<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Endpoint VPN DNS Headbender in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10178#M13830</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for suggestions.&lt;/P&gt;&lt;P&gt;I have read those and much more on the subject than I care to admit:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First, the&amp;nbsp;sk103678 is in compliance.&lt;/P&gt;&lt;P&gt;Second, the&amp;nbsp;sk103455 is in compliance.&lt;/P&gt;&lt;P&gt;Third, the&amp;nbsp;sk62483 is in compliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the plot thickens: Disabling SecureXL makes the DNS traversal work as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this new revelation ring any bells?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Mar 2018 23:37:54 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2018-03-28T23:37:54Z</dc:date>
    <item>
      <title>Endpoint VPN DNS Headbender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10173#M13825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK. I am officially crying "uncle" and am asking for your advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the process of setting up a demo lab for the client to demonstrate the various remote access options, I've run into this situation:&lt;/P&gt;&lt;P&gt;Endpoint connects to the gateway in a hub mode and TCP traffic is working fine, (i.e. no problem establishing RDP sessions).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DNS however, does not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="64206" class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64206_pastedImage_1.png" style="width: 773px; height: 540px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Latest findings indicate that disabling SecureXL makes this problem go away.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the client, dns queries are being send to a correct remote server:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="64201" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64201_pastedImage_2.png" style="width: 418px; height: 345px;" /&gt;&amp;nbsp;&amp;nbsp;&lt;IMG __jive_id="64200" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64200_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the DNS server configured in the Office Mode Optional Parameters:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="64202" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64202_pastedImage_3.png" style="width: 507px; height: 467px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet capture on the client seem to suggest that all is well:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="64203" class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64203_pastedImage_4.png" style="width: 620px; height: 151px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the firewall, after encrypting session claims that the queries are being addressed to another IP (client's WiFi DNS):&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="64204" class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64204_pastedImage_5.png" style="width: 620px; height: 114px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Session:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Time: 2018-03-28T16:05:42Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: eth1&lt;BR /&gt;Connection Direction: Incoming&lt;BR /&gt;Id: c0a8071f-2116-0000-5abb-bd5600000000&lt;BR /&gt;Sequencenum: 1&lt;BR /&gt;Hll Key: 11932664019562776808&lt;BR /&gt;Duration: 60&lt;BR /&gt;Last Update Time: 2018-03-28T16:06:39Z&lt;BR /&gt;Update Count: 2&lt;BR /&gt;Connections: 21&lt;BR /&gt;Aggregated Log Count: 34&lt;BR /&gt;Creation Time: 2018-03-28T16:05:42Z&lt;BR /&gt;Source: 172.16.20.2&lt;BR /&gt;Destination: 10.101.25.10&lt;BR /&gt;Destination Port: 53&lt;BR /&gt;IP Protocol: 17&lt;BR /&gt;User: ADUser1 (aduser1)&lt;BR /&gt;Source User Name: ADUser1 (aduser1)&lt;BR /&gt;Src User Dn: CN=ADUser1,CN=Users,DC=higherintelligence,DC=com&lt;BR /&gt;&lt;SPAN&gt;Destination Machine Name:&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:dc16@higherintelligence.com"&gt;dc16@higherintelligence.com&lt;/A&gt;&lt;BR /&gt;Service ID: domain-udp&lt;BR /&gt;Source Zone: External&lt;BR /&gt;Destination Zone: Internal&lt;BR /&gt;Action: Decrypt&lt;BR /&gt;Type: Session&lt;BR /&gt;Policy Name: MobileAccess_for_GW8010&lt;BR /&gt;Policy Management: SMS8010&lt;BR /&gt;Db Tag: {C961B499-D18A-6E48-B9D9-09023460FFBE}&lt;BR /&gt;Policy Date: 2018-03-28T13:44:48Z&lt;BR /&gt;Blade: Firewall&lt;BR /&gt;Origin: GW8010&lt;BR /&gt;Service: UDP/53&lt;BR /&gt;Product Family: Access&lt;BR /&gt;Logid: 288&lt;BR /&gt;Marker: @A@@B@1522209601@C@93556&lt;BR /&gt;Log Server Origin: 192.168.7.30&lt;BR /&gt;Orig Log Server Ip: 192.168.7.30&lt;BR /&gt;Lastupdatetime: 1522253202000&lt;BR /&gt;Lastupdateseqnum: 1&lt;BR /&gt;Severity: Informational&lt;BR /&gt;Rounded Sent Bytes: 1600&lt;BR /&gt;Confidence Level: N/A&lt;BR /&gt;Rounded Bytes: 9968&lt;BR /&gt;Stored: true&lt;BR /&gt;Rounded Received Bytes: 3568&lt;BR /&gt;Packets: 46&lt;BR /&gt;Total Bytes: 9981&lt;BR /&gt;Client Inbound Packets: 23&lt;BR /&gt;Client Outbound Packets: 23&lt;BR /&gt;Server Inbound Packets: 23&lt;BR /&gt;Server Outbound Packets: 23&lt;BR /&gt;Client Inbound Bytes: 3008&lt;BR /&gt;Client Outbound Bytes: 6973&lt;BR /&gt;Server Inbound Bytes: 3569&lt;BR /&gt;Server Outbound Bytes: 1600&lt;BR /&gt;Received Bytes: 3569&lt;BR /&gt;Sent Bytes: 1600&lt;BR /&gt;Access Rule Name: MAB Access to DC&lt;BR /&gt;Access Rule Number: 9.3&lt;BR /&gt;Rule UID: 69d6915f-7f98-4f28-9bf8-e9338d879611&lt;BR /&gt;Layer Name: Inline_FW_MAB&lt;BR /&gt;Interface: eth1&lt;BR /&gt;Description: domain-udp Traffic Decrypted from ADUser1 (aduser1)(172.16.20.2) to 10.101.25.10&lt;BR /&gt;Layer Uuid Rule Uuid: 9457d7fd-104e-494a-bf23-522eae8d2530_b84bc8fb-5623-47d2-9b6a-2fd8d54988a4, 05184d6c-b55e-4fc2-bb2c-8a8b5dd8d213_69d6915f-7f98-4f28-9bf8-e9338d879611&lt;BR /&gt;Bytes (sent\received): 9.7 KB (1.6 KB \ 3.5 KB)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Drops:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Id: c0a8071e-2091-a809-5abb-bd6233fb0003&lt;BR /&gt;Marker: @A@@B@1522209601@C@93320&lt;BR /&gt;Log Server Origin: 192.168.7.30&lt;BR /&gt;Time: 2018-03-28T16:05:54Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: eth1&lt;BR /&gt;Id Generated By Indexer:false&lt;BR /&gt;First: true&lt;BR /&gt;Sequencenum: 4&lt;BR /&gt;Source Zone: External&lt;BR /&gt;Destination Zone: Internal&lt;BR /&gt;Service ID: domain-udp&lt;BR /&gt;Source: 172.16.20.2&lt;BR /&gt;Source Port: 55011&lt;BR /&gt;Destination: 192.168.7.1&lt;BR /&gt;Destination Port: 53&lt;BR /&gt;IP Protocol: 17&lt;BR /&gt;User: ADUser1 (aduser1)&lt;BR /&gt;Source User Name: ADUser1 (aduser1)&lt;BR /&gt;Src User Dn: CN=ADUser1,CN=Users,DC=higherintelligence,DC=com&lt;BR /&gt;Action: Drop&lt;BR /&gt;Type: Connection&lt;BR /&gt;Policy Name: MobileAccess_for_GW8010&lt;BR /&gt;Policy Management: SMS8010&lt;BR /&gt;Db Tag: {C961B499-D18A-6E48-B9D9-09023460FFBE}&lt;BR /&gt;Policy Date: 2018-03-28T13:44:48Z&lt;BR /&gt;Blade: Firewall&lt;BR /&gt;Origin: GW8010&lt;BR /&gt;Service: UDP/53&lt;BR /&gt;Product Family: Access&lt;BR /&gt;Logid: 0&lt;BR /&gt;Access Rule Name: MAB Layer Cleanup rule&lt;BR /&gt;Access Rule Number: 9.6&lt;BR /&gt;Rule UID: 7ec99f73-e125-4ac3-8882-f342d8c518c0&lt;BR /&gt;Layer Name: Inline_FW_MAB&lt;BR /&gt;Interface: eth1&lt;BR /&gt;Description: domain-udp Traffic Dropped from ADUser1 (aduser1)(172.16.20.2) to 192.168.7.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am aware of the Windows 10 DNS leakage issues and have addressed those, but this does not look like it, as the queries being actually forwarded to the gateway and not blasted out of Wi-Fi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll collect and attach the trac.log from the Endpoint VPN client later if you want to take a look at it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2018 17:05:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10173#M13825</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-03-28T17:05:49Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint VPN DNS Headbender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10174#M13826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looking at timestamps, there's 12 secs between DNS request to the "right" DNS and the "wrong" one I would guess client didn't receive response to the first request so it started trying any DNS it can find on any other interface, resulting in using WiFi DNS. Probably windows behaviour. Check if first request was forwarded to DNS and response arrived to DNS OK. Hope you understood where I'm trying to get to&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2018 18:25:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10174#M13826</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-03-28T18:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint VPN DNS Headbender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10175#M13827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Fairly short thread with some answers&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://superuser.com/questions/966832/windows-10-dns-resolution-via-vpn-connection-not-working" title="https://superuser.com/questions/966832/windows-10-dns-resolution-via-vpn-connection-not-working"&gt;Windows 10 DNS resolution via VPN connection not working - Super User&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2018 18:35:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10175#M13827</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-03-28T18:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint VPN DNS Headbender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10176#M13828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've seen this, but it is not a viable solution, as each new Wi-Fi connection resets metric on adapter.