<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring GlobalProtect and DMZ Web Server in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567060#M2158</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/299010"&gt;@ccortijo&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The last rule, which should allow access to your DMZ server, still needs to be corrected. It should match destination address 192.168.1.2. This is little trick when you first start working with PAN firewalls, but I believe at some point you will understand it make a lot of sense:&lt;BR /&gt;When creating security rule you need to use &lt;U&gt;post-NAT&lt;/U&gt; &lt;U&gt;zone &lt;/U&gt;with &lt;U&gt;pre-NAT addresses&lt;/U&gt;. That is because NAT is being "evaluated" first, before policy lookup, and NAT is applied after finding matching rule, little before traffic exit the firewall.&lt;/P&gt;
&lt;P&gt;For the same reason NAT rule needs to use &lt;U&gt;pre-NAT zones &lt;/U&gt;(because it needs to match the traffic using the original addresses).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So back to your case your NAT and security rule for the DMZ and GP should look like:&lt;/P&gt;
&lt;P&gt;GP:&lt;/P&gt;
&lt;P&gt;- Security: source zone=WAN-CYBER; dest zone=WAN-CYBER; source addr=any;&amp;nbsp; dest address=192.168.1.2&lt;/P&gt;
&lt;P&gt;- NAT: source zone=WAN-CYBER; dest zone=WAN-CYBER; source addr=any; dest addr=192.168.1.2; service=tcp/7000&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DMZ server:&lt;/P&gt;
&lt;P&gt;- Security: source zone=WAN-CYBER; dest zone=DMZ-Servidur; source addr=any; dest address=192.168.1.2&lt;/P&gt;
&lt;P&gt;- NAT: source zone=WAN-CYBER; dest zone=WAN-CYBER; source addr=any; dest addr=192.168.1.2; service=any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Back to your GP - NAT and security rules looks good to me, however it looks like the NAT doesn't any hit, which makes me believe no traffic for 192.168.1.2 on prot 7000 is hitting the firewall.&lt;/P&gt;
&lt;P&gt;- How are you testing the access to GP? Can you try to open the public IP with simple web browser &lt;A href="https://&amp;lt;public-ip&amp;gt;:7000" target="_blank"&gt;https://&amp;lt;public-ip&amp;gt;:7000&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Do you receive login page? If yes are you able to authenticate.&lt;/P&gt;
&lt;P&gt;- Check your unified logs, filtering by (port.dst eq 7000), if too many noise add filter for (addr.dst in 192.168.1.2). Do you see your attempts? If yes, is traffic being allowed? If you expand log details, do you see NAT being applied?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition:&lt;/P&gt;
&lt;P&gt;- Did you move&amp;nbsp; the GP to loopback.1 as I suggested?&lt;/P&gt;
&lt;P&gt;- I notided you have applied&amp;nbsp; MGT interface profile on the loopback. What services have you enabled for that profile? Does HTTPS being enabled? If yes, you really don't have to. Int profile with HTTPS is only to enable webUI admin interface and not required to enable GP. &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClbUCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClbUCAS&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 25 Nov 2023 07:35:01 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2023-11-25T07:35:01Z</dc:date>
    <item>
      <title>Configuring GlobalProtect and DMZ Web Server</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/566831#M2139</link>
      <description>&lt;PRE id="tw-target-text" class="tw-data-text tw-text-large tw-ta" dir="ltr" data-placeholder="Traducción" data-ved="2ahUKEwjSn6njy9mCAxX2XqQEHTZPACEQ3ewLegQIDRAQ"&gt;&lt;SPAN class="Y2IQFc"&gt;Hello,

Thank you for entering this post, the reason for it is that I am trying to configure the GlobalProtect VPN and a web server in a completely separate Zone. The programmer will have access to the server through this VPN and we will subsequently expose it to port 443 of my public IP. But I have the problem that GlobalProtect uses port 443.

Although I have seen guides and information, I have not yet been able to configure it

Somebody could help me?

