<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: First Packet isn't SYN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223664#M42907</link>
    <description>&lt;P&gt;There are many different factors as to why people may see that message, I wont go into them now, but in all honesty, me personally, I always found that best thing to do is run fw monitor and see where packet is going, thats always best way to trace the traffic.&lt;/P&gt;
&lt;P&gt;Anti-spoofing sometimes has to be turned off for totally different reason.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Wed, 14 Aug 2024 14:55:40 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-08-14T14:55:40Z</dc:date>
    <item>
      <title>First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193326#M35916</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have looked through similiar post here but it is not exactly the same problem, I wanted to open a post.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The 192.168.100.0/24 network is constantly generating traffic. I know this traffic (SCADA generated). I blocked this 192.168.100.0/24 network by writing&amp;nbsp; a rule from the firewall and&amp;nbsp; did not wan to log. I left it as NONE.&lt;/P&gt;&lt;P&gt;But when I look at logs on the firewall, it shows as a drop but it does not match my rule. Anr rule drops without matching. Too many logs are generated. How can I drop this traffic and make it not keep logs?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Screenshot of a log record.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fECYroZA0o.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22534i7EDA8BAF5E4859C0/image-size/large?v=v2&amp;amp;px=999" role="button" title="fECYroZA0o.png" alt="fECYroZA0o.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 10:59:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193326#M35916</guid>
      <dc:creator>ikafka</dc:creator>
      <dc:date>2023-09-22T10:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193397#M35930</link>
      <description>&lt;P&gt;You can disable these logs via:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk102491" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk102491&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 23:37:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193397#M35930</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-22T23:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193398#M35931</link>
      <description>&lt;P&gt;In layman's terms, all that error means, regardless of the firewall vendor used, is literally that 3 way handshake is not completing, why, thats another question. You need to run tcpdump and fw monitor to find out.&lt;/P&gt;
&lt;P&gt;To help with the flags, check out this site my colleague made while back, it gives you the command you can copy directly based on the filter (it also uses multiple vendors)&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.tcpdump101.com" target="_blank"&gt;www.tcpdump101.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 23:54:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193398#M35931</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-22T23:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193575#M35970</link>
      <description>&lt;P&gt;Thank you for this site. It is a very nice and useful site.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 11:35:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193575#M35970</guid>
      <dc:creator>ikafka</dc:creator>
      <dc:date>2023-09-26T11:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193576#M35971</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;for your replying. I set it to not log. Sometimes it is necessary to look at such logs. I can open it again when necessary.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 11:37:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193576#M35971</guid>
      <dc:creator>ikafka</dc:creator>
      <dc:date>2023-09-26T11:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193591#M35973</link>
      <description>&lt;P&gt;I have experienced this before and every single time, it had to do with&amp;nbsp;asymmetric routing. SYN packet reached the destination host without going through the firewall and SYN-ACK was returning through the firewall.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 15:36:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193591#M35973</guid>
      <dc:creator>Zolocofxp</dc:creator>
      <dc:date>2023-09-26T15:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193592#M35974</link>
      <description>&lt;P&gt;Super useful...my colleague made that in his free time over the years.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 15:41:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193592#M35974</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-26T15:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193593#M35975</link>
      <description>&lt;P&gt;What you said is literally the case 99% of the time.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 15:41:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/193593#M35975</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-26T15:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/222544#M42649</link>
      <description>&lt;P&gt;Hello Team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need help for this issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;First Packet isn't SYN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;but my case is different because while dropping the packets can not see for which rule it is hitting.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;i have attached the documents with issue.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2024 07:03:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/222544#M42649</guid>
