<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Allow DHCP and DNS through ACL for vLans in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47447#M12200</link>
    <description>Ok, I tried it and it all worked like it should!! Awesome.  Now  What if I had a printer on JCSD-Mobile vLan that i needed the Nat vLan to be able to print to?  the Ip address of said printer is 10.20.100.181/22?  I am also going to have a vLan for our new camera system that I don't want to have access to the internet.  it will be called Cameras and will have an ip range of 10.30.100.0/22.  I think I can figure out how to add it from above, but I don't want it to be able to go out the uplink vLan.  This is what I have now....&lt;BR /&gt;
&lt;BR /&gt;
  create access-list denytoNat "destination-address 10.80.100.0/22" "deny"&lt;BR /&gt;
&lt;BR /&gt;
create access-list denytoMobile "destination-address 10.20.100.0/22" "deny"&lt;BR /&gt;
 create access-list denytoPortal "destination-address 10.25.100.0/22" "deny"&lt;BR /&gt;
&lt;BR /&gt;
  create access-list denytoCameras "destination-address 10.30.100.0/22" "deny"&lt;BR /&gt;
&lt;BR /&gt;
  &lt;BR /&gt;
 create access-list permtodns "destination-address 10.80.100.0/22; protocol udp; destination-port 53" "permit"&lt;BR /&gt;
 create access-list permtodhcp "destination-address 10.80.100.0/22; protocol udp; destination-port 67" "permit"&lt;BR /&gt;
 create access-list permfromdns "protocol udp; source-port 53" "permit"&lt;BR /&gt;
 create access-list permfromdhcp "protocol udp; source-port 67" "permit"&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
&lt;BR /&gt;
  &lt;B&gt;&lt;U&gt;Nat vLan&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
 config access-list add denytoMobile last vlan Nat ingress&lt;BR /&gt;
 config access-list add denytoPortal last vlan Nat ingress&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoCameras last vlan Nat ingress&lt;BR /&gt;
 config access-list add permfromdns first vlan Nat ingress&lt;BR /&gt;
 config access-list add permfromdhcp first vlan Nat ingress&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;B&gt;&lt;U&gt;JCSD-Mobile vLan&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoNat last vlan JCSD-Mobile ingress&lt;BR /&gt;
 config access-list add denytoPortal last vlan JCSD-Mobile ingress&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoCameras last vlan JCSD-Mobile ingress&lt;BR /&gt;
 config access-list add permtodns first vlan JCSD-Mobile ingress &lt;BR /&gt;
 config access-list add permtodhcp first vlan JCSD-Mobile ingress &lt;BR /&gt;
 &lt;BR /&gt;
 &lt;B&gt;&lt;U&gt;User-Portal vLan&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoNat last vlan User-Portal ingress&lt;BR /&gt;
 config access-list add denytoMobile last vlan User-Portal ingress&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoCameras last vlan User-Portal ingress&lt;BR /&gt;
 config access-list add permtodns first vlan User-Portal ingress &lt;BR /&gt;
 config access-list add permtodhcp first vlan User-Portal ingress&lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;
&lt;BR /&gt;
  &lt;B&gt;&lt;U&gt;Cameras vLan&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoNat last vlan Cameras ingress&lt;BR /&gt;
 config access-list add denytoMobile last vlan Cameras ingress&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoPortal last vlan Cameras ingress&lt;BR /&gt;
 config access-list add permtodns first vlan Cameras ingress &lt;BR /&gt;
 config access-list add permtodhcp first vlan Cameras ingress&lt;BR /&gt;
&lt;BR /&gt;
  &lt;B&gt;&lt;U&gt; &lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Wed, 04 May 2016 18:25:00 GMT</pubDate>
    <dc:creator>Trent_Deloach</dc:creator>
    <dc:date>2016-05-04T18:25:00Z</dc:date>
    <item>
      <title>Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47443#M12196</link>
      <description>I have 4 vlans:&lt;BR /&gt;
Uplink, Mobile, Portal, NAT&lt;BR /&gt;
&lt;BR /&gt;
The Nat is the location of my DHCP and DNS server.&lt;BR /&gt;
&lt;BR /&gt;
I want to create ACL Policies that keep vlans Mobile, Protal, and Nat from talking to each other, but if I do, it breaks Portal and Mobile clients from getting DHCP. &lt;BR /&gt;
&lt;BR /&gt;
Can I create ACL policies to block all traffic but DHCP and DNS from Portal and Mobile from the NAT vlan.&lt;BR /&gt;
&lt;BR /&gt;
Sidenote, all need to be allowed through uplink.&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;</description>
