<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NEED help from Experts of CISCO in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326100#M828939</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok  i will see it . Problem is that i use&lt;/P&gt;&lt;P&gt;vpn-simultaneous-login  command in  group-policy  attribute it able  multiple users to login simultaneously  with Same name &lt;/P&gt;&lt;P&gt;bu then they cant ping any IP which i allow on my Split tunnel&lt;/P&gt;&lt;P&gt;while when 1 user connected  it able to access all the server which i allow in my split tunnel&lt;/P&gt;&lt;P&gt;what is the reason and then how can resolve this  issue  &lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 01 Aug 2009 15:00:15 GMT</pubDate>
    <dc:creator>Faizan Khursheed</dc:creator>
    <dc:date>2009-08-01T15:00:15Z</dc:date>
    <item>
      <title>NEED help from Experts of CISCO</title>
      <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326094#M828933</link>
      <description>&lt;P&gt;i have configured remote access VPN  for my client on ASA  version 7.0.they can able to remotely login on it but with one name only  2 simulateneosuly  connection established but not more than that .when 3 person want to access with same name it's not allow to do  it&lt;/P&gt;&lt;P&gt;what will be the reason how can i get out of this pathteic problem.i havent find any viable  material .Need your help&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326094#M828933</guid>
      <dc:creator>Faizan Khursheed</dc:creator>
      <dc:date>2019-03-11T16:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: NEED help from Experts of CISCO</title>
      <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326095#M828934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This link may help you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://supportwiki.cisco.com/ViewWiki/index.php/Unable_to_connect_more_than_three_VPN_client_users_to_PIX/ASA_and_the_Secure_VPN_Connection_terminated_locally_by_the_client._Reason_413_User_Authentication_failed_error_message_appears" target="_blank"&gt;http://supportwiki.cisco.com/ViewWiki/index.php/Unable_to_connect_more_than_three_VPN_client_users_to_PIX/ASA_and_the_Secure_VPN_Connection_terminated_locally_by_the_client._Reason_413_User_Authentication_failed_error_message_appears&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jul 2009 13:45:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326095#M828934</guid>
      <dc:creator>richard.jones</dc:creator>
      <dc:date>2009-07-30T13:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: NEED help from Experts of CISCO</title>
      <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326096#M828935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks  for your help i m actually facing other multiple users with same  name can connect themself simultaneously &lt;/P&gt;&lt;P&gt;but not abble to ping  split tunnel  IP's&lt;/P&gt;&lt;P&gt;which i allowed in my configuration &lt;/P&gt;&lt;P&gt;if  just one user connect  he able to access all the  IP &lt;/P&gt;&lt;P&gt;but multiple user with same name simultaneoulsy not able to ping &lt;/P&gt;&lt;P&gt;why  and how can i solve this problem&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;waiting for your reply &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jul 2009 08:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326096#M828935</guid>
      <dc:creator>Faizan Khursheed</dc:creator>
      <dc:date>2009-07-31T08:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: NEED help from Experts of CISCO</title>
      <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326097#M828936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;post config&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jul 2009 20:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326097#M828936</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2009-07-31T20:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: NEED help from Experts of CISCO</title>
      <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326098#M828937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i m pasting selected configuration which necessary for Remote access VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-DB-nonat extended permit ip 172.20.18.0 255.255.255.0 9.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list RABRANCH standard permit host 172.20.18.12 &lt;/P&gt;&lt;P&gt;access-list RADataBase standard permit host 172.20.18.12 &lt;/P&gt;&lt;P&gt;access-list RADataBase standard permit host 172.20.17.12 &lt;/P&gt;&lt;P&gt;access-list RADataBase standard permit host 172.20.17.11 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.17.15 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.17.12 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.17.11 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.17.17 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.17.26 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.17.27 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.17.28 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.17.31 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.17.32 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.18.12 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.18.17 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.18.18 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.18.19 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.18.20 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.18.50 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.18.100 &lt;/P&gt;&lt;P&gt;access-list RAAdmin standard permit host 172.20.17.52 &lt;/P&gt;&lt;P&gt;access-list DMZ-APP-nonat extended permit ip 172.20.17.0 255.255.255.0 9.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool VPNPOOL 9.1.1.0-9.1.1.100 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ-DB) 0 access-list DMZ-DB-nonat&lt;/P&gt;&lt;P&gt;nat (DMZ-APP) 0 access-list DMZ-APP-nonat&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.1.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set DIBRA esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn1 1 set transform-set DIBRA&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn1 1 set reverse-route&lt;/P&gt;&lt;P&gt;crypto map mymap 1 ipsec-isakmp dynamic dyn1&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5     &lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 3600&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 172.20.3.