<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It is difficult to say in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909992#M167889</link>
    <description>&lt;P&gt;It is difficult to say without more knowledge of your network. &amp;nbsp;Could you post a network diagram of your setup and please post your ASA's full configuration (remove public IPs and usernames / passwords).&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Thu, 25 Feb 2016 17:54:46 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2016-02-25T17:54:46Z</dc:date>
    <item>
      <title>Help understanding allowed Teamviewer UDP connection</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909991#M167888</link>
      <description>&lt;P&gt;Hello all&lt;/P&gt;
&lt;P&gt;I'm running an ASA in transparent mode with several contexts.&lt;/P&gt;
&lt;P&gt;For simplicity lets assume I have two context, one for the 192.168.0.0/24 and one for the 192.168.1.0/24.&lt;/P&gt;
&lt;P&gt;The firewall rules are in the IN direction on the OUTSIDE interface. Outgoing traffic is allowed with protocol IP.&lt;/P&gt;
&lt;P&gt;The last rule in both rule sets is:&lt;/P&gt;
&lt;P&gt;access-list OUTSIDE extended deny ip any any log&lt;/P&gt;
&lt;P&gt;There is no permitted firewall rule that allows incoming UDP traffic on Port &amp;gt;50000 to any IP in the subnet, which my CSM also confirms with a query.&lt;/P&gt;
&lt;P&gt;Client 1 is 192.168.0.10 and client 2 is 192.168.1.20.&lt;/P&gt;
&lt;P&gt;We tested teamviewer today, client1 was the admin-host and client2 was the destination-host.&lt;/P&gt;
&lt;P&gt;A wireshark showed now, as did the firewall log, that both clients opened a UDP connection to each other with the same IP/Port combination, just vice versa. So far I still understand what's going on.&lt;/P&gt;
&lt;P&gt;What did buffle me now though, client1 was able to directly communicate with client2, although neither firewall ruleset allows an incoming UDP connection! They (ab)used the seemingly two other connections, of which each client opened one, to communicate that way.&lt;/P&gt;
&lt;P&gt;I thought that should be blocked? I think I'm lacking some basic UDP firewall function knowledge, could anybody please enlighten my why those two clients were able to directly communicate with each other?&lt;/P&gt;
&lt;P&gt;Thanks&lt;BR /&gt;Patrick&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:24:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909991#M167888</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2019-03-12T07:24:11Z</dc:date>
    </item>
    <item>
      <title>It is difficult to say</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909992#M167889</link>
      <description>&lt;P&gt;It is difficult to say without more knowledge of your network. &amp;nbsp;Could you post a network diagram of your setup and please post your ASA's full configuration (remove public IPs and usernames / passwords).&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 17:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909992#M167889</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-25T17:54:46Z</dc:date>
    </item>
    <item>
      <title>The very much simplified</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909993#M167890</link>
      <description>&lt;P&gt;The very much simplified&amp;nbsp;configuration of those two transparent context interfaces&amp;nbsp;looks like this:&lt;BR /&gt;Context1:&lt;/P&gt;
&lt;P&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.4 255.255.255.0 standby 192.168.0.5&lt;BR /&gt;interface Port-channel1.1145&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;interface Port-channel1.145&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;access-list INSIDE extended permit ip any any&lt;BR /&gt;access-list OUTSIDE extended deny ip any any log&lt;BR /&gt;access-group INSIDE in interface inside&lt;BR /&gt;access-group OUTSIDE in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;aaa proxy-limit disable&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;no snmp-server location&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;mac-address-table aging-time 5&lt;BR /&gt;sysopt connection tcpmss 9096&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;class-map axapta_timeout&lt;BR /&gt;&amp;nbsp;match access-list axapta_timeout&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map timeout_sistore_videoueberwachung&lt;BR /&gt;&amp;nbsp;match access-list timeout_sistore_videoueberwachung&lt;BR /&gt;policy-map CSM_PM_global_1&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp;class timeout_sistore_videoueberwachung&lt;BR /&gt;&amp;nbsp; set connection random-sequence-number disable&lt;BR /&gt;&amp;nbsp; set connection timeout idle 0:00:00&lt;BR /&gt;&amp;nbsp;class axapta_timeout&lt;BR /&gt;&amp;nbsp; set connection timeout idle 12:00:00&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; set connection random-sequence-number disable&lt;BR /&gt;mac-address-table static outside 0008.e3ff.fd90&lt;/P&gt;
