<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic sourced by ASA Interface IP cannot reach SMTP Server over VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-sourced-by-asa-interface-ip-cannot-reach-smtp-server/m-p/3751963#M8768</link>
    <description>&lt;P&gt;Can you post the configuration to have look what rules you have.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Nov 2018 16:05:56 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2018-11-23T16:05:56Z</dc:date>
    <item>
      <title>Traffic sourced by ASA Interface IP cannot reach SMTP Server over VPN</title>
      <link>https://community.cisco.com/t5/network-security/traffic-sourced-by-asa-interface-ip-cannot-reach-smtp-server/m-p/3751773#M8765</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a question regarding the ASA and SMTP connection over VPN to my mail gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It´s a branch office ASA which is connected over VPN to the hub. Every traffic goes over that VPN tunnel and for the clients behind the ASA everything is fine. They can reach and ping the SMTP gateway with no problems.&lt;/P&gt;
&lt;P&gt;When I was setting up the call-home feature to send me a config snapshot every day I found out that the internal IP address of the ASA (which is the source of sending SMTP traffic for call-home feature) is not routed through the VPN tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A trace shows it is routed directly through the internet instead of being routed through the VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please, can someone help me finding a solution for this?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-sourced-by-asa-interface-ip-cannot-reach-smtp-server/m-p/3751773#M8765</guid>
      <dc:creator>Webwalker</dc:creator>
      <dc:date>2020-02-21T16:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic sourced by ASA Interface IP cannot reach SMTP Server over VPN</title>
      <link>https://community.cisco.com/t5/network-security/traffic-sourced-by-asa-interface-ip-cannot-reach-smtp-server/m-p/3751963#M8768</link>
      <description>&lt;P&gt;Can you post the configuration to have look what rules you have.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Nov 2018 16:05:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-sourced-by-asa-interface-ip-cannot-reach-smtp-server/m-p/3751963#M8768</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2018-11-23T16:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic sourced by ASA Interface IP cannot reach SMTP Server over VPN</title>
      <link>https://community.cisco.com/t5/network-security/traffic-sourced-by-asa-interface-ip-cannot-reach-smtp-server/m-p/3751979#M8771</link>
      <description>&lt;P&gt;&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif FE01_WIFI&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;nameif FE02_WAN&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 172.20.255.161 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif FE03_DATAA&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.21.48.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;description ### PORT-CHANNEL 2 #1 ###&lt;BR /&gt;&amp;nbsp;channel-group 1 mode passive&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;description ### PORT-CHANNEL 2 #2 ###&lt;BR /&gt;&amp;nbsp;channel-group 1 mode passive&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;nameif WAN&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 172.22.58.11.94 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.15.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;&amp;nbsp;lacp max-bundle 8&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.311&lt;BR /&gt;&amp;nbsp;vlan 311&lt;BR /&gt;&amp;nbsp;nameif FE03_DATA&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.143.48.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.314&lt;BR /&gt;&amp;nbsp;description WIFI&lt;BR /&gt;&amp;nbsp;vlan 314&lt;BR /&gt;&amp;nbsp;nameif WIFI&lt;BR /&gt;&amp;nbsp;security-level 30&lt;BR /&gt;&amp;nbsp;ip address 192.168.3.