<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port 4500 ipsec/udp traffice in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38907#M28536</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the only thing I need to rule out is that it is being blocked by the PA and I am trying to find the best way to verify that&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 06 Aug 2014 15:38:39 GMT</pubDate>
    <dc:creator>infotech</dc:creator>
    <dc:date>2014-08-06T15:38:39Z</dc:date>
    <item>
      <title>Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38877#M28506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do I check to see it the PA is dropping port 4500 traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 15:52:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38877#M28506</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-05T15:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38878#M28507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are mulitple ways to do so.&lt;/P&gt;&lt;P&gt;1. Packet capture with proper source/destination IP/Port.&lt;/P&gt;&lt;P&gt;2. From Traffic log&lt;/P&gt;&lt;P&gt;3. show session all filter source &amp;lt;&amp;gt; destination &amp;lt;&amp;gt; source-port &amp;lt;&amp;gt; and destination-port &amp;lt;&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you need additional information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 15:58:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38878#M28507</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-05T15:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38879#M28508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see no port 4500 traffic at all, I don't see anything being blocked to or from port 4500&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 16:54:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38879#M28508</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-05T16:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38880#M28509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you do packet capture on firewall to make sure, no other device is blocking traffic for port 4500 inbetween.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 16:56:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38880#M28509</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-05T16:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38881#M28510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did a packet capture and I see no 4500 traffic present, blocked or anything else. the source is also from a remote vendor in the internet. I am see the ike 500 traffice going out from the vpn device and nothing else&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 16:58:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38881#M28510</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-05T16:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38882#M28511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It means PAN is not receiving traffic on port 4500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you check on other end firewall if its sending any traffic on port 4500 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 17:00:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38882#M28511</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-05T17:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38883#M28512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So that means its not an issue on the PA but an issue outside in the internet or&amp;nbsp; the sender. The sender says that don't see any ike 500 traffice to respond too. I will see if I they can send some 4500 traffic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 17:02:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38883#M28512</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-05T17:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38884#M28513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you also please check if you have any implicit deny rule configured at the bottom of the rule base on the PA. This at times may cause some unintended issues for traffic terminating on the device. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 17:14:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38884#M28513</guid>
      <dc:creator>mrajdev</dc:creator>
      <dc:date>2014-08-05T17:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38885#M28514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a clean up rule at the bottom but wouldn't it show up in the logs as dropped?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 17:23:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38885#M28514</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-05T17:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38886#M28515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Upload complete capture from PANW.&amp;nbsp; I think something in between is not allowing packets on both 500/4500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 17:24:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38886#M28515</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-05T17:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38887#M28516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please make sure NAT-traversal is enabled on both side firewalls to accept IKE on port 4500. During IKE negotiation, 3rd message onwards, port will flip to UDP 4500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traditionally, IPSec does not work when traversing across a device doing NAT.&amp;nbsp; To circumvent this problem, NAT-T or NAT Traversal was developed.&amp;nbsp; NAT-T is an IKE phase 1 algorithm that is used when trying to establish a VPN between two &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;gateways devices&lt;/SPAN&gt; where a NAT device exists in front of one of the devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 17:41:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38887#M28516</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-05T17:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38888#M28517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont' have any control over the remote site, but if I am able to send 500 ike traffice out into the internet and am not seeing 4500 traffic traying to come in not sure how nat-t would affect it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 18:02:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38888#M28517</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-05T18:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38889#M28518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not have nat-t enabled on the palo side&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 18:13:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38889#M28518</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-05T18:13:33Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38890#M28519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If NAT-T is not enabled on PAN firewall, then could you please let us know, why are you expecting traffic on port 4500..?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 18:18:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38890#M28519</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-05T18:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38891#M28520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a vendor that creates a vpn tunnel using a fortinet device behind our PA 3020. The device initiates the tunnel,the ike 500 traffic I am seeing passing throught the PA into the internet, Then I would assume a device on the vendors side exchanges SA's with the 500 traffic should say okay and builds the ipsec/udp tunnel using port 4500. I am trying to confirm that we are making in past the pa firewall into the internet and not blocking a response from the vendor&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 18:23:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38891#M28520</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-05T18:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38892#M28521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;is&lt;/SPAN&gt; the VPN terminates on PAN FW...?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 19:38:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38892#M28521</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-05T19:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38893#M28522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't understand the question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 19:42:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38893#M28522</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-05T19:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38894#M28523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the VPN tunnel configured with PAN firewall or it's just a pass through device..?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 19:45:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38894#M28523</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-05T19:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38895#M28524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It just passes throught the PA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 19:47:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38895#M28524</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-05T19:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: Port 4500 ipsec/udp traffice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38896#M28525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, then nothing has to be done on the PAN firewall apart from a general security policy etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;You&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; can check the real time session in the CLI by using 'show session all filter &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;source&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; IP_ADD_OF_THE_TESTING_PC destination IP_ADD_OF_THE_DESTINATION'.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-family: inherit; font-size: 10pt; font-style: inherit; font-weight: inherit; line-height: 1.5em;"&gt;&amp;gt;&amp;nbsp; If there is &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-family: inherit; font-size: 10pt; font-style: inherit; font-weight: inherit; line-height: 1.5em;"&gt;a&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit; font-size: 10pt; font-style: inherit; font-weight: inherit; line-height: 1.5em;"&gt; session exist for the same traffic,&amp;nbsp; then please &lt;/SPAN&gt;&lt;SPAN style="font-family: inherit; font-size: 10pt; font-style: inherit; font-weight: inherit; line-height: 1.5em;"&gt;apply&amp;nbsp; CLI command PAN&amp;gt; show session id XYZ&amp;nbsp;&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; to get detailed information about that session, &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-family: inherit; font-size: 10pt; font-style: inherit; font-weight: inherit; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i.e&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit; font-size: 10pt; font-style: inherit; font-weight: inherit; line-height: 1.5em;"&gt; NAT rule, security rule, ingress/egress interface etc.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2014 19:50:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-4500-ipsec-udp-traffice/m-p/38896#M28525</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-05T19:50:11Z</dc:date>
    </item>
  </channel>
</rss>