      <pubDate>Tue, 03 May 2016 22:49:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47443#M12196</guid>
      <dc:creator>Trent_Deloach</dc:creator>
      <dc:date>2016-05-03T22:49:00Z</dc:date>
    </item>
    <item>
      <title>RE: Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47444#M12197</link>
      <description>Please send a "show VLAN". Thanks.</description>
      <pubDate>Wed, 04 May 2016 01:06:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47444#M12197</guid>
      <dc:creator>Matthew_Helm1</dc:creator>
      <dc:date>2016-05-04T01:06:00Z</dc:date>
    </item>
    <item>
      <title>RE: Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47445#M12198</link>
      <description>Total&lt;BR /&gt;
-----------------------------------------------------------------------------------------------&lt;BR /&gt;
Nat         1    10.80.100.3    /22  -f----------T---------------- ANY    17/33  VR-Default&lt;BR /&gt;
DIS-Uplink      201  192.168.100.1  /30  -f--------------------------- ANY    1 /1   VR-Default&lt;BR /&gt;
JCSD-Mobile     20   10.20.100.3    /22  -f--------------------------- ANY    8 /8   VR-Default&lt;BR /&gt;
Mgmt            4095 ------------------------------------------------- ANY    0 /1   VR-Mgmt&lt;BR /&gt;
User-Portal     25   10.25.100.3    /22  -f--------------------------- ANY    8 /8   VR-Default&lt;BR /&gt;
-----------------------------------------------------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 04 May 2016 01:06:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47445#M12198</guid>
      <dc:creator>Trent_Deloach</dc:creator>
      <dc:date>2016-05-04T01:06:00Z</dc:date>
    </item>
    <item>
      <title>RE: Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47446#M12199</link>
      <description>So, I got pulled into something else and haven't had a chance to test this, but you could try this configuration below. I think the permit to dhcp ACL applied to the Mobile and Portal VLANs ingress should not be necessary (as it would be a broadcast destined to the gateway which would then, assuming you have bootprelay configured -- you do need to do that -- be directed by the switch to the dhcp server in the Nat VLAN) but it is not going to hurt. Again, I haven't tested this, so test it before deploying it in production please.&lt;BR /&gt;
&lt;BR /&gt;
create access-list denytoNat "destination-address 10.80.100.0/22" "deny"create access-list denytoMobile "destination-address 10.20.100.0/22" "deny"&lt;BR /&gt;
create access-list denytoPortal "destination-address 10.25.100.0/22" "deny"&lt;BR /&gt;
create access-list permtodns "destination-address 10.80.100.0/22; protocol udp; destination-port 53" "permit"&lt;BR /&gt;
create access-list permtodhcp "destination-address 10.80.100.0/22; protocol udp; destination-port 67" "permit"&lt;BR /&gt;
create access-list permfromdns "protocol udp; source-port 53" "permit"&lt;BR /&gt;
create access-list permfromdhcp "protocol udp; source-port 67" "permit"&lt;BR /&gt;
&lt;BR /&gt;
config access-list add denytoMobile last vlan Nat ingress&lt;BR /&gt;
config access-list add denytoPortal last vlan Nat ingress&lt;BR /&gt;
config access-list add permfromdns first vlan Nat ingress&lt;BR /&gt;
config access-list add permfromdhcp first vlan Nat ingress&lt;BR /&gt;
&lt;BR /&gt;
config access-list add denytoNat last vlan JCSD-Mobile ingress&lt;BR /&gt;
config access-list add denytoPortal last vlan JCSD-Mobile ingress&lt;BR /&gt;
config access-list add permtodns first vlan JCSD-Mobile ingress &lt;BR /&gt;
config access-list add permtodhcp first vlan JCSD-Mobile ingress &lt;BR /&gt;
&lt;BR /&gt;
config access-list add denytoNat last vlan User-Portal ingress&lt;BR /&gt;
config access-list add denytoMobile last vlan User-Portal ingress&lt;BR /&gt;
config access-list add permtodns first vlan User-Portal ingress &lt;BR /&gt;
config access-list add permtodhcp first vlan User-Portal ingress&lt;BR /&gt;</description>
      <pubDate>Wed, 04 May 2016 02:18:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47446#M12199</guid>
      <dc:creator>Matthew_Helm1</dc:creator>
      <dc:date>2016-05-04T02:18:00Z</dc:date>
    </item>
    <item>
      <title>RE: Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47447#M12200</link>
