR /&gt;!
&lt;BR /&gt;interface GigabitEthernet0/3
&lt;BR /&gt; shutdown
&lt;BR /&gt; no nameif
&lt;BR /&gt; no security-level
&lt;BR /&gt; no ip address
&lt;BR /&gt;!
&lt;BR /&gt;interface Management0/0
&lt;BR /&gt; nameif management
&lt;BR /&gt; security-level 100
&lt;BR /&gt; ip address 172.31.115.100 255.255.255.0
&lt;BR /&gt; management-only
&lt;BR /&gt;!
&lt;BR /&gt;boot system disk0:/asa822-k8.bin
&lt;BR /&gt;ftp mode passive
&lt;BR /&gt;dns server-group 66.128.93.24
&lt;BR /&gt;object-group network yourlink-inside-net
&lt;BR /&gt;object-group network Yourlink-inside-net
&lt;BR /&gt;access-list outside-in extended permit icmp any any echo-reply
&lt;BR /&gt;access-list outside-in extended deny ip any any log
&lt;BR /&gt;pager lines 24
&lt;BR /&gt;logging asdm informational
&lt;BR /&gt;mtu outside 1500
&lt;BR /&gt;mtu inside4 1500
&lt;BR /&gt;mtu inside5 1500
&lt;BR /&gt;mtu inside8 1500
&lt;BR /&gt;mtu inside9 1500
&lt;BR /&gt;mtu inside801 1500
&lt;BR /&gt;mtu inside802 1500
&lt;BR /&gt;mtu inside803 1500
&lt;BR /&gt;mtu management 1500
&lt;BR /&gt;no failover
&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1
&lt;BR /&gt;asdm image disk0:/asdm-631.bin
&lt;BR /&gt;no asdm history enable
&lt;BR /&gt;arp timeout 14400
&lt;BR /&gt;nat-control
&lt;BR /&gt;global (outside) 1 66.128.95.242 netmask 255.255.255.252
&lt;BR /&gt;nat (inside4) 1 10.10.52.0 255.255.255.0
&lt;BR /&gt;nat (inside5) 1 10.10.59.0 255.255.255.0
&lt;BR /&gt;nat (inside8) 1 10.10.60.0 255.255.255.0
&lt;BR /&gt;nat (inside9) 1 10.10.61.0 255.255.255.0
&lt;BR /&gt;nat (inside801) 1 10.10.50.0 255.255.255.0
&lt;BR /&gt;nat (inside802) 1 10.10.48.0 255.255.255.0
&lt;BR /&gt;nat (inside803) 1 10.10.51.0 255.255.255.0
&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 66.128.95.241 1&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 15:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604620#M604545</guid>
      <dc:creator>rouzbehta</dc:creator>
      <dc:date>2011-02-02T15:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site vpn with ipsec</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604621#M604546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks ok, execpt you're missing an IP address on the outside interface (i assume 66.128.95.241/30 &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; .)&lt;/P&gt;&lt;P&gt;Anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on wich subnets you want to allow trough the site2siteVPN your nat config for vpn on site1 could look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside4_outbound_nat0 permit ip 10.10.52.0 255.255.255.0 &lt;IP and="" subnet="" from="" site2=""&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;access-list inside5_outbound_nat0 permit ip 10.10.59.0 255.255.255.0 &lt;IP and="" subnet="" from="" site2=""&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;access-list inside9_outbound_nat0 permit ip 10.10.61.0 255.255.255.0 &lt;IP and="" subnet="" from="" site2=""&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside4) 0 access-list inside4_outbound_nat0&lt;/P&gt;&lt;P&gt;nat (inside5) 0 access-list inside5_outbound_nat0&lt;/P&gt;&lt;P&gt;nat (inside9) 0 access-list inside9_outbound_nat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way the VPN traffic will not be translated to the given site2 subnet.&lt;/P&gt;&lt;P&gt;And traffic from the same subnet to the internet wil be translated to the outside IP because of your other nat statements&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside4) 1 10.10.52.0 255.255.255.0&lt;BR /&gt;nat (inside5) 1 10.10.59.0 255.255.255.0&lt;BR /&gt;nat (inside9) 1 10.10.61.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 66.128.95.242 netmask 255.255.255.252&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 10:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-with-ipsec/m-p/1604621#M604546</guid>
      <dc:creator>Niels van der Made</dc:creator>
      <dc:date>2011-02-03T10:14:44Z</dc:date>
    </item>
  </channel>
</rss>

