<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to apply Dynamic ACL on Switch Engine with NAC in ExtremeControl</title>
    <link>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120429#M2127</link>
    <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I do not believe that we have support for dACLs for SwitchEngine.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Policy works in a very similar fashion. The only difference is that with policy the ACL is managed by policy manager through a "Policy" role construct, and the policy is invoked with a filter-ID instead of sending the entire ACL through the RADIUS access accept.&lt;BR /&gt;&lt;BR /&gt;Is there something that is not operating as you'd like it to with Policy that has generated your investigating into dynamic ACLs with Switch Engine?&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;-Ryan&lt;/P&gt;</description>
    <pubDate>Fri, 03 Oct 2025 13:10:22 GMT</pubDate>
    <dc:creator>Ryan_Yacobucci</dc:creator>
    <dc:date>2025-10-03T13:10:22Z</dc:date>
    <item>
      <title>How to apply Dynamic ACL on Switch Engine with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120420#M2126</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to send the right RADIUS attributes to apply dynamic ACL on Switch Engine with ExtremeControl.&lt;/P&gt;&lt;P&gt;I've done this easily with &lt;STRONG&gt;Fabric Engine&lt;/STRONG&gt;, using the &lt;STRONG&gt;%PER_USER_ACL_VOSS%&lt;/STRONG&gt; parameter in "&lt;STRONG&gt;RADIUS Attributes to Send&lt;/STRONG&gt;" configuration. Also, I created a &lt;STRONG&gt;role&lt;/STRONG&gt; with a &lt;STRONG&gt;service&lt;/STRONG&gt;. The default action is "&lt;STRONG&gt;Deny Traffic&lt;/STRONG&gt;" and then, &lt;STRONG&gt;I add some protocols to be authorized&lt;/STRONG&gt;.&lt;BR /&gt;It works fine &lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":question_mark:"&gt;❓&lt;/span&gt;My goal is to do the exact same thing with Switch Engine.&lt;BR /&gt;For now, I use &lt;STRONG&gt;policies&lt;/STRONG&gt;&amp;nbsp;with &lt;STRONG&gt;VLAN assignment&lt;/STRONG&gt; (it works) but I would like to add dynamic ACL &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;.&lt;/P&gt;&lt;P&gt;Any ideas ?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":light_bulb:"&gt;💡&lt;/span&gt;I'm on the latest version of XIQ SE and Control (25.08.11.12) and the latest version of Switch Engine (33.4.1.15-patch1-1).&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2025 21:30:41 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120420#M2126</guid>
      <dc:creator>Guilhem_Lejeune</dc:creator>
      <dc:date>2025-10-02T21:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to apply Dynamic ACL on Switch Engine with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120429#M2127</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I do not believe that we have support for dACLs for SwitchEngine.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Policy works in a very similar fashion. The only difference is that with policy the ACL is managed by policy manager through a "Policy" role construct, and the policy is invoked with a filter-ID instead of sending the entire ACL through the RADIUS access accept.&lt;BR /&gt;&lt;BR /&gt;Is there something that is not operating as you'd like it to with Policy that has generated your investigating into dynamic ACLs with Switch Engine?&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;-Ryan&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 13:10:22 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120429#M2127</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2025-10-03T13:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to apply Dynamic ACL on Switch Engine with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120432#M2128</link>
      <description>&lt;P&gt;Hi Ryan,&lt;/P&gt;&lt;P&gt;Thank you for your feedback ! Yes, indeed, something is not operating and I think the ExtremeControl role configuration is involved.&lt;BR /&gt;After a succesful authentication, the Policy is pushed toward the switch but I did not manage to have :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Default Action : deny (+ VLAN egress untagged)&lt;/LI&gt;&lt;LI&gt;Some protocols to be authorized&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":cross_mark:"&gt;❌&lt;/span&gt; VLAN is not pushed (I see the FDB entry in VLAN 1...) and every traffic is blocked !&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Very recently I managed to have :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Default action : Contain to VLAN (so basically permit with a VLAN ID)&lt;/LI&gt;&lt;LI&gt;Some protocols to be denied (for example : PING)&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; The PING is actually blocked with this configuration and all other traffic is authorized.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;But it is not exactly what I would like to implement. I would like to explicitly authorize traffic instead of denying traffic.&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 14:53:37 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120432#M2128</guid>
      <dc:creator>Guilhem_Lejeune</dc:creator>
      <dc:date>2025-10-03T14:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to apply Dynamic ACL on Switch Engine with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120433#M2129</link>
      <description>&lt;P&gt;You can send from NAC both VLAN ID and Policy name - you just need to enable this functionality on your switch from Device tab in PM (enable RFC 3580 and accept VLAN ID and Policy)&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 15:33:24 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120433#M2129</guid>