&lt;P&gt;Context 2:&lt;/P&gt;
&lt;P&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.4 255.255.255.0 standby 192.168.1.5&lt;BR /&gt;interface Port-channel1.1140&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;interface Port-channel1.140&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;access-list INSIDE extended permit ip any any&lt;BR /&gt;access-list OUTSIDE extended deny ip any any log&lt;BR /&gt;access-group INSIDE in interface inside&lt;BR /&gt;access-group OUTSIDE in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;aaa proxy-limit disable&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;no snmp-server location&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;mac-address-table aging-time 5&lt;BR /&gt;sysopt connection tcpmss 9096&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;class-map axapta_timeout&lt;BR /&gt;&amp;nbsp;match access-list axapta_timeout&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map timeout_sistore_videoueberwachung&lt;BR /&gt;&amp;nbsp;match access-list timeout_sistore_videoueberwachung&lt;BR /&gt;policy-map CSM_PM_global_1&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp;class timeout_sistore_videoueberwachung&lt;BR /&gt;&amp;nbsp; set connection random-sequence-number disable&lt;BR /&gt;&amp;nbsp; set connection timeout idle 0:00:00&lt;BR /&gt;&amp;nbsp;class axapta_timeout&lt;BR /&gt;&amp;nbsp; set connection timeout idle 12:00:00&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; set connection random-sequence-number disable&lt;BR /&gt;mac-address-table static outside 0008.e3ff.fd90&lt;/P&gt;
&lt;P&gt;With this configuration (removed other firewall rules, which do not match the intended traffic) Teamviewer seems to be able to create a direct connection over UDP between two hosts, each connected to one context.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 06:51:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909993#M167890</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-02-26T06:51:27Z</dc:date>
    </item>
    <item>
      <title>I just had a thought, I</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909994#M167891</link>
      <description>&lt;P&gt;I just had a thought, I removed a multicast allowing rule in the above rule set, Wireshark didn't show anything about Multicast and it was the correct source and destination IP in the captured traffic, but maybe I need to recheck that.&lt;/P&gt;
&lt;P&gt;Multicast allowing rule(s):&lt;/P&gt;
&lt;P&gt;object-group network router-140&lt;BR /&gt;&amp;nbsp;network-object 192.168.1.1 255.255.255.255&lt;BR /&gt;access-list OUTSIDE extended permit igmp object-group router-140 224.0.0.0 255.0.0.0&lt;BR /&gt;access-list OUTSIDE extended permit udp object-group router-140 224.0.0.0 255.0.0.0 eq 1985&lt;BR /&gt;access-list OUTSIDE extended permit pim object-group router-140 224.0.0.0 255.0.0.0&lt;BR /&gt;access-list OUTSIDE extended permit igmp object-group router-140 host 239.2.0.2&lt;BR /&gt;access-list OUTSIDE extended permit udp object-group router-140 host 239.2.0.2 eq 1985&lt;BR /&gt;access-list OUTSIDE extended permit pim object-group router-140 host 239.2.0.2&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 06:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909994#M167891</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-02-26T06:55:09Z</dc:date>
    </item>
    <item>
      <title>I don't think multicast has</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909995#M167892</link>