      <description>Ok, I tried it and it all worked like it should!! Awesome.  Now  What if I had a printer on JCSD-Mobile vLan that i needed the Nat vLan to be able to print to?  the Ip address of said printer is 10.20.100.181/22?  I am also going to have a vLan for our new camera system that I don't want to have access to the internet.  it will be called Cameras and will have an ip range of 10.30.100.0/22.  I think I can figure out how to add it from above, but I don't want it to be able to go out the uplink vLan.  This is what I have now....&lt;BR /&gt;
&lt;BR /&gt;
  create access-list denytoNat "destination-address 10.80.100.0/22" "deny"&lt;BR /&gt;
&lt;BR /&gt;
create access-list denytoMobile "destination-address 10.20.100.0/22" "deny"&lt;BR /&gt;
 create access-list denytoPortal "destination-address 10.25.100.0/22" "deny"&lt;BR /&gt;
&lt;BR /&gt;
  create access-list denytoCameras "destination-address 10.30.100.0/22" "deny"&lt;BR /&gt;
&lt;BR /&gt;
  &lt;BR /&gt;
 create access-list permtodns "destination-address 10.80.100.0/22; protocol udp; destination-port 53" "permit"&lt;BR /&gt;
 create access-list permtodhcp "destination-address 10.80.100.0/22; protocol udp; destination-port 67" "permit"&lt;BR /&gt;
 create access-list permfromdns "protocol udp; source-port 53" "permit"&lt;BR /&gt;
 create access-list permfromdhcp "protocol udp; source-port 67" "permit"&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
&lt;BR /&gt;
  &lt;B&gt;&lt;U&gt;Nat vLan&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
 config access-list add denytoMobile last vlan Nat ingress&lt;BR /&gt;
 config access-list add denytoPortal last vlan Nat ingress&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoCameras last vlan Nat ingress&lt;BR /&gt;
 config access-list add permfromdns first vlan Nat ingress&lt;BR /&gt;
 config access-list add permfromdhcp first vlan Nat ingress&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;B&gt;&lt;U&gt;JCSD-Mobile vLan&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoNat last vlan JCSD-Mobile ingress&lt;BR /&gt;
 config access-list add denytoPortal last vlan JCSD-Mobile ingress&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoCameras last vlan JCSD-Mobile ingress&lt;BR /&gt;
 config access-list add permtodns first vlan JCSD-Mobile ingress &lt;BR /&gt;
 config access-list add permtodhcp first vlan JCSD-Mobile ingress &lt;BR /&gt;
 &lt;BR /&gt;
 &lt;B&gt;&lt;U&gt;User-Portal vLan&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoNat last vlan User-Portal ingress&lt;BR /&gt;
 config access-list add denytoMobile last vlan User-Portal ingress&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoCameras last vlan User-Portal ingress&lt;BR /&gt;
 config access-list add permtodns first vlan User-Portal ingress &lt;BR /&gt;
 config access-list add permtodhcp first vlan User-Portal ingress&lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;
&lt;BR /&gt;
  &lt;B&gt;&lt;U&gt;Cameras vLan&lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoNat last vlan Cameras ingress&lt;BR /&gt;
 config access-list add denytoMobile last vlan Cameras ingress&lt;BR /&gt;
&lt;BR /&gt;
  config access-list add denytoPortal last vlan Cameras ingress&lt;BR /&gt;
 config access-list add permtodns first vlan Cameras ingress &lt;BR /&gt;
 config access-list add permtodhcp first vlan Cameras ingress&lt;BR /&gt;
&lt;BR /&gt;
  &lt;B&gt;&lt;U&gt; &lt;/U&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 04 May 2016 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47447#M12200</guid>
      <dc:creator>Trent_Deloach</dc:creator>
      <dc:date>2016-05-04T18:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47448#M12201</link>
      <description>This configuration still allows devices in Cameras to DIS-Uplink, which I can only assume is the means to the internet. If I understand you correctly you want devices in Cameras to only be able to reach themselves, DNS, and DHCP. For this I would do something like:&lt;BR /&gt;
&lt;BR /&gt;
create access-list inCameras "source-address 10.30.100.0/22; destination-address 10.30.100.0/22"&lt;BR /&gt;
&lt;BR /&gt;
create access-list dall " " "deny"&lt;BR /&gt;
&lt;BR /&gt;
config access-list add inCameras first vlan Cameras ingress&lt;BR /&gt;
config access-list add permtodns last vlan Cameras ingress&lt;BR /&gt;
config access-list add dall last vlan Cameras ingress&lt;BR /&gt;
&lt;BR /&gt;
