<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ClusterXL issue with MDPS enabled in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267648#M52933</link>
    <description>&lt;P&gt;I even had client do below on both firewalls on dplane, rebooted, no change:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Add mdps task port 8116 protocol udp&lt;/P&gt;</description>
    <pubDate>Fri, 16 Jan 2026 19:43:32 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-01-16T19:43:32Z</dc:date>
    <item>
      <title>ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267496#M52872</link>
      <description>&lt;P&gt;Hey guys,&lt;/P&gt;
&lt;P&gt;I really hope someone might be able to give some sigguestion/opinion on this, as to me, it makes no logical sense why this fails...could be because of mdps, not really sure. Anyway, to make long story short, customer is replacing their existing 4 15000 fws with new 4 9700 devices (2 separate clusters). We did migrate export from existing mgmt, imported to new one, connected both new clusters, built basic policy after setting up mdps, with ONLY 2 interfaces active (mgmt and sync).&lt;/P&gt;
&lt;P&gt;But, here is the problem. Though policy is fine, when installed, only fw1 sdhows as active and fw is down (same on both clusters). We just assigned 169.254.x.x IPs as sync, since customer wanted to give it IP from same mgmt subnet, but that cannot work.&lt;/P&gt;
&lt;P&gt;Oddly enough, pings to sync IP work from both members, but fw2 always shows as down...we tried cphastop; start, cprestart, reboot,. disable/re-enable cluster, no dice.&lt;/P&gt;
&lt;P&gt;Worked with TAC, they kept telling us its layer 2 iussue, but I cant really understand how that can be the problem. Client even verified everything on of their Fortigates as well, all is allowed and even he was surprised they were "forcing" layer 2 argument.&lt;/P&gt;
&lt;P&gt;Thoughts?&lt;/P&gt;
&lt;P&gt;Thanks as always!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled picture.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32737iC701C99C25EEB699/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Untitled picture.png" alt="Untitled picture.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Sat, 17 Jan 2026 12:56:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267496#M52872</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-17T12:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267497#M52873</link>
      <description>&lt;P&gt;sorry for n00b like questions:&lt;BR /&gt;&lt;BR /&gt;Both show themselves as active and mate as down?&lt;BR /&gt;Ping works and arp entry of mate present?&lt;BR /&gt;No drops in fw ctl zdebug + drop seen?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 16:14:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267497#M52873</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-15T16:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267500#M52874</link>
      <description>&lt;P&gt;Those are valid questions, Vince. So, fw2 member ALWAYS shows as down, just fw1 as active and if you try failover, same thing. Ping works and arp is fine and yes, no zdebug drops seen.&lt;/P&gt;
&lt;P&gt;Oddly enough, even policy itself allows all communication between clusters, as well as access from internal networks. Its 3 rules in network layer and 2 in urlf layer, thats it.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 16:24:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267500#M52874</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-15T16:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267501#M52875</link>
      <description>&lt;P&gt;Maybe some cluster kernel debugs shows something interesting?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_NextGenSecurityGateway_Guide/Topics-FWG/Kernel-Debug/Module-cluster.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_NextGenSecurityGateway_Guide/Topics-FWG/Kernel-Debug/Module-cluster.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 16:32:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267501#M52875</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-15T16:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267502#M52876</link>
      <description>&lt;P&gt;I should probably ask TAC about it. Problem is that since these are brand new fws, they are not in production yet, so I dont want customer to lose access to them via ssh, since they are located in another wing of the hospital and he does not have console access, so could be tough to reconnect if that happened.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 16:35:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267502#M52876</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-15T16:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267509#M52878</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&lt;SPAN&gt;... built basic policy after setting up mdps, with ONLY 2 interfaces active (mgmt and sync).&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This sounds like a problem. Management and sync are both typically on the mplane namespace, so your dplane namespace has no interfaces to do CCP heartbeats. The dplane namespace isn't getting CCP from the peer, so I would expect it to want to be down.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 17:34:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267509#M52878</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-01-15T17:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267511#M52879</link>
      <description>&lt;P&gt;Hey Bob,&lt;/P&gt;
&lt;P&gt;Im not at all familiar with MDPS myself, but to me, logically anyway, seems that Sync would be on dplane, since thats how we did IP change from clish, since web UI is not available once we install policy.&lt;/P&gt;
&lt;P&gt;This is what TAC gave us to configure initially.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Segoe UI'; font-size: 11.0pt;"&gt;set mdps interface Sync sync on&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Segoe UI'; font-size: 11.0pt;"&gt;set mdps interface Mgmt management on&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Segoe UI'; font-size: 11.0pt;"&gt;set mdps mgmt plane on&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Segoe UI'; font-size: 11.0pt;"&gt;set mdps resource cpus 4&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Segoe UI'; font-size: 11.0pt;"&gt;set mdps mgmt resource on&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 17:44:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267511#M52879</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-15T17:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267512#M52880</link>
      <description>&lt;P&gt;Just researched the web and what you stated seems to be valid.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 17:52:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267512#M52880</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-15T17:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267514#M52881</link>
      <description>&lt;P&gt;Seems like it, yes. But, here is my question...can we somehow make this work in the meantime with below config?&lt;/P&gt;
&lt;P&gt;set mdps interface Sync sync on&lt;/P&gt;
&lt;P&gt;set mdps interface Mgmt management on&lt;/P&gt;
&lt;P&gt;set mdps mgmt plane on&lt;/P&gt;
&lt;P&gt;set mdps resource cpus 4&lt;/P&gt;
