<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multicast through firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716455#M13331</link>
    <description>&lt;P&gt;I am getting the log below:&lt;/P&gt;
&lt;P&gt;Deny udp src outside:192.168.20.11/21002 dst identity:239.224.20.7/1007 by access-group "outside_access_in"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The systems (192.168.20.11) sits on the outside port of the firewall and does the streaming to 239.224.20.7/1007.. In my ACL i allow the 192.168.20.0/24 and the 239.224.20.0/24 into the firewall to be accessed by our 192.168.200.0/24 and 192.168.2.0/24 networks.&lt;/P&gt;
&lt;P&gt;I have a pim rp-address of an outside pim router that also has an access-list associated with it. This access-list allows 239.224.20.0/24 into the router.&lt;/P&gt;
&lt;P&gt;I am assuming my ACL is incomplete and not sure why..Shouldn't my inside system requesting to join 239.224.20.0/24 feeds, pull the feeds from the outside? Or does that feed need to have access to the switch/router on the inside for the it to push the multicast through the firewall?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My work around right now is to allow any any through.. The is a standalone network so it has no internet access.. I will upload the firewall configuration also. Just note that I have done a lot of additional objects that will later allow me to lock down the firewall more.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently there is only one system on the outside of the firewall that will supply multicast streams but eventually we will have multiple systems with different subnets...&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:18:15 GMT</pubDate>
    <dc:creator>Jeff Horton</dc:creator>
    <dc:date>2020-02-21T16:18:15Z</dc:date>
    <item>
      <title>Multicast through firewall</title>
      <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716455#M13331</link>
      <description>&lt;P&gt;I am getting the log below:&lt;/P&gt;
&lt;P&gt;Deny udp src outside:192.168.20.11/21002 dst identity:239.224.20.7/1007 by access-group "outside_access_in"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The systems (192.168.20.11) sits on the outside port of the firewall and does the streaming to 239.224.20.7/1007.. In my ACL i allow the 192.168.20.0/24 and the 239.224.20.0/24 into the firewall to be accessed by our 192.168.200.0/24 and 192.168.2.0/24 networks.&lt;/P&gt;
&lt;P&gt;I have a pim rp-address of an outside pim router that also has an access-list associated with it. This access-list allows 239.224.20.0/24 into the router.&lt;/P&gt;
&lt;P&gt;I am assuming my ACL is incomplete and not sure why..Shouldn't my inside system requesting to join 239.224.20.0/24 feeds, pull the feeds from the outside? Or does that feed need to have access to the switch/router on the inside for the it to push the multicast through the firewall?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My work around right now is to allow any any through.. The is a standalone network so it has no internet access.. I will upload the firewall configuration also. Just note that I have done a lot of additional objects that will later allow me to lock down the firewall more.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently there is only one system on the outside of the firewall that will supply multicast streams but eventually we will have multiple systems with different subnets...&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:18:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716455#M13331</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2020-02-21T16:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast through firewall</title>
      <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716460#M13352</link>
      <description>&lt;P&gt;I would also include an acl to allow the pim protcol, (attached), place it above your allow udp rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 14:31:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716460#M13352</guid>
      <dc:creator>Upgraded_to_CheckPoint!</dc:creator>
      <dc:date>2018-10-01T14:31:32Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast through firewall</title>
      <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716472#M13383</link>
      <description>Did that but no help... Still getting the denies...</description>
      <pubDate>Mon, 01 Oct 2018 14:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716472#M13383</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2018-10-01T14:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast through firewall</title>
      <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716501#M13402</link>
      <description>&lt;P&gt;post the complete output of&lt;/P&gt;
&lt;PRE&gt;packet-tracer input outside udp 192.168.20.11 12345 239.224.20.7 1007 det&lt;/PRE&gt;</description>
      <pubDate>Mon, 01 Oct 2018 14:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716501#M13402</guid>
      <dc:creator>Upgraded_to_CheckPoint!</dc:creator>
      <dc:date>2018-10-01T14:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast through firewall</title>
      <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716521#M13416</link>
      <description>I think I just figured this out... Since the 192.168.20.11 system needs to communicate with the multicast address of 239.224.20.* on the inside of the firewall, I added the multicast subnet to the destination of the outside ACL and the denies are gone.. Weird thing is that I have done this before and never had to do that.... Anyone with a good explanation of this? I was under the assumption that the request for the multicast would be to join the outside multicast address so that is why the 239.224.20.0/24 is allowed into the network.</description>
      <pubDate>Mon, 01 Oct 2018 14:52:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716521#M13416</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2018-10-01T14:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast through firewall</title>
      <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716531#M13430</link>