Notice I did not use permtodhcp. I did some testing, and with DHCP relay properly configured, you should not have to use permtodhcp at all on any VLAN. (you still need permfromdchp).&lt;BR /&gt;
&lt;BR /&gt;
Now with respect to the printer, I forget my printer protocols, but you should be able to get by with this broader permit:&lt;BR /&gt;
&lt;BR /&gt;
create access-list permtoprinter "destination-address 10.20.100.181/32" "permit"&lt;BR /&gt;
&lt;BR /&gt;
Then add the permtoprinter access-list first to all VLANs ingress.&lt;BR /&gt;
&lt;BR /&gt;
Then:&lt;BR /&gt;
&lt;BR /&gt;
create access-list permfromprinter "source-address 10.20.100.181/32" "permit"&lt;BR /&gt;
&lt;BR /&gt;
config access-list add permfromprinter first JCSD-Mobile ingress&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 04 May 2016 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47448#M12201</guid>
      <dc:creator>Matthew_Helm1</dc:creator>
      <dc:date>2016-05-04T18:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47449#M12202</link>
      <description>Obviously, you may want to refine the permfrom/toprinter ACL lines to include protocol and source/destination port-number for the printer protocol.</description>
      <pubDate>Wed, 04 May 2016 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47449#M12202</guid>
      <dc:creator>Matthew_Helm1</dc:creator>
      <dc:date>2016-05-04T18:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47450#M12203</link>
      <description>Would this (&lt;BR /&gt;
create access-list inCameras "source-address 10.30.100.0/22; destination-address 10.30.100.0/22"&lt;BR /&gt;
&lt;BR /&gt;
create access-list dall " " "deny"&lt;BR /&gt;
&lt;BR /&gt;
config access-list add inCameras first vlan Cameras ingress&lt;BR /&gt;
config access-list add permtodns last vlan Cameras ingress&lt;BR /&gt;
config access-list add dall last vlan Cameras ingress)&lt;BR /&gt;
keep camera vlan from talking with all other vlans.  I would want them on their own completely.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 04 May 2016 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47450#M12203</guid>
      <dc:creator>Trent_Deloach</dc:creator>
      <dc:date>2016-05-04T18:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47451#M12204</link>
      <description>That was the intention. But I should have added a line allowing ARPs and Broadcasts.&lt;BR /&gt;
&lt;BR /&gt;
create access-list pbcast "ethernet-destination-address ff:ff:ff:ff:ff:ff" "permit"&lt;BR /&gt;
create access-list parp "ethernet-type 0x0806" "permit"&lt;BR /&gt;
&lt;BR /&gt;
config access-list add pbcast first vlan Cameras ingress&lt;BR /&gt;
config access-list add parp first vlan Cameras ingress&lt;BR /&gt;
&lt;BR /&gt;
Sorry about that. Again, you want to test all of this in a lab or on a lab switch.</description>
      <pubDate>Wed, 04 May 2016 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47451#M12204</guid>
      <dc:creator>Matthew_Helm1</dc:creator>
      <dc:date>2016-05-04T18:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47452#M12205</link>
      <description>This has all worked great.  I can't test the camera's as I don't have the system installed yet, but I have stored all this information.  Thanks to you I now have my network segregated like it is supposed to be.  I am going to throw one more at you.  What if you wanted to deny traffic to and from a public ip like say google's 8.8.8.8... Im just using that as an example but what if you did?&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 04 May 2016 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47452#M12205</guid>
      <dc:creator>Trent_Deloach</dc:creator>
      <dc:date>2016-05-04T18:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Allow DHCP and DNS through ACL for vLans</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47453#M12206</link>
      <description>You would simply create a deny line for that particular address and then apply it to the VLANs which have internet access, for example:&lt;BR /&gt;
&lt;BR /&gt;
create access-list deny8888 "destination-address 8.8.8.8/32" "deny"&lt;BR /&gt;
&lt;BR /&gt;
config access-list add deny8888 first vlan {VLAN} ingress</description>
      <pubDate>Wed, 04 May 2016 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/allow-dhcp-and-dns-through-acl-for-vlans/m-p/47453#M12206</guid>
      <dc:creator>Matthew_Helm1</dc:creator>
      <dc:date>2016-05-04T18:25:00Z</dc:date>
    </item>
  </channel>
</rss>