      <dc:creator>Bartek</dc:creator>
      <dc:date>2025-10-03T15:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to apply Dynamic ACL on Switch Engine with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120441#M2130</link>
      <description>&lt;P&gt;It's important to note that during authentication, "Policy" is not pushed toward the switch.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The policy always exists on the switch, but the policy is applied to the end system once the correct filter-ID is presented in the RADIUS access-accept.&lt;BR /&gt;&lt;BR /&gt;First check to see if the policy is configured on the switch by running the command: "show config policy"&lt;/P&gt;&lt;P&gt;Here is an example from the lab:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;5320-16P-4XE-SwitchEngine.2 # show config policy&lt;BR /&gt;#&lt;BR /&gt;# Module policy configuration.&lt;BR /&gt;#&lt;BR /&gt;configure netlogin port 2 authentication mode optional&lt;BR /&gt;configure policy captive-portal web-redirect 1 server 1 url "&lt;A href="http://192.168.1.227:80/static/index.jsp" target="_blank"&gt;http://192.168.1.227:80/static/index.jsp&lt;/A&gt;" enable&lt;BR /&gt;configure policy profile 1 name "Failsafe"&lt;BR /&gt;configure policy profile 2 name "Access Point" pvid-status "enable" pvid 4095 auth-override "enable"&lt;BR /&gt;configure policy profile 3 name "Administrator" pvid-status "enable" pvid 4095&lt;BR /&gt;configure policy profile 4 name "Deny Access" pvid-status "enable" pvid 0 web-redirect 1&lt;BR /&gt;configure policy profile 5 name "Guest Access" pvid-status "enable" pvid 0&lt;BR /&gt;configure policy profile 6 name "Quarantine" pvid-status "enable" pvid 0 web-redirect 1&lt;BR /&gt;configure policy profile 7 name "Server" pvid-status "enable" pvid 4095&lt;BR /&gt;configure policy profile 8 name "Printer" pvid-status "enable" pvid 0&lt;BR /&gt;configure policy profile 9 name "Unregistered" pvid-status "enable" pvid 0 web-redirect 1&lt;BR /&gt;configure policy profile 10 name "Enterprise User" pvid-status "enable" pvid 4095&lt;BR /&gt;configure policy profile 11 name "VoIP Phone" pvid-status "enable" pvid 4095&lt;BR /&gt;configure policy profile 12 name "Notification" pvid-status "enable" pvid 4095 web-redirect 1&lt;BR /&gt;configure policy profile 13 name "Assessing" pvid-status "enable" pvid 0 web-redirect 1&lt;BR /&gt;configure policy rule 4 udpdestportIP 53 mask 16 forward&lt;BR /&gt;configure policy rule 4 udpdestportIP 67 mask 16 forward&lt;BR /&gt;configure policy rule 4 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 4 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 4 ether 0x0806 mask 16 forward&lt;BR /&gt;configure policy rule 5 udpdestportIP 53 mask 16 forward&lt;BR /&gt;configure policy rule 5 udpdestportIP 67 mask 16 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 110 mask 16 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 143 mask 16 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 465 mask 16 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 587 mask 16 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 993 mask 16 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 995 mask 16 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 1723 mask 16 forward&lt;BR /&gt;configure policy rule 5 ether 0x0806 mask 16 forward&lt;BR /&gt;configure policy rule 6 udpdestportIP 53 mask 16 forward&lt;BR /&gt;configure policy rule 6 udpdestportIP 67 mask 16 forward&lt;BR /&gt;configure policy rule 6 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 6 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 6 ether 0x0806 mask 16 forward&lt;BR /&gt;configure policy rule 8 udpdestportIP 53 mask 16 forward&lt;BR /&gt;configure policy rule 8 udpdestportIP 67 mask 16 forward&lt;BR /&gt;configure policy rule 8 ether 0x0806 mask 16 forward&lt;BR /&gt;configure policy rule 9 udpdestportIP 53 mask 16 forward&lt;BR /&gt;configure policy rule 9 udpdestportIP 67 mask 16 forward&lt;BR /&gt;configure policy rule 9 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 9 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 9 ether 0x0806 mask 16 forward&lt;BR /&gt;configure policy rule 12 udpdestportIP 53 mask 16 forward&lt;BR /&gt;configure policy rule 12 udpdestportIP 67 mask 16 forward&lt;BR /&gt;configure policy rule 12 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 12 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 12 ether 0x0806 mask 16 forward&lt;BR /&gt;configure policy rule 13 udpdestportIP 53 mask 16 forward&lt;BR /&gt;configure policy rule 13 udpdestportIP 67 mask 16 forward&lt;BR /&gt;configure policy rule 13 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 13 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 13 ether 0x0806 mask 16 forward&lt;BR /&gt;configure policy maptable response both&lt;BR /&gt;configure policy captive-portal listening 80&lt;BR /&gt;configure policy captive-portal listening 443&lt;BR /&gt;configure policy vlanauthorization enable&lt;BR /&gt;enable policy&lt;BR /&gt;&lt;BR /&gt;The policy profile "Names" are the roles that are pushed from Extreme Policy:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ryan_Yacobucci_0-1759594620465.png" style="width: 400px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9219iAFA57D0A598830AF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Ryan_Yacobucci_0-1759594620465.png" alt="Ryan_Yacobucci_0-1759594620465.