Context:

We have a router with IP 192.168.1.1

On the eth1 interface of my PA220 I have it configured as an internet exit with 192.168.1.2, it connects directly to the router.

On eth2 I have configured my LAN network 192.168.10.1/24 (which I want the programmer to access)

On eth7 I have a DMZ zone (10.10.10.1/24) configured with a 10.10.10.2 Ubuntu server.

How can I configure GlobalProtect so that it does not interfere with the web server and is exposed to the public? Hosting the gateway, portal and web server on 192.168.1.2

Thank you&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 23 Nov 2023 09:59:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/566831#M2139</guid>
      <dc:creator>ccortijo</dc:creator>
      <dc:date>2023-11-23T09:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring GlobalProtect and DMZ Web Server</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/566926#M2144</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/299010"&gt;@ccortijo&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The best and simplies solutions would if your Internet Provider is giving you multiple public IP addresses. But such luxury is not very common.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you checked the following guide - &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGKCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGKCA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I haven't needed to do it myself, but the concept&amp;nbsp; is the following:&lt;BR /&gt;- There is no way to configure GlobalProtect to listen on different port&lt;/P&gt;
&lt;P&gt;- You can however create a loopback interface and enable GP on that&lt;/P&gt;
&lt;P&gt;- Using NAT and port forwarding you translate your public IP and custom port to the loopback and 443.&lt;/P&gt;
&lt;P&gt;- The drawback is that you IPsec/ESP cannot be NATed, and I am not sure if GP can work with NAT-T. Probably that is why in the last screenshot from the link it is shown that GP client is using SSL instead of IPsec.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have followed above guide, but you can't get GP to work, can you share more details, part of your configuration&amp;nbsp; and what issues are you facing?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 19:52:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/566926#M2144</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-11-23T19:52:19Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring GlobalProtect and DMZ Web Server</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/566988#M2150</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have tried the guide that you have provided me and it does not work for me, I am attaching images of the configuration.&lt;/P&gt;
&lt;P&gt;Currently neither the VPN nor the web server works.&lt;/P&gt;
&lt;P&gt;Do you see something strange?&lt;/P&gt;
&lt;P&gt;I greatly appreciate the help&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2023 08:51:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/566988#M2150</guid>
      <dc:creator>ccortijo</dc:creator>
      <dc:date>2023-11-24T08:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring GlobalProtect and DMZ Web Server</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567011#M2154</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/299010"&gt;@ccortijo&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;- From your zones I can see that you use the defautl "loopback" interface. I am not sure if this is correct configuration, but general approach when creating loopback is to create new and interface with identificator at the end. Like the picture below&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aleksandarastardzhiev_0-1700821708461.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55405i143A909763414912/image-size/medium?v=v2&amp;amp;px=400" role="button" title="aleksandarastardzhiev_0-1700821708461.png" alt="aleksandarastardzhiev_0-1700821708461.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Same goes for the tunnel&amp;nbsp; interface. &lt;BR /&gt;It is possible the way you have configure it to work as well, but I am not sure&lt;BR /&gt;&lt;BR /&gt;- From your interfaces it looks like your firewall outside interface is private (192.168.1.2) and you haven't configured the subnet. Is this because you have tried to hide your public IP, or there is another device infront of the firewall that is performing NAT and translating public IP to 192.168.1.2?&lt;BR /&gt;&lt;BR /&gt;- If there is another device that is perfoming the NAT before the firewall, your NAT rules doesn't seems correct:&lt;/P&gt;
&lt;P&gt;1. The rule at the top natting FW external IP to the DMZ server is appling any service, which will shadow any rule below that so GP rule will never be hit&lt;/P&gt;