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa944-27-smp-k8.bin&lt;BR /&gt;boot system disk0:/asa944-16-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network RUEKA01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;subnet 10.143.48.0 255.255.255.0&lt;BR /&gt;object network RUMOW01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;subnet 10.143.168.0 255.255.252.0&lt;BR /&gt;object network A_&lt;BR /&gt;object network RUEKA01-NET-WIFI-GUEST&lt;BR /&gt;&amp;nbsp;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;object network RULED01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;subnet 10.143.46.0 255.255.255.0&lt;BR /&gt;object network RURND01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;subnet 10.143.50.0 255.255.254.0&lt;BR /&gt;object network UAIEV01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;subnet 10.143.176.0 255.255.252.0&lt;BR /&gt;object network UALVI01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;subnet 10.143.188.0 255.255.252.0&lt;BR /&gt;object network UAKIV01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;subnet 10.143.184.0 255.255.252.0&lt;BR /&gt;object network MyIP&lt;BR /&gt;&amp;nbsp;host 10.143.48.254&lt;BR /&gt;object network DATAC-MNG04&lt;BR /&gt;&amp;nbsp;host 10.163.8.53&lt;BR /&gt;object network RUMOS01-NET-DMZ&lt;BR /&gt;&amp;nbsp;subnet 192.168.90.0 255.255.255.0&lt;BR /&gt;object network RUMOS01-NET-VPN-SSL&lt;BR /&gt;&amp;nbsp;subnet 10.143.55.0 255.255.255.0&lt;BR /&gt;object network DATAC-MNG05&lt;BR /&gt;&amp;nbsp;host 10.163.8.54&lt;BR /&gt;object network RUEKA01-NET-FAKE&lt;BR /&gt;&amp;nbsp;subnet 192.168.12.0 255.255.255.0&lt;BR /&gt;object network RUEKA01-NET-RANGE_ALL_COMP1&lt;BR /&gt;&amp;nbsp;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network RUEKA01-NET-RANGE_ALL_COMP2&lt;BR /&gt;&amp;nbsp;subnet 10.2490.0 255.255.0.0&lt;BR /&gt;object network RUMOW01-NET-VM&lt;BR /&gt;&amp;nbsp;subnet 172.168.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;description VMware management network&lt;BR /&gt;object network ProArc&lt;BR /&gt;&amp;nbsp;subnet 10.136.173.0 255.255.255.0&lt;BR /&gt;object network GBNLW&lt;BR /&gt;&amp;nbsp;subnet 10.164.232.0 255.255.255.0&lt;BR /&gt;object network UALVI01-NET-DATA-VPN&lt;BR /&gt;&amp;nbsp;subnet 10.143.180.0 255.255.255.0&lt;BR /&gt;object network RUEKA01-NET-WIFI&lt;BR /&gt;&amp;nbsp;subnet 192.168.3.0 255.255.255.0&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq telnet&lt;BR /&gt;object-group service COMP1_allowed_udp udp&lt;BR /&gt;&amp;nbsp;port-object eq domain&lt;BR /&gt;object-group network RUEKA01-GR-NET-VPN-RUMOS01&lt;BR /&gt;&amp;nbsp;network-object object RUEKA01-NET-DATA-ALL&lt;BR /&gt;object-group network NLTC401-GR-NET-VPN-RUMOS01&lt;BR /&gt;&amp;nbsp;network-object 10.100.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.101.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.104.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.130.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.160.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.0.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.100.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.104.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.108.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.112.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.116.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.12.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.120.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.124.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.128.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.132.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.136.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.140.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.144.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.148.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.152.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.156.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.16.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.160.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.164.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.172.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.196.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.20.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.200.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.204.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.208.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.212.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.216.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.220.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.224.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.228.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.232.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.236.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.24.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.240.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.244.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.248.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.252.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.28.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.32.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.36.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.4.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.40.