      <dc:creator>Manish_NCS</dc:creator>
      <dc:date>2024-08-02T07:03:25Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/222572#M42659</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/115181"&gt;@Manish_NCS&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to do what was discussed in the post. Please ensure routing is 100% correct, and also run some basic captures to make sure traffic is ineeed taking the right path. You can refer to syntax from the site my colleague made while back.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tcpdump101.com/#" target="_blank" rel="noopener"&gt;https://tcpdump101.com/#&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Alternatively, you can use fw monitor -F flag as well. Say fw monitor -F "srcIP,srcport,dstIP,dstport,protocol" and so on, many option are available the other way around, so ie:&lt;/P&gt;
&lt;P&gt;fw monitor -F "1.1.1.1,4434,2.2.2.2,4434,0" -F "2.2.2.2,4434,1.1.1.1,4434,0"&lt;/P&gt;
&lt;P&gt;Protocol can always be 0 and srcport can be 0, as we all know src port is totally irrelevant, what matters is dst port.&lt;/P&gt;
&lt;P&gt;If you need help, message me directly.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2024 12:57:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/222572#M42659</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-02T12:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/222668#M42701</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;&lt;P&gt;actually, my case is different and there is no routing issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;let me explain more about this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;the IP 192.168.1.1 is the client IP address and 192.168.1.100 is the EDR IP address.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have already allow one rule from 192.168.1.1 to 192.168.1.100 so now the user I can see on my EDR for the receiving logs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;the problem is there is no rule from 192.168.1.100 to 192.168.1.1, but still there is many drops' logs between. which I have attached the screenshot.&amp;nbsp;&lt;/P&gt;&lt;P&gt;recently i also updated my hotfix from 58 to 99 , but still the same and I am using R81.0 Version.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2024 01:58:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/222668#M42701</guid>
      <dc:creator>Manish_N</dc:creator>
      <dc:date>2024-08-05T01:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/222719#M42706</link>
      <description>&lt;P&gt;That would definitely NOT be routing issue, agree, as its on the same subnet, so no need for default gateway, as it would be able to arp for each other's MAC address. Maybe you need to check if there is some sort of software installed thats causing that behavior...&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2024 10:28:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/222719#M42706</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-05T10:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223173#M42790</link>
      <description>&lt;P&gt;Still not understanding my point.&lt;/P&gt;&lt;P&gt;The source ip is 10.144.23.5(user Machine )and destination ip is 10.92.56.5(EDR Server)&lt;/P&gt;&lt;P&gt;For this there is rule for 443 and and on edr we can see the user.&lt;/P&gt;&lt;P&gt;My question why from 10.92.56.5 to 10.144.23.5 there are so many drop packets hitting -- for this there is no rule but still there are so many drop packets.&lt;/P&gt;&lt;P&gt;I hope now u are understanding my point.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2024 16:22:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223173#M42790</guid>
      <dc:creator>Manish_N</dc:creator>
      <dc:date>2024-08-09T16:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223174#M42791</link>
      <description>&lt;P&gt;Simple network diagram would help. Otherwise, I will just be wild guessing here. First off, you need rule if we are talking different networks, which we definitely are. Second. if you are seeing drops, you need to do basic zdebug and also tcpdump/fw monitor and it will certainly give you better idea.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2024 16:29:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223174#M42791</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-09T16:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223512#M42863</link>
      <description>&lt;P&gt;First packet isn't SYN is not a routing problem. These errors appear in the log as a result of poorly terminated / unterminated connections on the client side or on the server side (it is a basic inspection of the protocol on the gateway, whether TCP behaves according to the RFC and the TCP 3-way handshake is checked, or the connection from establishment to termination and the entire process including the correct sequences) this usually happens if the client tries to connect to a connection that no longer exists in the connection table on the gateway, because there was no termination. Unfortunately, there are archaic applications that cannot do business with the TCP 3-way handshake and an exception must be made for them (I met such an application not long ago) on versions before R8X, the exception was solved using user.def on the SMC server, since R8X versions I guess it can also be done in the inspection settings via the smart console. Of course&lt;BR /&gt;Routing problems, or if asymmetric routing writes spoofing detection into the log, and depending on the settings on the incoming interface, such traffic is either discarded or only detected and allowed, of course if logging is enabled on the interface in the topology.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 14:40:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223512#M42863</guid>