      <description>I have removed the solution I had just to see what your packet-tracer finds..</description>
      <pubDate>Mon, 01 Oct 2018 14:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716531#M13430</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2018-10-01T14:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast through firewall</title>
      <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716537#M13439</link>
      <description>Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in  id=0x2aaadfffa0f0, priority=1, domain=permit, deny=false&lt;BR /&gt;        hits=1682, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;        src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;        dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;        input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.3.1.1 using egress ifc  outside&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.3.1.1 using egress ifc  outside&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in  id=0x2aaae01b1b10, priority=11, domain=permit, deny=true&lt;BR /&gt;        hits=1488, user_data=0x6, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;        input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule</description>
      <pubDate>Mon, 01 Oct 2018 14:59:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716537#M13439</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2018-10-01T14:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast through firewall</title>
      <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716543#M13446</link>
      <description>Here is the packet-tracer where I put the multicast subnet in the outside ACL..&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in  id=0x2aaadfff9e30, priority=1, domain=permit, deny=false&lt;BR /&gt;        hits=134954, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;        src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;        dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;        input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.3.1.1 using egress ifc  outside&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.3.1.1 using egress ifc  outside&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit ip object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_NETWORK_3&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt; network-object 192.168.20.0 255.255.255.0&lt;BR /&gt; network-object 239.224.20.0 255.255.255.0&lt;BR /&gt; network-object object pim_ip&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt; network-object 192.168.2.0 255.255.255.0&lt;BR /&gt; network-object 192.168.200.0 255.255.255.0&lt;BR /&gt; network-object 239.224.20.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in  id=0x2aaadfa1bfe0, priority=13, domain=permit, deny=false&lt;BR /&gt;        hits=1, user_data=0x2aaad42af040, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;        src ip/id=192.168.20.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;        dst ip/id=239.224.20.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;        input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in  id=0x2aaadece3d90, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;        hits=127, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;        input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in  id=0x2aaae0002230, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;        hits=3, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;        input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (security-failed) Early security checks failed</description>
      <pubDate>Mon, 01 Oct 2018 15:02:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716543#M13446</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2018-10-01T15:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast through firewall</title>
      <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716575#M13455</link>
      <description>&lt;P&gt;The implicit deny rule at the is picking up the traffic before your matching udp traffic does. In the order of things,&lt;BR /&gt;&lt;BR /&gt;show access-list outside_access_in&lt;BR /&gt;&lt;BR /&gt;the last rule line # should be the implicit 'outside_access_in line # deny ip any any'&lt;/P&gt;
&lt;P&gt;and your udp/pim matching traffic rule should come before it. example:&lt;BR /&gt;&lt;BR /&gt;access-list outside_access_in line 100 extended permit udp .....&lt;BR /&gt;access-list outside_access_in line 101 extended deny ip any any log&lt;BR /&gt;&lt;BR /&gt;not the other way around. &lt;BR /&gt;&lt;BR /&gt;the extend permit IP workaround is likely above the implicit deny rule line number if that's working.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 15:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716575#M13455</guid>
      <dc:creator>Upgraded_to_CheckPoint!</dc:creator>
      <dc:date>2018-10-01T15:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast through firewall</title>
      <link>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716664#M13461</link>
      <description>I totally understand what your saying but I only use the global deny any any on the ASA 5508-X. If you look into the config file I attached on my original post, you will see the following:&lt;BR /&gt;access-list outside_access_in extended permit ip object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_NETWORK_3&lt;BR /&gt;access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_6 object-group DM_INLINE_NETWORK_5&lt;BR /&gt;&lt;BR /&gt;The DM's are just groups that the firewall itself creates when having multiple objects in the ACL..&lt;BR /&gt;So far I have done some test with adding the multicast address subnet as a destination for the outside ACL.. I also removed the multicast from the source as I have found that it is not needed....&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 01 Oct 2018 16:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicast-through-firewall/m-p/3716664#M13461</guid>
      <dc:creator>Jeff Horton</dc:creator>
      <dc:date>2018-10-01T16:08:50Z</dc:date>
    </item>
  </channel>
</rss>