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.56.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.60.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.64.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.68.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.72.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.76.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.8.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.80.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.84.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.88.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.92.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.143.96.0 255.255.252.0&lt;BR /&gt;&amp;nbsp;network-object 10.162.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.163.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.181.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.244.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.249.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.250.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.252.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.254.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.255.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.82.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.83.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object object RUEKA01-NET-RANGE_ALL_COMP2&lt;BR /&gt;&amp;nbsp;network-object object GBNLW&lt;BR /&gt;&amp;nbsp;network-object object ProArc&lt;BR /&gt;object-group network RUMOS01-GR-NET-VPN-RUEKA01&lt;BR /&gt;&amp;nbsp;network-object object RUMOW01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;network-object object RUMOS01-NET-VPN-SSL&lt;BR /&gt;&amp;nbsp;group-object NLTC401-GR-NET-VPN-RUMOS01&lt;BR /&gt;&amp;nbsp;network-object object RUMOS01-NET-DMZ&lt;BR /&gt;&amp;nbsp;network-object object RULED01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;network-object object UALVI01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;network-object object UAIEV01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;network-object object RUMOW01-NET-VM&lt;BR /&gt;&amp;nbsp;network-object object RURND01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;network-object object UALVI01-NET-DATA-VPN&lt;BR /&gt;&amp;nbsp;network-object 10.28.0.0 255.255.224.0&lt;BR /&gt;object-group service asdm tcp&lt;BR /&gt;&amp;nbsp;description Cisco ASDM Port&lt;BR /&gt;&amp;nbsp;port-object eq 4434&lt;BR /&gt;object-group service techexpert tcp&lt;BR /&gt;&amp;nbsp;description Pro-Info Techexpert&lt;BR /&gt;&amp;nbsp;port-object eq 801&lt;BR /&gt;&amp;nbsp;port-object eq 803&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;&amp;nbsp;group-object asdm&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq domain&lt;BR /&gt;&amp;nbsp;group-object techexpert&lt;BR /&gt;&amp;nbsp;port-object eq 10020&lt;BR /&gt;object-group service DM_INLINE_UDP_1 udp&lt;BR /&gt;&amp;nbsp;port-object eq domain&lt;BR /&gt;&amp;nbsp;port-object eq ntp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object object RUEKA01-NET-RANGE_ALL_COMP1&lt;BR /&gt;&amp;nbsp;network-object object RUEKA01-NET-RANGE_ALL_COMP2&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object object RUEKA01-NET-RANGE_ALL_COMP1&lt;BR /&gt;&amp;nbsp;network-object object RUEKA01-NET-RANGE_ALL_COMP2&lt;BR /&gt;object-group network RFC1918&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list external_1_cryptomap extended permit ip object-group RUEKA01-GR-NET-VPN-RUMOS01 object-group RUMOS01-GR-NET-VPN-RUEKA01&lt;BR /&gt;access-list external_access_in extended permit ip object-group RUMOS01-GR-NET-VPN-RUEKA01 object-group RUEKA01-GR-NET-VPN-RUMOS01&lt;BR /&gt;access-list external_access_in extended permit ip object UAIEV01-NET-DATA-ALL object RUEKA01-NET-DATA-ALL&lt;BR /&gt;access-list external_access_in extended deny ip any any log critical&lt;BR /&gt;access-list internal_access_in extended permit ip object-group RUEKA01-GR-NET-VPN-RUMOS01 object-group RUMOS01-GR-NET-VPN-RUEKA01 log disable&lt;BR /&gt;access-list internal_access_in extended permit ip object RUEKA01-NET-DATA-ALL object UAIEV01-NET-DATA-ALL&lt;BR /&gt;access-list internal_access_in extended permit tcp object RUEKA01-NET-DATA-ALL any object-group DM_INLINE_TCP_2&lt;BR /&gt;access-list internal_access_in extended permit udp object RUEKA01-NET-DATA-ALL any object-group DM_INLINE_UDP_1&lt;BR /&gt;access-list internal_access_in extended permit tcp object RUEKA01-NET-DATA-ALL host 172.168.10.18 eq 9443&lt;BR /&gt;access-list internal_access_in extended deny ip any any log critical&lt;BR /&gt;access-list COMP1-QOS-VOIP-ACL extended permit ip any host 10.163.8.116&lt;BR /&gt;access-list WIFI_in extended deny ip 