&lt;P&gt;set mdps mgmt resource on&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 18:19:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267514#M52881</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-15T18:19:09Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267515#M52882</link>
      <description>&lt;P&gt;I wonder if there might be a way to temporarily config an interface to have one active interface in the Dplane, even by configuring a temporary isolated VLAN on the attached switches?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 18:40:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267515#M52882</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-15T18:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267517#M52883</link>
      <description>&lt;P&gt;I can ask them, though not sure that might be doable atm. Currently, sync is simply connected with straight thru cable, no switch involved.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 18:42:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267517#M52883</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-15T18:42:38Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267518#M52884</link>
      <description>&lt;P&gt;On all of my clusters with working MDPS, the management and sync interfaces are owned by the mplane namespace (like VSID 0). The dplane namespace (functionally VSID 1) has all the other interfaces.&lt;/P&gt;
&lt;P&gt;The separation is whether the interface is for traffic the member should send/receive for itself, versus traffic the cluster should carry for other endpoints. The member sends/receives sync traffic for itself, so that goes in mplane.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 18:46:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267518#M52884</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-01-15T18:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267519#M52885</link>
      <description>&lt;P&gt;In the meantime, with the config I sent, is there any way to make this work or you dont think so?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 18:48:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267519#M52885</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-15T18:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267520#M52886</link>
      <description>&lt;P&gt;I am not familiar with mdps as well but you may ask tac if you can start with standard cluster and later enable it again?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 18:57:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267520#M52886</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-15T18:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267521#M52887</link>
      <description>&lt;P&gt;Let me see what TAC says. I gave them all the info I have.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 18:58:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267521#M52887</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-15T18:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267522#M52888</link>
      <description>&lt;P&gt;I don't think there's a way to get it to go Active/Standby like this, but with no data interfaces, the cluster state seems irrelevant. Could be considered a cosmetic issue for now.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 19:01:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267522#M52888</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-01-15T19:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267523#M52889</link>
      <description>&lt;P&gt;Forgive me for my ignorance, as I dont know much about how mdps works, but itns technically Sync dplane in this case? I say that since ONLY way to change IP was to make sure we were in dplane, rather than mplane.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 19:08:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267523#M52889</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-15T19:08:52Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267525#M52890</link>
      <description>&lt;P&gt;Thats where Im not clear, because to me, seems Sync would be on dplane...&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2026 19:45:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267525#M52890</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-15T19:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267567#M52904</link>
      <description>&lt;P&gt;Good day!&lt;/P&gt;&lt;P&gt;The one thing that draw my attention is the APIPA address used for the Sync interface. An intuition told me that most probably you cannot use APIPA as a static address for Sync.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Quick check in a Lab shows that indeed we have ACTIVE/DOWN only because of the IP-addresses.&lt;/P&gt;&lt;P&gt;I have changed eth4-1(used for Sync) IP-address from&lt;/P&gt;&lt;P&gt;172.16.18.1/24 (23800_1) and 172.16.16.2/24 (23800_2)&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;169.254.1.50/24 (23800_1) and 169.254.1.51 (23800_2)&lt;/P&gt;&lt;P&gt;As a result, I got Active/Down from both ends after cpstop/cpstart. Your problem is replicated successfully. There is no MPDS used at all.&lt;/P&gt;&lt;DIV class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ClusterXL_2026-01-16 124106.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32740iB6E6DDEF305BBB7F/image-size/large?v=v2&amp;amp;px=999" role="button" title="ClusterXL_2026-01-16 124106.png" alt="ClusterXL_2026-01-16 124106.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;P&gt;RFC 3927 states that 169.254.0.0/16 network is for automatic IP-address configuration. I may guess that Checkpoint follows the guideline and doesn't allow to configure an IP-address from this range manually.&lt;BR /&gt;Similar point is stated in&amp;nbsp;sk179028&lt;/P&gt;&lt;P&gt;These IP subnets are reserved (you cannot use them in the CIN IP ranges):&lt;/P&gt;&lt;P&gt;0.0.0.0 / 8&lt;BR /&gt;127.0.0.0 / 8&lt;BR /&gt;&lt;STRONG&gt;169.254.0.0 / 16&lt;/STRONG&gt;&lt;BR /&gt;192.0.2.0 / 24&lt;BR /&gt;224.0.0.0 / 4&lt;BR /&gt;203.0.113.0 / 24&lt;/P&gt;&lt;P&gt;Please, send my best regards to TAC engineers and don't make any unnecessary actions until you try to assign non-APIPA address for the Sync!&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2026 09:43:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267567#M52904</guid>
      <dc:creator>Gennady</dc:creator>
      <dc:date>2026-01-16T09:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL issue with MDPS enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267577#M52907</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/33946"&gt;@Gennady&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would have to disagee with that statement and here is why I say that. I had used 169.254.x.x range many times in the lab for sync, never had an issue. Had who knows how many customers do the same, always worked like a charm. As a matter of fact, we did try use different subnet for sync, had exact same problem, so Im fairly positive problem is something with mdps, I just cant figure out what exactly.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2026 12:17:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-issue-with-MDPS-enabled/m-p/267577#M52907</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-16T12:17:10Z</dc:date>
    </item>
  </channel>
</rss>