&lt;P&gt;2. If there is NAT before the firewall, your GP NAT rule will also use 192.168.1.2 as original destination. However it must be put above the DMZ rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- If there is NAT infront of the FW, your security rule also seems wrong.&lt;/P&gt;
&lt;P&gt;1. You need to use 192.168.1.2 as destination and not the public IP, because the device before the FW will do the translation&lt;/P&gt;
&lt;P&gt;2. You will need two separate rules for GP and DMZ, because security rules are using &lt;U&gt;post-NAT zones&lt;/U&gt;. This means that in the security rule, you need to allow the addresses before that, but use the zones after the NAT. Since GP loopback is in WAN-CYBER your security rule should be source and destination zone = WAN-CYBER. Howerver your DMZ server is in different zone, so you need second security rule allowing again 192.168.1.2 as destination, but this time destination zone should be DMZ Servidor CAU&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;GP portal settings for external gateway is correct, you need to enter the public IP there.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2023 10:41:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567011#M2154</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-11-24T10:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring GlobalProtect and DMZ Web Server</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567030#M2156</link>
      <description>&lt;PRE id="tw-target-text" class="tw-data-text tw-text-large tw-ta" dir="ltr" data-placeholder="Traducción" data-ved="2ahUKEwjs4O3J3dyCAxVuTqQEHYF5B2kQ3ewLegQIBRAQ"&gt;&lt;SPAN class="Y2IQFc"&gt;&lt;FONT style="vertical-align: inherit;"&gt;&lt;FONT style="vertical-align: inherit;"&gt;Hola,&lt;/FONT&gt;&lt;/FONT&gt;
&lt;FONT style="vertical-align: inherit;"&gt;&lt;FONT style="vertical-align: inherit;"&gt;
Muchas gracias por las aclaraciones.&lt;/FONT&gt;&lt;/FONT&gt;
&lt;FONT style="vertical-align: inherit;"&gt;&lt;FONT style="vertical-align: inherit;"&gt;
Sigue sin funcionar, actualmente no veo el portal de GlobalProtect ni el servidor, adjunto imágenes de la configuración realizada. Antes del firewall tenemos un router que hace el nat&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2023 13:25:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567030#M2156</guid>
      <dc:creator>ccortijo</dc:creator>
      <dc:date>2023-11-24T13:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring GlobalProtect and DMZ Web Server</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567060#M2158</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/299010"&gt;@ccortijo&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The last rule, which should allow access to your DMZ server, still needs to be corrected. It should match destination address 192.168.1.2. This is little trick when you first start working with PAN firewalls, but I believe at some point you will understand it make a lot of sense:&lt;BR /&gt;When creating security rule you need to use &lt;U&gt;post-NAT&lt;/U&gt; &lt;U&gt;zone &lt;/U&gt;with &lt;U&gt;pre-NAT addresses&lt;/U&gt;. That is because NAT is being "evaluated" first, before policy lookup, and NAT is applied after finding matching rule, little before traffic exit the firewall.&lt;/P&gt;
&lt;P&gt;For the same reason NAT rule needs to use &lt;U&gt;pre-NAT zones &lt;/U&gt;(because it needs to match the traffic using the original addresses).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So back to your case your NAT and security rule for the DMZ and GP should look like:&lt;/P&gt;
&lt;P&gt;GP:&lt;/P&gt;
&lt;P&gt;- Security: source zone=WAN-CYBER; dest zone=WAN-CYBER; source addr=any;&amp;nbsp; dest address=192.168.1.2&lt;/P&gt;
&lt;P&gt;- NAT: source zone=WAN-CYBER; dest zone=WAN-CYBER; source addr=any; dest addr=192.168.1.2; service=tcp/7000&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DMZ server:&lt;/P&gt;
&lt;P&gt;- Security: source zone=WAN-CYBER; dest zone=DMZ-Servidur; source addr=any; dest address=192.168.1.2&lt;/P&gt;
&lt;P&gt;- NAT: source zone=WAN-CYBER; dest zone=WAN-CYBER; source addr=any; dest addr=192.168.1.2; service=any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Back to your GP - NAT and security rules looks good to me, however it looks like the NAT doesn't any hit, which makes me believe no traffic for 192.168.1.2 on prot 7000 is hitting the firewall.&lt;/P&gt;
&lt;P&gt;- How are you testing the access to GP? Can you try to open the public IP with simple web browser &lt;A href="https://&amp;lt;public-ip&amp;gt;:7000" target="_blank"&gt;https://&amp;lt;public-ip&amp;gt;:7000&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Do you receive login page? If yes are you able to authenticate.&lt;/P&gt;