192.168.0.0 255.255.255.0 object-group RFC1918&lt;BR /&gt;access-list WIFI_in extended permit ip 192.168.0.0 255.255.255.0 any&lt;BR /&gt;access-list WIFI_in extended deny ip 192.168.3.0 255.255.255.0 object-group RFC1918&lt;BR /&gt;access-list WIFI_in extended permit ip 192.168.3.0 255.255.255.0 any&lt;BR /&gt;pager lines 40&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 1048576&lt;BR /&gt;logging trap errors&lt;BR /&gt;logging asdm errors&lt;BR /&gt;mtu FE01_WIFI 1500&lt;BR /&gt;mtu FE02_WAN 1500&lt;BR /&gt;mtu FE03_DATAA 1500&lt;BR /&gt;mtu WAN 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu FE03_DATA 1500&lt;BR /&gt;mtu WIFI 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any FE02_WAN&lt;BR /&gt;icmp permit any WAN&lt;BR /&gt;asdm image disk0:/asdm-7101.bin&lt;BR /&gt;asdm location 172.24.0.18 255.255.255.255 FE02_WAN&lt;BR /&gt;asdm location 172.24.0.20 255.255.255.255 FE02_WAN&lt;BR /&gt;asdm location 172.24.0.21 255.255.255.255 FE02_WAN&lt;BR /&gt;asdm location 172.24.0.18 255.255.255.255 WAN&lt;BR /&gt;asdm location 172.24.0.0 255.255.240.0 WAN&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (any,any) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static DM_INLINE_NETWORK_2 DM_INLINE_NETWORK_2 no-proxy-arp&lt;BR /&gt;nat (FE03_DATA,FE02_WAN) source static RUEKA01-GR-NET-VPN-RUMOS01 RUEKA01-GR-NET-VPN-RUMOS01 destination static RUMOS01-GR-NET-VPN-RUEKA01 RUMOS01-GR-NET-VPN-RUEKA01 no-proxy-arp&lt;BR /&gt;nat (FE03_DATA,FE02_WAN) source dynamic RUEKA01-NET-DATA-ALL interface&lt;BR /&gt;nat (FE01_WIFI,FE02_WAN) source dynamic RUEKA01-NET-WIFI-GUEST interface&lt;BR /&gt;nat (FE03_DATA,WAN) source static RUEKA01-GR-NET-VPN-RUMOS01 RUEKA01-GR-NET-VPN-RUMOS01 destination static RUMOS01-GR-NET-VPN-RUEKA01 RUMOS01-GR-NET-VPN-RUEKA01 no-proxy-arp&lt;BR /&gt;nat (FE03_DATA,WAN) source dynamic RUEKA01-NET-DATA-ALL interface&lt;BR /&gt;nat (FE01_WIFI,WAN) source dynamic RUEKA01-NET-WIFI-GUEST interface&lt;BR /&gt;!&lt;BR /&gt;object network RUEKA01-NET-DATA-ALL&lt;BR /&gt;&amp;nbsp;nat (FE03_DATA,FE02_WAN) dynamic 192.168.11.94&lt;BR /&gt;object network RUEKA01-NET-WIFI&lt;BR /&gt;&amp;nbsp;nat (WIFI,WAN) dynamic 192.168.11.93&lt;BR /&gt;access-group WIFI_in in interface FE01_WIFI&lt;BR /&gt;access-group external_access_in in interface FE02_WAN&lt;BR /&gt;access-group external_access_in in interface WAN&lt;BR /&gt;access-group internal_access_in in interface FE03_DATA&lt;BR /&gt;access-group WIFI_in in interface WIFI&lt;BR /&gt;route FE02_WAN 0.0.0.0 0.0.0.0 10.82.255.162 1&lt;BR /&gt;route WAN 0.0.0.0 0.0.0.0 192.168.11.89 200&lt;BR /&gt;route WAN 172.24.0.1 255.255.255.255 192.168.11.89 1&lt;BR /&gt;route WAN 172.24.0.20 255.255.255.255 192.168.11.89 200&lt;BR /&gt;route WAN 172.24.1.20 255.255.255.255 192.168.11.89 200&lt;BR /&gt;route WAN 172.24.1.21 255.255.255.255 192.168.11.89 200&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;aaa authorization exec LOCAL&lt;BR /&gt;aaa authorization http console LOCAL&lt;BR /&gt;http server enable 4434&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.143.0.0 255.255.0.0 FE03_DATA&lt;BR /&gt;http 10.163.8.53 255.255.255.255 FE03_DATA&lt;BR /&gt;http 10.163.8.54 255.255.255.255 FE03_DATA&lt;BR /&gt;http 172.24.0.18 255.255.255.255 FE02_WAN&lt;BR /&gt;http 10.249.58.0 255.255.255.0 FE03_DATA&lt;BR /&gt;http 10.249.63.128 255.255.255.128 FE03_DATA&lt;BR /&gt;http 172.24.0.18 255.255.255.255 WAN&lt;BR /&gt;http 172.24.0.0 255.255.240.0 WAN&lt;BR /&gt;http redirect FE02_WAN 80&lt;BR /&gt;snmp-server host FE02_WAN 172.24.0.18 community COMP1o&lt;BR /&gt;snmp-server host FE03_DATA 10.163.8.53 community COMP1.snmp&lt;BR /&gt;snmp-server location 31&lt;BR /&gt;snmp-server contact Admin&lt;BR /&gt;no sysopt connection permit-vpn&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-192&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption 3des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association lifetime seconds 43200&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 10485760&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA&lt;BR /&gt;crypto map external_map 1 match address external_1_cryptomap&lt;BR /&gt;crypto map external_map 1 set pfs&lt;BR /&gt;crypto map external_map 1 set peer 172.22.18.94&lt;BR /&gt;crypto map external_map 1 set ikev1 transform-set ESP-AES-128-SHA&lt;BR /&gt;crypto map external_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map external_map interface FE02_WAN&lt;BR /&gt;crypto map external_map interface WAN&lt;BR /&gt;&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto isakmp disconnect-notify&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev1 enable FE02_WAN&lt;BR /&gt;crypto ikev1 enable WAN&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 5&lt;BR /&gt;&amp;nbsp;lifetime 