<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking &amp; AV in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47565#M34968</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Farrel...Thank you for being a customer!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Dec 2011 20:37:54 GMT</pubDate>
    <dc:creator>rmonvon</dc:creator>
    <dc:date>2011-12-07T20:37:54Z</dc:date>
    <item>
      <title>Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47559#M34962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - we current;y have our PA4050s in aleret mode only on every rule for AV. If we device to turn this to Block for specific rules - what does this actually do if it identifies a virus? Cheers. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2011 17:27:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47559#M34962</guid>
      <dc:creator>fmd</dc:creator>
      <dc:date>2011-12-05T17:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47560#M34963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it's a download, the transmission will be blocked and the user will see the block page which you can customize.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The box can also block virus data. In other words data farmed by viruses and sent to the web or to other machines. This will be blocked too but the user will not see anything.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2011 17:50:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47560#M34963</guid>
      <dc:creator>jhickey</dc:creator>
      <dc:date>2011-12-05T17:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47561#M34964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you choose the 'default' AV profile, we will block the content when a virus is detected.&amp;nbsp; We will continue to alert for virus detected in SMTP, IMAP, and POP3 because we are not a mail proxy/relay.&amp;nbsp; If the virus is detected over HTTP, then we will serve the AV block page.&amp;nbsp; For other traffi like FTP, then we will reset the connection to prevent the transmission of the virus.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2011 22:37:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47561#M34964</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2011-12-05T22:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47562#M34965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;many thanks for your replies. In more detail we have&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CLIENT HTTPs &amp;lt;-----&amp;gt; (ssl termination)ASA&amp;lt;-------PALO ALTO---------&amp;gt;HTTP to web server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Would the block page get served the end client successfully?&lt;/P&gt;&lt;P&gt;2. All the traffic to the web server comes from the same source IP address on the ASA for all clients - will the Palo Alto understand that?&lt;/P&gt;&lt;P&gt;3. Would this block all traffic from the client (ie. if they started another http session that was clean - would that get through?).&lt;/P&gt;&lt;P&gt;4. So if all traffic comes from a source of the ASA - would a block kill ALL traffic from the ASA to the webserver (as all is coming from the same source IP of the ASA)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully someone can help!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Dec 2011 16:38:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47562#M34965</guid>
      <dc:creator>fmd</dc:creator>
      <dc:date>2011-12-07T16:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47563#M34966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My comments inline:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Would the block page get served the end client successfully?&lt;/P&gt;&lt;P&gt;Yes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; All the traffic to the web server comes from the same source IP address&amp;nbsp; on the ASA for all clients - will the Palo Alto understand that?&lt;/P&gt;&lt;P&gt;Yes, the Palo Alto device is stateful and will take action only on the HTTP session where the virus was detected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; Would this block all traffic from the client (ie. if they started&amp;nbsp; another http session that was clean - would that get through?).&lt;/P&gt;&lt;P&gt;A new HTTP session will contain new TCP session #, and the Palo Alto will treat it as a new connection.&amp;nbsp; The new connection will be protected but not block unless it contains a malware.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.&amp;nbsp; So if all traffic comes from a source of the ASA - would a block kill&amp;nbsp; ALL traffic from the ASA to the webserver (as all is coming from the&amp;nbsp; same source IP of the ASA)?&lt;/P&gt;&lt;P&gt;No, the block will affect only that specific HTTP connection while other connections will continue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Dec 2011 17:44:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47563#M34966</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2011-12-07T17:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47564#M34967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;rmonvon - many thanks. This clarifies for me - and worked as I had envisaged - only the TCP session in question and not all TCP sessions will be affected (my only worry was that all TCP sessions are from the same source - but you have made it clear that all other TCP sessions would be unaffected!). Thanks again! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Dec 2011 20:10:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47564#M34967</guid>
      <dc:creator>fmd</dc:creator>
      <dc:date>2011-12-07T20:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47565#M34968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Farrel...Thank you for being a customer!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Dec 2011 20:37:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47565#M34968</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2011-12-07T20:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47566#M34969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - just ressurecting this one!! We have implimented the block on AV for a specific rule for some browser based traffic and the PA log shows that we have a "deny" for the Eicar test file - but the end user never gets the response page. As stated before we have client connecting over SSL VPN to an ASA - all traffic comes from the source IP of the ASA. The PA then sits in front of the end web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice!!?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 17:34:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47566#M34969</guid>
      <dc:creator>fmd</dc:creator>
      <dc:date>2012-02-02T17:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47567#M34970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the user have rights to hit the block page over their VPN connection ? Can they route to it ? Browse to it ? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 17:39:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47567#M34970</guid>
      <dc:creator>jhickey</dc:creator>
      <dc:date>2012-02-02T17:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47568#M34971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've not tested this with no ASA in the way. So we have client-----Palo-----Web server with the same result. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The clients connect to the web server on a non-standard port. The rule is set to block on virus. They connect and authenticate to the page fine - then go to a page which has a "browse" button to load the Eicar file onto the site. The page hangs - but no block page is presented to the client. The PA shows that the Eicar virus was detected and blocked. So end to end it's working - they just never get the block page.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 16:05:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47568#M34971</guid>
