<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274835#M13852</link>
    <description>&lt;P&gt;Maybe create a single route with source 172.20.15.3, destination 172.18.9.0/24 and secondary WAN as the next hop?&lt;BR /&gt;To be clear, this would be in addition to the routes you already have.&lt;/P&gt;</description>
    <pubDate>Fri, 03 Apr 2026 20:43:37 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2026-04-03T20:43:37Z</dc:date>
    <item>
      <title>Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274694#M13831</link>
      <description>&lt;P&gt;Hi everyone,&lt;BR /&gt;I’m working with a centrally managed &lt;STRONG&gt;Check Point Spark appliance running R81.10.17 (latest build)&lt;/STRONG&gt; in a &lt;STRONG&gt;multi‑ISP environment&lt;/STRONG&gt;.&lt;BR /&gt;I need to configure &lt;STRONG&gt;manual DNAT/SNAT&lt;/STRONG&gt; for specific services using a &lt;STRONG&gt;secondary public IP&lt;/STRONG&gt; from a &lt;STRONG&gt;secondary ISP&lt;/STRONG&gt;, while ensuring that:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Only &lt;STRONG&gt;traffic toward the Internet&lt;/STRONG&gt; is NATted&lt;/LI&gt;&lt;LI&gt;Internal traffic or traffic toward other routed networks is &lt;STRONG&gt;not&lt;/STRONG&gt; NATted&lt;/LI&gt;&lt;LI&gt;Outbound traffic for a specific internal host uses the &lt;STRONG&gt;secondary ISP only&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt;&lt;STRONG&gt;Goal&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;For a specific internal host:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Translate it to a specific &lt;STRONG&gt;secondary public IP&lt;/STRONG&gt; (SNAT)&lt;/LI&gt;&lt;LI&gt;Allow external services to reach it via &lt;STRONG&gt;DNAT&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Force this traffic to use the &lt;STRONG&gt;secondary ISP&lt;/STRONG&gt; via a dedicated static route when going to internet&lt;/LI&gt;&lt;LI&gt;Avoid affecting any other traffic or internal routed networks&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;span class="lia-unicode-emoji" title=":warning:"&gt;⚠️&lt;/span&gt;&lt;STRONG&gt;Problem&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;To make outbound traffic use the secondary ISP, I created a static route on the firewall such as:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;Destination: Any  
Gateway: Secondary ISP gateway  &lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;However, when the route uses &lt;STRONG&gt;destination = Any&lt;/STRONG&gt;, another issue appears:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt;Traffic toward the Internet correctly uses the secondary ISP&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":cross_mark:"&gt;❌&lt;/span&gt;&lt;STRONG&gt;BUT&lt;/STRONG&gt; traffic coming from devices reachable via &lt;EM&gt;other static routes&lt;/EM&gt;&lt;BR /&gt;(e.g., internal routed networks or specific internal subnets)&lt;BR /&gt;is also sent out to the Internet instead of being forwarded to the correct internal interface.&lt;/P&gt;&lt;P&gt;It looks like the &lt;STRONG&gt;Any → secondary ISP&lt;/STRONG&gt; route overrides more specific static routes, even though normally specific routes should take precedence.&lt;/P&gt;&lt;H3&gt;&lt;span class="lia-unicode-emoji" title=":question_mark:"&gt;❓&lt;/span&gt;&lt;STRONG&gt;Question&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Is it correct to fix this using route weights/metrics, or is there a better technique?&lt;/P&gt;&lt;P&gt;I’m trying to understand whether I should:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adjust &lt;STRONG&gt;route priority / metric / weight&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Or if Spark appliances require a different approach for multi‑ISP selective routing when manual NAT is involved&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;➜ &lt;STRONG&gt;Additional details&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;NAT is configured manually (and also with hide‑all networks flag enabled)&lt;/LI&gt;&lt;LI&gt;The public IP used for DNAT/SNAT is &lt;STRONG&gt;not&lt;/STRONG&gt; the interface IP but another public IP belonging to the same ISP subnet&lt;/LI&gt;&lt;LI&gt;Manual NAT itself works&lt;/LI&gt;&lt;LI&gt;The routing is what breaks internal‑to‑internal flows&lt;/LI&gt;&lt;LI&gt;I want to ensure:&lt;UL&gt;&lt;LI&gt;Only &lt;STRONG&gt;Internet&lt;/STRONG&gt; flows use the secondary ISP&lt;/LI&gt;&lt;LI&gt;Internal routed networks keep following their static routes&lt;/LI&gt;&lt;LI&gt;DNAT/SNAT is applied only when traffic matches the specific host/service&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt;&lt;STRONG&gt;What I’m asking the community&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;How do you correctly force &lt;EM&gt;only&lt;/EM&gt; Internet traffic for a specific host to use a secondary ISP &lt;EM&gt;without breaking other static routes&lt;/EM&gt;?&lt;/LI&gt;&lt;LI&gt;Should route metrics be modified, or is &lt;STRONG&gt;policy‑based routing (PBR)&lt;/STRONG&gt; required?&lt;/LI&gt;&lt;LI&gt;Are there recommended best practices for &lt;STRONG&gt;multi‑ISP selective NAT and routing&lt;/STRONG&gt; on Spark appliances?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Any suggestions, experiences, or best‑practice examples would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 21:38:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274694#M13831</guid>