      <description>&lt;P&gt;I don't think multicast has anything to do with your issue as TeamViewer runs over TCP 80 and 443. &amp;nbsp;But it doesn't hurt to put it back and test.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;With this configuration (removed other firewall rules, which do not match the intended traffic) Teamviewer seems to be able to create a direct connection over UDP between two hosts, each connected to one context.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;Are you saying that with the configuration you posted, teamviewer works?&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 07:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909995#M167892</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-26T07:20:05Z</dc:date>
    </item>
    <item>
      <title>I did not test with this</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909996#M167893</link>
      <description>&lt;P&gt;I did not test with this exact configuration (as there are a few specific TCP rules and one or two UDP rules, which are restricted to a source or destination IP and ports &amp;lt;5000), but yeah it worked.&lt;/P&gt;
&lt;P&gt;And here the log file of the two context (sorted by time, have a look at the same connection number, over the two context)&lt;/P&gt;
&lt;P&gt;"Receive Time",Severity,"Event Type ID","Event Name",Device,Source,"Source Service",Destination,"Destination Service",Action,Description&lt;BR /&gt;"2/25/16 2:28:29 PM",Informational,106100,"Permit/Denied by ACL",145-verw-client,192.168.1.27,udp/62486,192.168.0.232,udp/52436,denied,"access-list OUTSIDE denied udp outside/192.168.1.27(62486) -&amp;gt; inside/192.168.0.232(52436) hit-cnt 1 300-second interval [0xb74026ad, 0x0]"&lt;BR /&gt;"2/25/16 2:27:30 PM",Informational,302016,"Teardown UDP",140-id,192.168.0.232,udp/52436,192.168.1.27,udp/62486,teardown,"Teardown udp connection 905011109 for outside:192.168.0.232/52436 to inside:192.168.1.27/62486 duration 0:04:02 bytes 3951330"&lt;BR /&gt;"2/25/16 2:27:30 PM",Informational,302016,"Teardown UDP",145-verw-client,192.168.1.27,udp/62486,192.168.0.232,udp/52436,teardown,"Teardown udp connection 905011119 for outside:192.168.1.27/62486 to inside:192.168.0.232/52436 duration 0:04:02 bytes 3951138"&lt;BR /&gt;"2/25/16 2:23:28 PM",Informational,302015,"Built UDP",145-verw-client,192.168.0.232,udp/52436,192.168.1.27,udp/62486,built,"Built outbound udp connection 905011119 for outside:192.168.1.27/62486 (192.168.1.27/62486) to inside:192.168.0.232/52436 (192.168.0.232/52436)"&lt;BR /&gt;"2/25/16 2:23:28 PM",Informational,302015,"Built UDP",140-id,192.168.1.27,udp/62486,192.168.0.232,udp/52436,built,"Built outbound udp connection 905011109 for outside:192.168.0.232/52436 (192.168.0.232/52436) to inside:192.168.1.27/62486 (192.168.1.27/62486)"&lt;BR /&gt;"2/25/16 2:23:28 PM",Informational,106100,"Permit/Denied by ACL",145-verw-client,192.168.1.27,udp/62486,192.168.0.232,udp/52436,denied,"access-list OUTSIDE denied udp outside/192.168.1.27(62486) -&amp;gt; inside/192.168.0.232(52436) hit-cnt 1 first hit [0xb74026ad, 0x0]"&lt;BR /&gt;"2/25/16 2:16:21 PM",Informational,106100,"Permit/Denied by ACL",145-verw-client,192.168.1.27,udp/63200,192.168.0.232,udp/52620,denied,"access-list OUTSIDE denied udp outside/192.168.1.27(63200) -&amp;gt; inside/192.168.0.232(52620) hit-cnt 1 300-second interval [0xb74026ad, 0x0]"&lt;BR /&gt;"2/25/16 2:13:33 PM",Informational,302016,"Teardown UDP",140-id,192.168.0.232,udp/52620,192.168.1.27,udp/63200,teardown,"Teardown udp connection 904566675 for outside:192.168.0.232/52620 to inside:192.168.1.27/63200 duration 0:02:12 bytes 169875"&lt;BR /&gt;"2/25/16 2:13:33 PM",Informational,302016,"Teardown UDP",145-verw-client,192.168.1.27,udp/63200,192.168.0.232,udp/52620,teardown,"Teardown udp connection 904566683 for outside:192.168.1.27/63200 to inside:192.168.0.232/52620 duration 0:02:12 bytes 169683"&lt;BR /&gt;"2/25/16 2:11:20 PM",Informational,302015,"Built UDP",145-verw-client,192.168.0.232,udp/52620,192.168.1.27,udp/63200,built,"Built outbound udp connection 904566683 for outside:192.168.1.27/63200 (192.168.1.27/63200) to inside:192.168.0.232/52620 (192.168.0.232/52620)"&lt;BR /&gt;"2/25/16 2:11:20 PM",Informational,302015,"Built UDP",140-id,192.168.1.27,udp/63200,192.168.0.232,udp/52620,built,"Built outbound udp connection 904566675 for outside:192.168.0.232/52620 (192.168.0.232/52620) to inside:192.168.1.27/63200 (192.168.1.27/63200)"&lt;BR /&gt;"2/25/16 2:11:20 PM",Informational,106100,"Permit/Denied by ACL",145-verw-client,192.168.1.27,udp/63200,192.168.0.232,udp/52620,denied,"access-list OUTSIDE denied udp outside/192.168.1.27(63200) -&amp;gt; inside/192.168.0.232(52620) hit-cnt 1 first hit [0xb74026ad, 0x0]"&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 07:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909996#M167893</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-02-26T07:24:31Z</dc:date>