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 172.20.200.0 255.255.255.0 insideadmin&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy BRANCH internal&lt;/P&gt;&lt;P&gt;group-policy BRANCH attributes&lt;/P&gt;&lt;P&gt; dns-server value 172.20.10.100&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value RABRANCH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy DataBase internal&lt;/P&gt;&lt;P&gt;group-policy DataBase attributes&lt;/P&gt;&lt;P&gt; dns-server value 172.20.10.100&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value RADataBase&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy Admin internal&lt;/P&gt;&lt;P&gt;group-policy Admin attributes&lt;/P&gt;&lt;P&gt; dns-server value 172.20.10.100&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value RAAdmin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username SADBAS password EAsVs94WRKBssa/R encrypted&lt;/P&gt;&lt;P&gt;username SADBAS attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy DataBase&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username Admin password diNnsTo5dthlcLs5 encrypted&lt;/P&gt;&lt;P&gt;username Admin attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy Admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username BUSER password /Xu0va7mHdNk9tXI encrypted&lt;/P&gt;&lt;P&gt;username BUSER attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy BRANCH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group BRANCH type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group BRANCH general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPNPOOL&lt;/P&gt;&lt;P&gt; default-group-policy BRANCH&lt;/P&gt;&lt;P&gt;tunnel-group BRANCH ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DataBase type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DataBase general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group DataBase ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group Admin type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group Admin general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;tunnel-group Admin ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Aug 2009 03:53:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326098#M828937</guid>
      <dc:creator>Faizan Khursheed</dc:creator>
      <dc:date>2009-08-01T03:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: NEED help from Experts of CISCO</title>
      <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326099#M828938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do a show version, and verify how many VPNs are supported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you are having your VPN users log in, are they using the SAME account?  If so, you may have a limit on simultaneous logins, and that would also explain why the 3rd person can not log in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best wishes,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keith.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Aug 2009 14:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326099#M828938</guid>
      <dc:creator>keith.barker</dc:creator>
      <dc:date>2009-08-01T14:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: NEED help from Experts of CISCO</title>
      <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326100#M828939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok  i will see it . Problem is that i use&lt;/P&gt;&lt;P&gt;vpn-simultaneous-login  command in  group-policy  attribute it able  multiple users to login simultaneously  with Same name &lt;/P&gt;&lt;P&gt;bu then they cant ping any IP which i allow on my Split tunnel&lt;/P&gt;&lt;P&gt;while when 1 user connected  it able to access all the server which i allow in my split tunnel&lt;/P&gt;&lt;P&gt;what is the reason and then how can resolve this  issue  &lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Aug 2009 15:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326100#M828939</guid>
      <dc:creator>Faizan Khursheed</dc:creator>
      <dc:date>2009-08-01T15:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: NEED help from Experts of CISCO</title>
      <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326101#M828940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 7.0(7) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Compiled on Fri 06-Jul-07 10:37 by builders&lt;/P&gt;&lt;P&gt;System image file is "disk0:/asa707-k8.bin"&lt;/P&gt;&lt;P&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA-Primary up 136 days 5 hours&lt;/P&gt;&lt;P&gt;failover cluster up 136 days 5 hours&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hardware:   ASA5540-K8, 1024 MB RAM, CPU Pentium 4 2000 MHz&lt;/P&gt;&lt;P&gt;Internal ATA Compact Flash, 256MB&lt;/P&gt;&lt;P&gt;BIOS Flash AT49LW080 @ 0xffe00000, 1024KB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)&lt;/P&gt;&lt;P&gt;                             Boot microcode   : CNlite-MC-Boot-Cisco-1.2&lt;/P&gt;&lt;P&gt;                             SSL/IKE microcode: CNlite-MC-IPSEC-Admin-3.03&lt;/P&gt;&lt;P&gt;                             IPSec microcode  : CNlite-MC-IPSECm-MAIN-2.04&lt;/P&gt;&lt;P&gt; 0: Ext: GigabitEthernet0/0  : address is 0018.b91b.6042, irq 9&lt;/P&gt;&lt;P&gt; 1: Ext: GigabitEthernet0/1  : address is 0018.b91b.6043, irq 9&lt;/P&gt;&lt;P&gt; 2: Ext: GigabitEthernet0/2  : address is 0018.b91b.6044, irq 9&lt;/P&gt;&lt;P&gt; 3: Ext: GigabitEthernet0/3  : address is 0018.b91b.6045, irq 9&lt;/P&gt;&lt;P&gt; 4: Ext: Management0/0       : address is 0018.b91b.6041, irq 11&lt;/P&gt;&lt;P&gt; 5: Int: Internal-Data0/0    : address is 0000.0001.0002, irq 11&lt;/P&gt;&lt;P&gt; 6: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 5&lt;/P&gt;&lt;P&gt;              &lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;/P&gt;&lt;P&gt;Maximum Physical Interfaces : Unlimited &lt;/P&gt;&lt;P&gt;Maximum VLANs               : 200       &lt;/P&gt;&lt;P&gt;Inside Hosts                : Unlimited &lt;/P&gt;&lt;P&gt;Failover                    : Active/Active&lt;/P&gt;&lt;P&gt;VPN-DES                     : Enabled   &lt;/P&gt;&lt;P&gt;VPN-3DES-AES                : Enabled   &lt;/P&gt;&lt;P&gt;Security Contexts           : 2         &lt;/P&gt;&lt;P&gt;GTP/GPRS                    : Disabled  &lt;/P&gt;&lt;P&gt;VPN Peers                   : 5000      &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This platform has an ASA 5540 VPN Premium license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is the show version of my firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i shall be very thankful to u if you people helping me in resolving issue &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with same name  6 user simualtaneously login  but not able to ping any server which i allowed in my split tunnneled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;whereas whn 1 user get connected he able to access all the servre how can i resolve this issue &lt;/P&gt;&lt;P&gt;plz guided if it is not possible then providing me Cisco documentation .i will present this infront of my client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Aug 2009 06:49:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326101#M828940</guid>
      <dc:creator>Faizan Khursheed</dc:creator>
      <dc:date>2009-08-03T06:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: NEED help from Experts of CISCO</title>
      <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326102#M828941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you don't seem to have nat traversal enabled enable it with "crypto isakmp nat-traversal  3600". Try that and see if it works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Aug 2009 12:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326102#M828941</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2009-08-03T12:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: NEED help from Experts of CISCO</title>
      <link>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326103#M828942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your support problem has ben sort it out&lt;/P&gt;&lt;P&gt;many thanks to all of u&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Aug 2009 04:13:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-from-experts-of-cisco/m-p/1326103#M828942</guid>
      <dc:creator>Faizan Khursheed</dc:creator>
      <dc:date>2009-08-04T04:13:33Z</dc:date>
    </item>
  </channel>
</rss>