&lt;/P&gt;&lt;P&gt;By design, Windows 10 will blast DNS requests to any and all connections that have DNS registered with them simultaneously and use the results that have arrived fastest.&lt;/P&gt;&lt;P&gt;So if you have a non split-brain DNS for your domain and are trying to access internal resources (that are also have public records) via VPN, you are kind-of out of luck.&lt;/P&gt;&lt;P&gt;In my case, it is attempting to query Wi-Fi's DNS, but those requests are encapsulated and shoved through the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May have something to do with the topology of the lab.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me run the wireshark on DC and see what it is seeing in terms of the query origin.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2018 18:46:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10176#M13828</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-03-28T18:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint VPN DNS Headbender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10177#M13829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't really have much experience with remote clients, but&amp;nbsp;these SKs offer some possibilities to try or at least check:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103678" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103678"&gt;DNS Query on VPN client with Office Mode IP address takes a very long time to succeed&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103455" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103455"&gt;Endpoint Security VPN client using local DNS server before using its assigned Office Mode DNS&lt;/A&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk62483" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk62483"&gt;DNS does not work through VPN tunnels&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I suspect that you already read all SKs found by search "DNS VPN".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2018 21:42:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10177#M13829</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-03-28T21:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint VPN DNS Headbender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10178#M13830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for suggestions.&lt;/P&gt;&lt;P&gt;I have read those and much more on the subject than I care to admit:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First, the&amp;nbsp;sk103678 is in compliance.&lt;/P&gt;&lt;P&gt;Second, the&amp;nbsp;sk103455 is in compliance.&lt;/P&gt;&lt;P&gt;Third, the&amp;nbsp;sk62483 is in compliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the plot thickens: Disabling SecureXL makes the DNS traversal work as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this new revelation ring any bells?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2018 23:37:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10178#M13830</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-03-28T23:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint VPN DNS Headbender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10179#M13831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's probably worth a TAC case if disabling SecureXL solves the issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2018 03:31:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10179#M13831</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-29T03:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint VPN DNS Headbender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10180#M13832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am having problems opening POC cases with TAC, as the account that I am using with NFR licenses does not have active CP support.&lt;/P&gt;&lt;P&gt;At some point, I may have to ask you to associate my Checkmates account with my own email, since I myself maintain active support contract.&lt;/P&gt;&lt;P&gt;I am just concerned about possible confusion it may cause, since the my current Checkmates account and email is the one that it assigned to a bunch of clients as a technical support contact.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2018 12:50:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10180#M13832</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-03-29T12:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint VPN DNS Headbender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10181#M13833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately, the identifier for CheckMates accounts is based on your UserCenter account and I don't have a way to affect that.&lt;/P&gt;&lt;P&gt;I know who you are, though--no confusion on my end &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2018 14:04:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-VPN-DNS-Headbender/m-p/10181#M13833</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-29T14:04:04Z</dc:date>
    </item>
  </channel>
</rss>