      <dc:creator>fmd</dc:creator>
      <dc:date>2012-02-03T16:05:26Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47569#M34972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you test without the VPN tunnel to see if the AV block page is served.&amp;nbsp; Have a user connect thru the PAN firewall and retrieve the eicar file.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 16:10:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47569#M34972</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-02-03T16:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47570#M34973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - as stated in my last post. We've now done this with the same client but they are now sat in the office the Palo Alto is also in the same office - just an internal router hop away - so they are NOT going via the ssl vpn solution and we get the same result. It's would take a bit more effort to get the file onto the web servers to retrive the other way (I don't personally have access to them - and neither does the client who is testing).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 16:27:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47570#M34973</guid>
      <dc:creator>fmd</dc:creator>
      <dc:date>2012-02-03T16:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47571#M34974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you confirm the traffic is web browsing when the eicar file is retrieved.&amp;nbsp; Make sure the file is served up via HTTP then we can inject the AV block page.&amp;nbsp; Web servers can be configured to serve up files via SMB/NETBIOS instead of HTTP.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 16:57:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47571#M34974</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-02-03T16:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47572#M34975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - just resurrecting this query as it's still outstanding. When I do a wireshark trace on the client and upload the file from my client to the end server - I can see the http 503 page with the "AV blocked" message (from the Palo Alto) being sent from the end server IP back to my client (along the TCP session that the Eicar virus is found in). However, I never see it in the browser.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Feb 2012 23:15:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47572#M34975</guid>
      <dc:creator>fmd</dc:creator>
      <dc:date>2012-02-27T23:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47573#M34976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you're seeing the 503 AV block page, then the PA device is sending the bloack page as designed.&amp;nbsp; However, it appears you're testing the upload of the virus instead of a download.&amp;nbsp; You should see the AV block page on a download.&amp;nbsp; In an upload (i.e. HTTP POST), you may not see the block page.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Feb 2012 04:04:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47573#M34976</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-02-28T04:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47574#M34977</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like a browserbug because an HTTP error should be displayed for the client even when using POST wouldnt it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Feb 2012 08:06:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47574#M34977</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-02-28T08:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47575#M34978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for replying! So are we saying that if it's an upload to a website we won't see the Block page! But if it's a download we would?! I've tried this in IE and FF and the same result so it doesn't appear to be down to the browser. It's not my area of expertise but I would have expected a block page to appear regardless of the direction of the file up/down?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Feb 2012 10:38:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47575#M34978</guid>
      <dc:creator>fmd</dc:creator>
      <dc:date>2012-02-28T10:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47576#M34979</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;a further question about AV - I applied a profile that had "action=block" for POP3 and IMAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;whilst the policy does detect the Eicar virus in incoming emails, in the case of POP3 it drops the session when the user tries to download his mail, with no notification to the end-user.&amp;nbsp; Because of the way POP3 works, he then can't receive any further mails until the infected mail is manually removed from his inbox - so the "block" action for POP3 is effectively unusable (IMAP is similarly opaque but at least the end user can delete the offending mail themselves)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any plans to improve this function? - I appreciate the PAN firewall is not a proxy but most other firewalls I've used that offer email AV just strip out the infected attachment allowing the overall POP3 transaction to complete, whereas PAN's implementation breaks the protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Liam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2012 12:07:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47576#M34979</guid>
      <dc:creator>LCMember2860</dc:creator>
      <dc:date>2012-03-02T12:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47577#M34980</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Liam...As you described, if we strip the infected attachment in an email, we would need to inject a notice in the email to notify the recipient.&amp;nbsp; Also, we would have to store the infected attachment somewhere so the admin can analyze it, or allow the recipient to overide &amp;amp; download.&amp;nbsp; This would require a lot more resource (disk space, individual user accts, etc) on the PA device.&amp;nbsp;&amp;nbsp; Hence, at this time we do not plan on supporting SMTP proxy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Mar 2012 15:58:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47577#M34980</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-03-03T15:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking &amp; AV</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47578#M34981</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will the PAN send a TCP-RST or FIN-ACK when a POP3 msg is detected containing malware?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not... wouldnt it be possible if the PAN just block the download and when the client restarts it (within the same TCP session) the PAN would just return a "-ERR message infected" or similar so the client can continute with next message (depending on email client used)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A wellwritten email client would then just continue with the other messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.ietf.org/rfc/rfc1939.txt"&gt;http://www.ietf.org/rfc/rfc1939.txt&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Mar 2012 21:48:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-av/m-p/47578#M34981</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-03-03T21:48:47Z</dc:date>
    </item>
  </channel>
</rss>

