<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISP redundancy in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99614#M7779</link>
    <description>&lt;P&gt;thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 20 Oct 2020 15:34:37 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2020-10-20T15:34:37Z</dc:date>
    <item>
      <title>ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99120#M7746</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had some questions about ISP redundancy in R80. I know its not that different than previous versions, but its been awhile since I troubleshot it and was wondering if someone could confirm below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a customer with single R80.30 gateway managed by R80.30 mgmt server and they just set up 2nd ISP link, so they are wanting to implement isp redundancy. BEFORE enabling it in dashboard, can someone answer the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-what routing changes would need to be made?&lt;/P&gt;&lt;P&gt;-what about policy routing?&lt;/P&gt;&lt;P&gt;-do any dns changes have to be done via cli or web GUI?&lt;/P&gt;&lt;P&gt;-how would client to site and site to site vpn work when primary isp link fails? Any changes have to be done on the tunnels prior to enabling isp redundancy?&lt;/P&gt;&lt;P&gt;-would it affect any gateways with 3rd party certificates?&lt;/P&gt;&lt;P&gt;Also, I did not really find any good isp redundancy document, aprt paragraph from R80.40 admin guide.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 15:07:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99120#M7746</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2020-10-14T15:07:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99153#M7750</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-what routing changes would need to be made?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Normally nothing, the routing configuration via two default gateways (your ISPs) will be done via SmartConsole.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-what about policy routing?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;PBR with ISP redundancy is supported starting from R80.30.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-do any dns changes have to be done via cli or web GUI?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;You can rewrite DNS-requests, configuration will be done via SmartConsole (DNS-proxy)&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-how would client to site and site to site vpn work when primary isp link fails? Any changes have to be done on the tunnels prior to enabling isp redundancy?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;You can use both ISP links for your VPN, in load sharing or HA mode. Settings for these VPN connections are configured via VPN link selection.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;-would it affect any gateways with 3rd party certificates?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Can you explain this to understand your needs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good documentation will be the old one for R77.30 to understand the concept and configuration&lt;/P&gt;
&lt;P&gt;&lt;A href="https://dl3.checkpoint.com/paid/b9/b9bfd302455666c6ff21a42f6cb5531e/How_To_Configure_ISP_Redundancy.pdf?HashKey=1602749777_8c5f927dd23c42c69f337db22ee15d1e&amp;amp;xtn=.pdf" target="_self"&gt;HOW TO CONFIGURE ISP REDUNDANCY IN NGX R65 - R77.30 VERSIONS&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;and these sk&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk34812" target="_blank" rel="noopener"&gt;ISP Redundancy configuration&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk23630" target="_blank" rel="noopener"&gt;Advanced configuration options for ISP Redundancy&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 06:30:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99153#M7750</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-10-15T06:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99206#M7755</link>
      <description>&lt;P&gt;Thanks a lot for that Wolfgang, appreciated. Just to clarify some poinhts I made (sorry for not being more clear about them). Below are actual questions customer asked me:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-What has to be done in configuration to ensure IPSEC Office Mode Tunnels and the SSL VPN Mobile client will work on both interfaces?&lt;/P&gt;&lt;P&gt;-What additional DNS configuration needs to be done in the Checkpoint Redundancy configuration to ensure the firewall resolves the interfaces with no issue.&lt;/P&gt;&lt;P&gt;-a capture of any other configurations that we have not yet discussed above that need to be changed.&lt;/P&gt;&lt;P&gt;I know for VPN, there is a setting under isp redundancy page in dashboard to "apply settings to vpn", which I read would mean it overrides existing link selection settings, but I believe thats what most customers would want anyway, specially in case like this, where main link is fiber 1 GB connection and backup is only 20 MB. For dns, I dont think they need to change actual dns servers. but the dns proxy setting says its if you have servers that are accepting incoming connections, then needs to be configured.&lt;/P&gt;&lt;P&gt;Dont worry about my certificate question, as Im sure that does not apply to ips redundancy. He was more asking me that if they use 3rd party cert for mobile access or https inspection if that would be affected, but Im pretty sure it would not be.&lt;/P&gt;&lt;P&gt;Also, for policy based routing, I do see in my lab it gives you options to set up the routes, but based on priorities and interfaces, NOT actual isp link, but corretc me if Im wrong, you can simply choose interface corresponding to the isp link to reflect that route, correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again, thanks for the response!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 12:34:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99206#M7755</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2020-10-15T12:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99540#M7770</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;default configuration in ISP redundancy is HA-mode. One ISP is active and the other in standby. All connections (include site2site and remote access VPN) are sent and received via the active ISP.&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk116772" target="_self"&gt;ISP Redundancy "Apply settings for VPN traffic" is not working with 3rd party vendors&lt;/A&gt;&amp;nbsp; shows a good example what means the setting "apply to vpn ...."&lt;/P&gt;
&lt;P&gt;Rewriting DNS will be necessary only if you have internal servers they are reachable via external DNS-names. If your main ISP link is failing these DNS names are pointing to not reachable IP-addresses. This has to be changed to addresses for your backup ISP.&lt;/P&gt;
&lt;P&gt;IPSEC-Tunnel beetween CheckPoint gateways are no problem with ISP redundancy. They do RDP-probing ( Check Points own probing protocol) to test connectivity to all available interfaces. In HA configuration the active ISP is used first. Same apply to remote access VPN clients.&lt;/P&gt;
&lt;P&gt;Policy based routing and ISP-redundancy does not work together. Meaning you can use both together but they don't interact. Configure host probing for your PBR routes to check the availability of the ISP-links.&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 07:08:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99540#M7770</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-10-20T07:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99571#M7774</link>
