<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block Outgoing VPN Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749829#M971537</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dan, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 2 acl's you currently have are not for the outside interface. One is for nat exemption and one is for split tunneling. These are for the vpn. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to stop outbound vpn then use the acl config I posted above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Aug 2007 20:46:48 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2007-08-16T20:46:48Z</dc:date>
    <item>
      <title>Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749812#M971513</link>
      <description>&lt;P&gt;I need to prevent the ability of visitors who connect laptops into the network and access the Internet via VPN client software. I can block regular web browsing through our Websense server, but it does not block users who initiate VPN sessions from inside the network.&lt;/P&gt;&lt;P&gt;Thanks for any help. &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749812#M971513</guid>
      <dc:creator>dlitteer</dc:creator>
      <dc:date>2019-03-11T10:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749813#M971514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list acl_outside deny udp any any eq 500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where acl_outside is your outside access list.  This will effectively stop IKE traffic from the VPN peer they are connecting to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternatively, you can apply this to an inside access list, if you have one.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2007 15:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749813#M971514</guid>
      <dc:creator>Jesterino</dc:creator>
      <dc:date>2007-08-09T15:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749814#M971515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you need to block *outgoing* connections to udp port 500.  It won't do any good to block the incoming connections.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2007 07:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749814#M971515</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-08-10T07:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749815#M971517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm aware of that.  However in the past I have found I had to open port 500 externally on my outside access list to allow VPN connections to be made from inside my network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2007 07:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749815#M971517</guid>
      <dc:creator>Jesterino</dc:creator>
      <dc:date>2007-08-10T07:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749816#M971519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's the problem. We recently had a visitor that was able to bypass our security policy by connecting to the Internet from a VPN client installed on his laptop from inside our facility.  I'm trying to block that in order to prevent that from happening again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 12:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749816#M971519</guid>
      <dc:creator>dlitteer</dc:creator>
      <dc:date>2007-08-16T12:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749817#M971521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct - the VPN device they are connecting to sends ESP traffic back through your firewall on port 500/udp.  I have found by blocking this port the traffic does not come back to the client on my network, which is your desired result.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 12:27:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749817#M971521</guid>
      <dc:creator>Jesterino</dc:creator>
      <dc:date>2007-08-16T12:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749818#M971522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just block ESP and ISAKMP in your inside interface. That will take care of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended deny ip any any 50&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended deny udp any any 500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 13:01:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749818#M971522</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-16T13:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749819#M971524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Which is something else I mentioned in my first reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'Alternatively, you can apply this to an inside access list, if you have one.'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In quite a few cases I have seen no inside access list, which is why I suggested the outside interface first.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 13:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749819#M971524</guid>
      <dc:creator>Jesterino</dc:creator>
      <dc:date>2007-08-16T13:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749820#M971527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually there is always an ACL apply to inside even if it is. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_acces_in extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just insert the deny ACL's before the permits.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 13:56:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749820#M971527</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-16T13:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749821#M971528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you sure about that?  It works even without an 'access-group inside_access_in in interface inside' config line?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not agree with your statement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 14:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749821#M971528</guid>
      <dc:creator>Jesterino</dc:creator>
      <dc:date>2007-08-16T14:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749822#M971530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any PIX/ASA, FWSM by default will have an acl apply to the inside interface allowing all the traffic unless the user delete the acl and remove the access-group statement in the interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 14:21:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749822#M971530</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-16T14:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749823#M971531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Incorrect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interfaces have a security level.  The higher the number, the more 'secure' it is.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default traffic on a higher security level interface is permitted to pass onto a lower security level interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is why traffic on your inside interface (security 100) is automatically permitted to pass onto your outside interface (security 0) unless you apply an access list to it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 14:54:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749823#M971531</guid>
      <dc:creator>Jesterino</dc:creator>
      <dc:date>2007-08-16T14:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749824#M971532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anybody that know how the Adaptive Security Algorithm works in the PIX/ASA software knows that traffic from a higher security level will flow to a low security level without acl' or if there is no acl restricting the traffic. Still when you get the device out of the box it come with an acl apply to the inside allowing any traffic. If the device don't have an acl apply to inside it's because the user removed the acl. Which I really don't see a reason to don't have an acl in the inside of a firewall. So normally the most efficient and secure way to block traffic is blocking it in the nearest interface to the source, in this case the inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 15:50:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749824#M971532</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-16T15:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749825#M971533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know very much about this, but there are only two acl's on this device, one for NAT and one for VPN split-tunneling. I would rather block it from the inside and absolutely not effect the external vpn users coming in. Would you guys mind taking a look at the configuration if I add it with the public addresses omitted?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 18:23:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749825#M971533</guid>
      <dc:creator>dlitteer</dc:creator>
      <dc:date>2007-08-16T18:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749826#M971534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rigoberto,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not correct...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended deny ip any any 50 &lt;/P&gt;&lt;P&gt;access-list access_inside_in extended deny udp any any 500 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should be...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended deny esp any any&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended deny udp any any 500 &lt;/P&gt;&lt;P&gt;access-list access_inside_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group access_inside_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 18:28:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749826#M971534</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-08-16T18:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749827#M971535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oops&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adam your absolutely right. I've been thinking too much in IP 50 lately. Dan I believe that nobody would mind if you post the config, at least I won't.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 19:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749827#M971535</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-16T19:20:11Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749828#M971536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks so much for helping with this.  I've attached the config to help clarify.  I know the only two acl's on it now are for the outside interfaces only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 20:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749828#M971536</guid>
      <dc:creator>dlitteer</dc:creator>
      <dc:date>2007-08-16T20:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749829#M971537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dan, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 2 acl's you currently have are not for the outside interface. One is for nat exemption and one is for split tunneling. These are for the vpn. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to stop outbound vpn then use the acl config I posted above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 20:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749829#M971537</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-08-16T20:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749830#M971538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should move from conduits to ACL's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you move to ACL's these should be what you need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list access_outside_in extended permit tcp any host X.X.X.X eq 25&lt;/P&gt;&lt;P&gt;access-list access_outside_in extended permit tcp any host X.X.X.X eq 80&lt;/P&gt;&lt;P&gt;access-list access_outside_in extended permit tcp any host X.X.X.X eq 110&lt;/P&gt;&lt;P&gt;access-group access_outside_in in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended deny esp any any&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended deny udp any any 500&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group access_inside_in in interface inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 22:01:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749830#M971538</guid>
      <dc:creator>me19562</dc:creator>
      <dc:date>2007-08-16T22:01:59Z</dc:date>
    </item>
    <item>
      <title>Re: Block Outgoing VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749831#M971539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And remember to removed the conduits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no conduit permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW I forgot the acl for ICMP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list access_outside_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list access_outside_in extended permit tcp any host X.X.X.X eq 25&lt;/P&gt;&lt;P&gt;access-list access_outside_in extended permit tcp any host X.X.X.X eq 80&lt;/P&gt;&lt;P&gt;access-list access_outside_in extended permit tcp any host X.X.X.X eq 110&lt;/P&gt;&lt;P&gt;access-group access_outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended deny esp any any&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended deny udp any any 500&lt;/P&gt;&lt;P&gt;access-list access_inside_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group access_inside_in in interface inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 22:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-outgoing-vpn-access/m-p/749831#M971539</guid>
      <dc:creator>me19562</dc:creator>
      <dc:date>2007-08-16T22:03:54Z</dc:date>
    </item>
  </channel>
</rss>