      <dc:creator>Itall</dc:creator>
      <dc:date>2024-08-13T14:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223522#M42866</link>
      <description>&lt;P&gt;I see what you mean, thats valid, but I would not agree with the statement its not a routing problem. From my experience and having been around CP for quite a while, I can tell you this sort of issue turns out to be routing problem at LEAST 70% of the time.&lt;/P&gt;
&lt;P&gt;Of course, every instance is different, but captures would always confirm that.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 15:32:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223522#M42866</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-13T15:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223662#M42906</link>
      <description>&lt;P&gt;So, if we are talking about environments where administrators have anti-spoofing turned off, or have anti-spoofing in detect mode without logging, because they are lazy to straighten out routing, then of course the first packet isn't SYN with a drop action can also occur, because there the asymmetry is.&lt;/P&gt;&lt;P&gt;In an environment where the anti-spoofing technique is used in the prevent-log mode, the first indication of asymmetry in routing is a record of spoofing in the log. If the routing is correct in such an environment, it is one of the possibilities (I have encountered all the possibilities from the experience of the NGX R65 version that I started with to the current R81.20):&lt;BR /&gt;1/ client - server - application is not TCP RFC compliant (as I wrote)&lt;BR /&gt;2/ a defect on the gateway side (CheckPoint already had several such fixes in the past - the last one I experienced related to VPN routing, which cannot be configured too asymmetrically from the administrator's point of view)&lt;BR /&gt;3/ transfer of ClusterXL active/standby operation with missed synchronization of connection tables&lt;BR /&gt;4/ sometimes the installation of the policy will do it, if the gateway is heavily loaded and the ClusterXL active/standby flaps, again with missed synchronization of the connection tables (I experienced a few years ago with a cluster on appliances that were in a test environment, they were permanently loaded between 50 - 70%. Limited investment in the company).&lt;/P&gt;&lt;P&gt;I guess I didn't fully understand the questioner. I assumed that the questioner has the basic anti-spoofing functionality active (then it would turn out to be spoofing). Compared to competitors, Checkpoint does not play on security and RFC, but actually uses it. That's why I like CheckPoint first in the portfolio of next gen firewalls.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 14:36:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223662#M42906</guid>
      <dc:creator>Itall</dc:creator>
      <dc:date>2024-08-14T14:36:45Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223664#M42907</link>
      <description>&lt;P&gt;There are many different factors as to why people may see that message, I wont go into them now, but in all honesty, me personally, I always found that best thing to do is run fw monitor and see where packet is going, thats always best way to trace the traffic.&lt;/P&gt;
&lt;P&gt;Anti-spoofing sometimes has to be turned off for totally different reason.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 14:55:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223664#M42907</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-14T14:55:40Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223699#M42914</link>
      <description>&lt;P&gt;Neither anything nor anywhere! If the routing is fine, then there is no need to turn off anti-spoofing !! There is no risk or situation that would trigger a blocking situation based on spoof detection! This is just a stupid habit of, for example, Cisco ASA administrators, where it is not played with. If you experienced the necessity of turning off the spoof check, then there was definitely an asymmetry in your network! It's very simple, if I have an interface in the topology where it is 192.168.22.0/24 and the IP 10.10.22.11 wants to communicate from it, it's wrong and if the firewall/network manager allows this, it's a troll, nothing more, nothing less!&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 00:55:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223699#M42914</guid>
      <dc:creator>Itall</dc:creator>
      <dc:date>2024-08-15T00:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: First Packet isn't SYN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223701#M42915</link>
      <description>&lt;P&gt;Yes but it is not allowed but still why there are the first TCP packets is not sync there as drop.&lt;/P&gt;&lt;P&gt;So many drops are there. Specially between these subnet.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 02:18:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-Packet-isn-t-SYN/m-p/223701#M42915</guid>
      <dc:creator>Manish_N</dc:creator>
      <dc:date>2024-08-15T02:18:26Z</dc:date>
    </item>
  </channel>
</rss>

