<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Video feed through ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894223#M458165</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you tried with :&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;inspect h323 h225&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;inspect h323 ras&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Mar 2012 06:29:17 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-03-15T06:29:17Z</dc:date>
    <item>
      <title>Video feed through ASA</title>
      <link>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894220#M458158</link>
      <description>&lt;P&gt;I have a setup using an ASA 5510 8.2(2). In the DMZ (192.168.12.x) there is a server, switch and multiple cameras for surveillance of the site. In the Inside (140.152.25.x) are the pcs that can run the client software to view the video feed, or it can pull from the server in the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the server in the DMZ, you can see the feed, along with any pc you connect to that network.&lt;/P&gt;&lt;P&gt;On any machine on the Inside, or through VPN, you cannot either with the client software or pulling from the surveillance server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am watching the connection through ASDM and don’t see any particular port being blocked, but I do see TCP connections being terminated by inspection. So far I’ve taken out inspections for http and rstp. I don’t really see anything else that would drop video. I've attached the error I keep seeing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have experience with something similar?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect ip-options&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ethernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 140.152.25.1&amp;nbsp;&amp;nbsp; 255.255.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CONFIG&lt;/P&gt;&lt;P&gt;Ethernet0/3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.12.1&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; CONFIG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 140.152.0.0 255.255.0.0 192.168.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ROKVPN_splitTunnelAcl standard permit 192.168.12.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list DMZ_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 140.152.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list DMZ_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 192.168.220.0 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside_access_out in interface Inside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894220#M458158</guid>
      <dc:creator>jef_rat72</dc:creator>
      <dc:date>2019-03-11T22:42:06Z</dc:date>
    </item>
    <item>
      <title>Video feed through ASA</title>
      <link>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894221#M458159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wonder if this is a NAT issue similar to what I am asking about here: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/message/3585157#3585157"&gt;https://supportforums.cisco.com/message/3585157#3585157&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scenario seems similar in the sense that we both have services on different interfaces that we are trying to access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2012 20:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894221#M458159</guid>
      <dc:creator>Mark^</dc:creator>
      <dc:date>2012-03-14T20:00:34Z</dc:date>
    </item>
    <item>
      <title>Video feed through ASA</title>
      <link>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894222#M458160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, I take that back.&amp;nbsp; I'm no expert, but in looking at your screenshot, I wonder if there is a policy in place that is blocking private addresses (192.168.x.x in this case) from traversing the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An address like that will be dropped at my outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2012 20:04:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894222#M458160</guid>
      <dc:creator>Mark^</dc:creator>
      <dc:date>2012-03-14T20:04:49Z</dc:date>
    </item>
    <item>
      <title>Video feed through ASA</title>
      <link>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894223#M458165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you tried with :&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;inspect h323 h225&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;inspect h323 ras&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 06:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894223#M458165</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-03-15T06:29:17Z</dc:date>
    </item>
    <item>
      <title>Video feed through ASA</title>
      <link>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894224#M458169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post " sh service-policy inspect http " ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also is "inside_access_out" supposed to be in applied in the "in" direction of the inside interface ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 12:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894224#M458169</guid>
      <dc:creator>sguirguis</dc:creator>
      <dc:date>2012-03-15T12:46:43Z</dc:date>
    </item>
    <item>
      <title>Video feed through ASA</title>
      <link>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894225#M458170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sh service-policy inspect http&lt;/P&gt;&lt;P&gt;Global policy: &lt;BR /&gt;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: http, packet 1510005, drop 0, reset-drop 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm new to this ASA, I've questioned that access list myself, but am not positive why it has been set up the way it has.&amp;nbsp; I've been on the phone with TAC, so far they have not been able to come up with an answer, but still working on it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 14:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894225#M458170</guid>
      <dc:creator>jef_rat72</dc:creator>
      <dc:date>2012-03-15T14:50:50Z</dc:date>
    </item>
    <item>
      <title>Video feed through ASA</title>
      <link>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894226#M458171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; jcarvaja, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes I have.&amp;nbsp; And I've removed all inspect commands, same issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 14:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894226#M458171</guid>
      <dc:creator>jef_rat72</dc:creator>
      <dc:date>2012-03-15T14:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: Video feed through ASA</title>
      <link>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894227#M458172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just an FYI the problem was that there is a CSC module on the ASA.&amp;nbsp; In the config was the command "csc fail-open" under a global-glass.&amp;nbsp; This was allowing the return traffic to come back un-inspected, which prompted the "TCP closed by inspection" error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once the "csc fail-open" command was removed, cameras worked.&amp;nbsp; I just set up an access-list to block the security traffic from reaching the CSC module.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 17:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/video-feed-through-asa/m-p/1894227#M458172</guid>
      <dc:creator>jef_rat72</dc:creator>
      <dc:date>2012-03-15T17:14:32Z</dc:date>
    </item>
  </channel>
</rss>