      <dc:creator>perfect4situa</dc:creator>
      <dc:date>2026-04-01T21:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274697#M13833</link>
      <description>&lt;P&gt;How do you have the relevant routes configured?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 22:41:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274697#M13833</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-01T22:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274732#M13835</link>
      <description>&lt;P&gt;Route for Internet:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Internet Route" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33910iE737B05B157DFEFD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2026-04-02_08h58_37.png" alt="Internet Route" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Internet Route&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Route for LAN:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LAN Route" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33911i92F9601E68E1FAC1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2026-04-02_08h57_37.png" alt="LAN Route" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;LAN Route&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;&lt;STRONG&gt;NAT Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DNAT&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;Original Source:      Any
Original Destination: &amp;lt;Secondary Public IP&amp;gt;
Service:              &amp;lt;Service Group&amp;gt;

Translated Source:    Original
Translated Destination: 172.20.15.3
Translated Service:   Original&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;SNAT&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;Original Source:      172.20.15.3
Original Destination: Any
Service:              Any

Translated Source:    &amp;lt;Secondary Public IP&amp;gt;
Translated Destination: Original
Translated Service:   Original&lt;/CODE&gt;&lt;/PRE&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 02 Apr 2026 07:11:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274732#M13835</guid>
      <dc:creator>perfect4situa</dc:creator>
      <dc:date>2026-04-02T07:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274812#M13843</link>
      <description>&lt;DIV&gt;&lt;P&gt;I think I’m close to the solution, but I’m not sure this is the correct or optimal approach.&lt;BR /&gt;I changed my setup, the route to the WAN has destination &lt;EM&gt;any&lt;/EM&gt; and a specific source host, while the static route to the internal LAN has a specific destination network and source &lt;EM&gt;any&lt;/EM&gt;. This causes the WAN route to be evaluated first, even with a higher metric (10) than the LAN static route (metric 0).&lt;/P&gt;&lt;P&gt;To work around this, I added an additional static route to the internal LAN with priority 0, which correctly overrides the WAN route. However, this would require creating extra static routes for every internal network that already has a global static route (source any). I also had to adjust the SNAT so that the destination is only the external zone instead of &lt;EM&gt;any&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;Is this configuration considered correct, or is there a better way to handle this scenario?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 03 Apr 2026 10:44:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274812#M13843</guid>
      <dc:creator>perfect4situa</dc:creator>
      <dc:date>2026-04-03T10:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274835#M13852</link>
      <description>&lt;P&gt;Maybe create a single route with source 172.20.15.3, destination 172.18.9.0/24 and secondary WAN as the next hop?&lt;BR /&gt;To be clear, this would be in addition to the routes you already have.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 20:43:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274835#M13852</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-03T20:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274915#M13853</link>
      <description>&lt;P&gt;Do the routes look like the one I suggested?&lt;BR /&gt;That might be the only way to do it, though perhaps you could do it with fewer routes through supernetting.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2026 15:38:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274915#M13853</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-06T15:38:16Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274961#M13854</link>