43200&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 65535&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 172.24.0.18 255.255.255.255 FE02_WAN&lt;BR /&gt;ssh 172.24.0.18 255.255.255.255 WAN&lt;BR /&gt;ssh 172.24.0.20 255.255.255.255 WAN&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 management&lt;BR /&gt;ssh 10.143.0.0 255.255.0.0 FE03_DATA&lt;BR /&gt;ssh 10.24958.0 255.255.255.0 FE03_DATA&lt;BR /&gt;ssh 10.24963.128 255.255.255.128 FE03_DATA&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access FE03_DATA&lt;BR /&gt;dhcpd address 192.168.15.50-192.168.15.250 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.143.48.100-10.143.48.194 FE03_DATA&lt;BR /&gt;dhcpd dns 10.143.168.51 10.143.50.7 interface FE03_DATA&lt;BR /&gt;dhcpd lease 691200 interface FE03_DATA&lt;BR /&gt;dhcpd option 3 ip 10.143.48.254 interface FE03_DATA&lt;BR /&gt;dhcpd option 4 ip 10.143.168.51 10.143.48.22 interface FE03_DATA&lt;BR /&gt;dhcpd option 15 ascii corp1.ad-is.net interface FE03_DATA&lt;BR /&gt;dhcpd option 42 ip 10.143.168.51 10.143.48.22 interface FE03_DATA&lt;BR /&gt;dhcpd enable FE03_DATA&lt;BR /&gt;!&lt;BR /&gt;priority-queue FE02_WAN&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.143.168.51 source FE03_DATA prefer&lt;BR /&gt;ssl cipher default custom "AES128-SHA"&lt;BR /&gt;ssl cipher tlsv1 custom "AES128-SHA"&lt;BR /&gt;ssl cipher dtlsv1 custom "AES128-SHA"&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;tunnel-group-list enable&lt;BR /&gt;&amp;nbsp;onscreen-keyboard logon&lt;BR /&gt;&amp;nbsp;cache&lt;BR /&gt;&amp;nbsp; disable&lt;BR /&gt;&amp;nbsp;no error-recovery disable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;class-map COMP1-VOICE-CLASS&lt;BR /&gt;&amp;nbsp;match access-list COMP1-QOS-VOIP-ACL&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map COMP1-QOS-PM&lt;BR /&gt;&amp;nbsp;class COMP1-VOICE-CLASS&lt;BR /&gt;&amp;nbsp; priority&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; police output 81920000&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy COMP1-QOS-PM interface FE02_WAN&lt;BR /&gt;&lt;BR /&gt;prompt hostname context&lt;BR /&gt;service call-home&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;alert-group-config snapshot&lt;BR /&gt;&amp;nbsp; add-command "show version"&lt;BR /&gt;&amp;nbsp; add-command "show running-config"&lt;BR /&gt;&amp;nbsp; add-command "show inventory"&lt;BR /&gt;&amp;nbsp; add-command "show cpu detailed"&lt;BR /&gt;&amp;nbsp; add-command "show interface detail"&lt;BR /&gt;&amp;nbsp; add-command "show traffic"&lt;BR /&gt;&amp;nbsp; add-command "show connection count"&lt;BR /&gt;&amp;nbsp; add-command "show vpn-sessiondb"&lt;BR /&gt;&amp;nbsp; add-command "show environment"&lt;BR /&gt;&amp;nbsp;contact-email-addr ASA-FWL01@COMP2.com&lt;BR /&gt;&amp;nbsp;mail-server 10.249.148.33 priority 1&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 2&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 2&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;&amp;nbsp;profile Config-Backup-1&lt;BR /&gt;&amp;nbsp; destination address email network@COMP2.com&lt;BR /&gt;&amp;nbsp; destination message-size-limit 4000000&lt;BR /&gt;&amp;nbsp; destination transport-method email&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group snapshot periodic daily 07:00&lt;/P&gt;</description>
      <pubDate>Fri, 23 Nov 2018 16:59:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-sourced-by-asa-interface-ip-cannot-reach-smtp-server/m-p/3751979#M8771</guid>
      <dc:creator>Webwalker</dc:creator>
      <dc:date>2018-11-23T16:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic sourced by ASA Interface IP cannot reach SMTP Server over VPN</title>
      <link>https://community.cisco.com/t5/network-security/traffic-sourced-by-asa-interface-ip-cannot-reach-smtp-server/m-p/3752082#M8774</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Try to add below command pointing your local DNS and the interface it need to be learn.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;dns domain-lookup&amp;nbsp;&lt;STRONG&gt;Inside&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dns server-group DefaultDNS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; name-server&amp;nbsp;XX.XX.XX.XX&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; name-server XX.XX.XX.XX&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; domain-name&amp;nbsp;COMP2.com&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Abheesh&lt;/P&gt;</description>
      <pubDate>Sat, 24 Nov 2018 06:03:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-sourced-by-asa-interface-ip-cannot-reach-smtp-server/m-p/3752082#M8774</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-11-24T06:03:05Z</dc:date>
    </item>
  </channel>
</rss>