    </item>
    <item>
      <title>If your configuration works,</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909997#M167894</link>
      <description>&lt;P&gt;If your configuration works, what do you need help with?&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 07:26:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909997#M167894</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-26T07:26:27Z</dc:date>
    </item>
    <item>
      <title>I wonder why Teamviewer was</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909998#M167895</link>
      <description>&lt;P&gt;I wonder why Teamviewer was able to create this connection. Based on my knowledge it should have been blocked and not permitted and I wonder now if I have a big lack of understanding how the ASA handles UDP traffic, or whatever the reason was that this connection was not blocked.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 07:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909998#M167895</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-02-26T07:31:03Z</dc:date>
    </item>
    <item>
      <title>You are correct.  Context 2</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909999#M167896</link>
      <description>&lt;P&gt;You are correct. &amp;nbsp;Context 2 should have dropped the packet on the outside interface. &amp;nbsp;But perhaps there is a routing or switching problem somewhere between client 1 and client 2. &amp;nbsp;Have you double checked the topology to make sure that the traffic has no other rout to client 2 other than going through the outside interface of context 2?&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 15:15:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2909999#M167896</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-26T15:15:40Z</dc:date>
    </item>
    <item>
      <title>Yes I have, only thing I</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2910000#M167897</link>
      <description>&lt;P&gt;Yes I have, only thing I haven't checked (didn't check mac-addresses in wireshark) is Multicast.&lt;/P&gt;
&lt;P&gt;It looks as if both computer opened from their side of the firewall the same UDP connection and then the firewall allowed traffic directly over that connection. It even received (in my second try) the same connection ID on both context?!?&lt;/P&gt;
&lt;P&gt;Also you can clearly see that both context logged the connection, so the traffic went through both firewalls.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 15:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2910000#M167897</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-02-26T15:37:41Z</dc:date>
    </item>
    <item>
      <title>is this a virtualized setup</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2910001#M167898</link>
      <description>&lt;P&gt;is this a virtualized setup or is this on physical hardware?&lt;/P&gt;
&lt;P&gt;If it is virtualized, this could be an VM issue.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 27 Feb 2016 08:22:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2910001#M167898</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-27T08:22:46Z</dc:date>
    </item>
    <item>
      <title>It's a physical ASA 5585-X.</title>
      <link>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2910002#M167899</link>
      <description>&lt;P&gt;It's a physical ASA 5585-X.&lt;/P&gt;
&lt;P&gt;I actually think it might be because both clients open at the same time a same looking outgoing UDP connection (from their respective view) and the ASA decides to use that, from the other client opened, connection. Not sure how the ASA checks it's connection/xlate/orwhatever table for already existing connections.&lt;/P&gt;
&lt;P&gt;Could that be and should that be possible?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Feb 2016 08:04:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-understanding-allowed-teamviewer-udp-connection/m-p/2910002#M167899</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2016-02-29T08:04:51Z</dc:date>
    </item>
  </channel>
</rss>