      <description>&lt;P&gt;Hi Wolfgang,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks, but Im still confused about your last point. You said isp redundancy is supported with policy based routing in R80.30, but in sk about pbr on support site it says it not. Which is true??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 10:29:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99571#M7774</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2020-10-20T10:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99597#M7777</link>
      <description>&lt;P&gt;Also, not sure what host probing you are referring to for PBR...can you elaborate?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 13:41:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99597#M7777</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2020-10-20T13:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99613#M7778</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you an configure a host to be "monitored" via ping.&amp;nbsp; You should configure two IPs, each one from one of the ISPs.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BFD_PBR_1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8511iEFE5BA2B1A7E67A5/image-size/large?v=v2&amp;amp;px=999" role="button" title="BFD_PBR_1.png" alt="BFD_PBR_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And then these IPs can be used to be monitored in your PBR configuration. You have to configure two routes with different priorities.&lt;/P&gt;
&lt;P&gt;If a monitored host answeres the ping, this route will be active and used regarding the configured priority. If your primary ISP will fail, the ping test to the monitored host fails too and the second route entry will be used.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BFD_PBR_2.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8512iDA08CA4CCA69E2BF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="BFD_PBR_2.png" alt="BFD_PBR_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Hope, this makes the PBR with more then one ISP understandable.&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;
&lt;P&gt;PS: snip from the what's new section R80.30&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="BFD_PBR_3.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8513i0237CC968EA7E669/image-size/medium?v=v2&amp;amp;px=400" role="button" title="BFD_PBR_3.png" alt="BFD_PBR_3.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 15:26:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99613#M7778</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-10-20T15:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99614#M7779</link>
      <description>&lt;P&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 15:34:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99614#M7779</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2020-10-20T15:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99621#M7780</link>
      <description>&lt;P&gt;Hello &lt;SPAN&gt;Wolfgang&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Can you explain more "&lt;SPAN&gt;PBR with ISP redundancy is supported starting from R80.30."&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Because in the sk&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100500&amp;amp;partition=Basic&amp;amp;product=Security" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100500&amp;amp;partition=Basic&amp;amp;product=Security&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;is not supported. And in my tests it did not work (nat hide was not&amp;nbsp; applied correctly for PBR routed connections...)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 17:04:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99621#M7780</guid>
      <dc:creator>Eduardo_Eiros</dc:creator>
      <dc:date>2020-10-20T17:04:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99627#M7781</link>
      <description>&lt;P&gt;Good point Eduardo...I was wondering that exact same thing as well.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 17:37:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99627#M7781</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2020-10-20T17:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99628#M7782</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5029"&gt;@Eduardo_Eiros&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please check your NAT rules. You have to use an automatic NAT rule with „hide behind gateway“ enabled.&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 17:52:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99628#M7782</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-10-20T17:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99631#M7783</link>
      <description>&lt;P&gt;Tagging&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;to get some clarification.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100500" target="_blank" rel="noopener"&gt;Policy-Based Routing (PBR) on Gaia OS&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: #ffffff; -webkit-tap-highlight-color: transparent; -webkit-text-size-adjust: 100%;"&gt;&amp;nbsp;shows ISP redundancy not supported with PBR, up to R80.40.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit; background-color: #ffffff; -webkit-tap-highlight-color: transparent; -webkit-text-size-adjust: 100%;"&gt;From R80.30 what’s new &amp;nbsp;“&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit; background-color: #ffffff; -webkit-tap-highlight-color: transparent; -webkit-text-size-adjust: 100%;"&gt;Multihop Ping and Multiple ISPs in Policy-Based Routing“ will be supported. Does this indicate ISP redundancy is supported ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit; background-color: #ffffff; -webkit-tap-highlight-color: transparent; -webkit-text-size-adjust: 100%;"&gt;From a technical view &amp;nbsp;it‘s working, but is it supported ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit; background-color: #ffffff; -webkit-tap-highlight-color: transparent; -webkit-text-size-adjust: 100%;"&gt;Wolfgang&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 18:58:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99631#M7783</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-10-20T18:58:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99634#M7784</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;Yes, NAT rules were checked, and worked if ISP redundancy was off.&lt;/P&gt;&lt;P&gt;Well&amp;nbsp;&lt;SPAN&gt;Wolfgang, probably you will get somekind of ISP redundancy with PBR and&amp;nbsp;&amp;nbsp;using “Multihop Ping and Multiple ISPs in Policy-Based Routing“, but if you enable ISP redundancy in the gw the nat rules will not work . Take a looh ar&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/ISP-Redundancy-with-PBR/m-p/67783" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/ISP-Redundancy-with-PBR/m-p/67783&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 19:47:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99634#M7784</guid>
      <dc:creator>Eduardo_Eiros</dc:creator>
      <dc:date>2020-10-20T19:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99646#M7785</link>
      <description>&lt;P&gt;ISP Redundancy and PBR are mutually exclusive features at the moment.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 00:57:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redundancy/m-p/99646#M7785</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-21T00:57:09Z</dc:date>
    </item>
  </channel>
</rss>