&lt;P&gt;- Check your unified logs, filtering by (port.dst eq 7000), if too many noise add filter for (addr.dst in 192.168.1.2). Do you see your attempts? If yes, is traffic being allowed? If you expand log details, do you see NAT being applied?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition:&lt;/P&gt;
&lt;P&gt;- Did you move&amp;nbsp; the GP to loopback.1 as I suggested?&lt;/P&gt;
&lt;P&gt;- I notided you have applied&amp;nbsp; MGT interface profile on the loopback. What services have you enabled for that profile? Does HTTPS being enabled? If yes, you really don't have to. Int profile with HTTPS is only to enable webUI admin interface and not required to enable GP. &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClbUCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClbUCAS&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Nov 2023 07:35:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567060#M2158</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-11-25T07:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring GlobalProtect and DMZ Web Server</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567174#M2171</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Thank you very much for the help, it is really useful.&lt;/P&gt;
&lt;P&gt;I think the web server is working correctly, but global protect is not, I attach images of the policies and logs.&lt;/P&gt;
&lt;P&gt;I think the fault is in the GlobalProtect NAT&lt;/P&gt;
&lt;P&gt;Thank you very much, again&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 10:11:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567174#M2171</guid>
      <dc:creator>ccortijo</dc:creator>
      <dc:date>2023-11-27T10:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring GlobalProtect and DMZ Web Server</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567180#M2172</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/299010"&gt;@ccortijo&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Regarding the DMZ server - although connection to the server seems to be working, in my humble there is room for improvement:&lt;/P&gt;
&lt;P&gt;- It seems your DMZ server security is now using "application-default" as matching service. Unfortunately this will cause issues in your particular case. App-default means FW, will allow connection only if the applicaiton it is detecting correspond to the tcp port that is being used. From the logs it we can see that FW is identifying traffic as "ssl", that is becaue you are using HTTPS, without performing ssl decryption on the firewall. "ssl" application default port is 443, but you are using 8080. For that reason traffic is not matching your DMZ server rule, but it seems to be falling back to the "intrazone-default" rule, which by default is blockin any any. But apperantly you have change it to allow any any.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My recommendation - set port to tcp/8080 with application "any" for your DMZ security rule. Obeserve the logs for one or two days and see what applications are detected over this rule. Then you can switch from "any" app to specify only apps that you see in the logs. Keep tcp/8080 for the service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Regarding the GP - From traffic logs for port 7000 you can see that firewall is trying to send the traffic to dest zone DMZ. Which means correct NAT rule is not being applied. This is confirmed by the lack of increasing hit counter on the NAT rule. For me the GP NAT rule seems correct and it should work, my only guess is that you have typo for service object "port-7000", can you edit the object and confirm it is using tcp and dst port 7000? Can you share service object config?&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 10:32:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567180#M2172</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-11-27T10:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring GlobalProtect and DMZ Web Server</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567206#M2174</link>
      <description>&lt;P&gt;hello,&lt;BR /&gt;Now everything is working.&lt;BR /&gt;Really, thank you very much for your help, it has all been thanks to you.&lt;BR /&gt;This helped me better understand NAT in Palo Alto Firewalls.&lt;BR /&gt;Thank you so much.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 13:28:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/configuring-globalprotect-and-dmz-web-server/m-p/567206#M2174</guid>
      <dc:creator>ccortijo</dc:creator>
      <dc:date>2023-11-27T13:28:51Z</dc:date>
    </item>
  </channel>
</rss>