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Within each role are services, and services are collections of rules. These rules are shown within the policy configuration as "Rules" and the index number relates to the role:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ryan_Yacobucci_1-1759594871920.png" style="width: 400px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9220iBE3563CB363B1351/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Ryan_Yacobucci_1-1759594871920.png" alt="Ryan_Yacobucci_1-1759594871920.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ryan_Yacobucci_2-1759595015350.png" style="width: 400px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9221iF2A5ECEF2DCC8EB6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Ryan_Yacobucci_2-1759595015350.png" alt="Ryan_Yacobucci_2-1759595015350.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When policy is enforced, these configurations exist on the switch.&lt;BR /&gt;&lt;BR /&gt;The way to apply these policies to end systems is by sending the name of the policy in the Filter-ID in the RADIUS access-accept.&lt;BR /&gt;&lt;BR /&gt;When the end system is authenticated check the "Authorization" column within Control. It should show something like :&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ryan_Yacobucci_4-1759595923235.png" style="width: 400px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9223i53B0B7D47BD284D9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Ryan_Yacobucci_4-1759595923235.png" alt="Ryan_Yacobucci_4-1759595923235.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When the switch receives the Filter-ID it applies the policy as configured within the switch to the end system connected.&amp;nbsp;&lt;BR /&gt;You can see the session is applied by running the command:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;show netlogin session&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ryan_Yacobucci_5-1759596257451.png" style="width: 400px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9224i6B94C476730D3CAE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Ryan_Yacobucci_5-1759596257451.png" alt="Ryan_Yacobucci_5-1759596257451.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Check for Auth status "Success", agent type, session applied and "Policy Name". This shows you which policy is installed on when end system.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Let me know if you have any questions.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;-Ryan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Oct 2025 16:48:35 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120441#M2130</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2025-10-04T16:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to apply Dynamic ACL on Switch Engine with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120468#M2133</link>
      <description>&lt;P&gt;Hi Ryan,&lt;/P&gt;&lt;P&gt;I have carefully analyzed what you wrote earlier.&lt;BR /&gt;Everything is OK on my switch : the Policy is applied and I see the several sub-elements which are related to the service rules in XIQ SE / Extreme Control.&lt;/P&gt;&lt;P&gt;My exact problem is : I've defined a role with default action "DENY TRAFFIC" and, at the bottom of the page, I reference a service that only contains protocols to be authorized.&lt;/P&gt;&lt;P&gt;This configuration, as mentionned earlier, is well applied to the switch (policy and policy rules visible). But after authentication, I don't see the expected result !&lt;/P&gt;&lt;P&gt;Sometimes everything is blocked, sometimes everthing is permitted.&lt;BR /&gt;I'm expecting to have few protocols authorized, like PING (I've configured that in the service).&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 12:11:47 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120468#M2133</guid>
      <dc:creator>Guilhem_Lejeune</dc:creator>
      <dc:date>2025-10-08T12:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to apply Dynamic ACL on Switch Engine with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120478#M2134</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;Obviously, I haven't read you right : I've forgotten the "&lt;SPAN&gt;&lt;STRONG&gt;configure policy maptable response both&lt;/STRONG&gt;" command on my switch.&lt;BR /&gt;&lt;/SPAN&gt;It works !&lt;/P&gt;&lt;P&gt;So, to summarize :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Radius Attributes to Send : Policy &amp;amp; RFC3580&lt;/LI&gt;&lt;LI&gt;NAC Authorization rule :&lt;UL&gt;&lt;LI&gt;Role (see below)&lt;/LI&gt;&lt;LI&gt;VLAN ID&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Role :&lt;UL&gt;&lt;LI&gt;Default Action : Deny Traffic&lt;/LI&gt;&lt;LI&gt;Services : what I want to authorize (example : "Base Services" + custom "Permit PING")&lt;/LI&gt;&lt;LI&gt;Potential tagged VLAN to configure in "Egress VLAN" tab&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Switch configuration :&lt;UL&gt;&lt;LI&gt;Netlogin (mac &amp;amp; dot1x)&lt;/LI&gt;&lt;LI&gt;Policy with &lt;STRONG&gt;maptable reponse both&lt;/STRONG&gt; and &lt;STRONG&gt;vlan authorization&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Sorry for this mistake and thank you very much for taking time to bring me some tips !&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;</description>
      <pubDate>Thu, 09 Oct 2025 12:12:18 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/how-to-apply-dynamic-acl-on-switch-engine-with-nac/m-p/120478#M2134</guid>
      <dc:creator>Guilhem_Lejeune</dc:creator>
      <dc:date>2025-10-09T12:12:18Z</dc:date>
    </item>
  </channel>
</rss>