      <description>&lt;DIV&gt;&lt;P&gt;Thanks for the suggestion.&lt;BR /&gt;In my setup, the static routes are slightly different from the ones you described. Below is the configuration that actually works for me. I also integrated the required supernetting to avoid routing conflicts and to make sure the correct egress interface is selected when DNAT/SNAT is applied.&lt;/P&gt;&lt;P&gt;(In the screenshot the source IP is 172.20.15.245, but you can assume it is 172.20.15.3.)&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2026-04-07_08h58_27.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33950i6FADF6216C684692/image-size/large?v=v2&amp;amp;px=999" role="button" title="2026-04-07_08h58_27.png" alt="2026-04-07_08h58_27.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV&gt;As you can see, I kept the original &lt;STRONG&gt;WAN&lt;/STRONG&gt; route (third row) with destination &lt;STRONG&gt;ANY&lt;/STRONG&gt;. However, in addition to the “ANY to internal network” route, I also need a dedicated route for the specific source IP. This route has a higher priority than the WAN route (first and second row), otherwise the traffic would incorrectly follow the WAN path.&lt;/DIV&gt;</description>
      <pubDate>Tue, 07 Apr 2026 07:14:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274961#M13854</guid>
      <dc:creator>perfect4situa</dc:creator>
      <dc:date>2026-04-07T07:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274997#M13858</link>
      <description>&lt;P&gt;Looks alright to me.&lt;BR /&gt;More specific routes are always going to take priority.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 14:37:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/274997#M13858</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-07T14:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/275058#M13859</link>
      <description>&lt;DIV&gt;&lt;P&gt;I agree with your explanation. However, my initial assumption was that a route with a &lt;STRONG&gt;more specific destination and source set to any&lt;/STRONG&gt; would take precedence over a route with &lt;STRONG&gt;source any and a single destination&lt;/STRONG&gt;. That misunderstanding was actually the root cause of my issue.&lt;/P&gt;&lt;P&gt;I also have a couple of additional questions related to this scenario:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Can both DNAT rules be active at the same time&lt;/STRONG&gt; (i.e. accept incoming connections on both ISP links)?&lt;BR /&gt;If so, will the return traffic always follow the same public IP/interface that was used for the incoming connection, or will it go out via the primary ISP or according to the static route configuration?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;What is the correct configuration for NAT loopback (hairpin NAT)&lt;/STRONG&gt; in this type of multi-ISP setup?&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;For these questions, would it be better to open a new post, or can they be addressed within this thread?&lt;/P&gt;&lt;P&gt;Thanks in advance for any clarification.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 08 Apr 2026 08:59:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/275058#M13859</guid>
      <dc:creator>perfect4situa</dc:creator>
      <dc:date>2026-04-08T08:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/275113#M13864</link>
      <description>&lt;P&gt;In theory, you can have both DNAT rules in place as we require a similar configuration for ISP Redundancy on non-Spark gateways.&lt;BR /&gt;Not sure the configuration would be different for Hairpin NAT, assuming the use case is internal hosts trying to reach an external address (based on WAN address).&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 15:06:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/275113#M13864</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-08T15:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/275150#M13869</link>
      <description>&lt;DIV&gt;&lt;P&gt;I believe the issue with multiple DNAT rules is that only one outbound ISP can be effectively used at a time.&lt;/P&gt;&lt;P&gt;How can the gateway be configured to ensure that return traffic originating from a secondary ISP is routed back through the same secondary ISP, in order to avoid asymmetric routing?&lt;/P&gt;&lt;P&gt;At the moment, it does not seem possible to filter routing decisions based on source or destination, and even the route configuration follows predefined precedence rules that do not align with the NAT rules.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 09 Apr 2026 07:33:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/275150#M13869</guid>
      <dc:creator>perfect4situa</dc:creator>
      <dc:date>2026-04-09T07:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: Static routing conflict with selective DNAT/SNAT on multi‑ISP Spark R81.10.17 (centrally managed</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/275219#M13875</link>
      <description>&lt;P&gt;This might be SecureXL related...see if the behavior changes with fwaccel off.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 16:25:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Static-routing-conflict-with-selective-DNAT-SNAT-on-multi-ISP/m-p/275219#M13875</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-09T16:25:34Z</dc:date>
    </item>
  </channel>
</rss>

