<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multicast Packets forwarding in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10712#M7895</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am also interested in this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am curious, however: We are in a similar boat, but instead of messing with the firewall, I just dropped the Apple TV in the appropriate VlAN 101 and called it good.&amp;nbsp; Do you have reason the Apple TVs can not be on VLAN 101?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 25 Feb 2013 19:00:13 GMT</pubDate>
    <dc:creator>BobW</dc:creator>
    <dc:date>2013-02-25T19:00:13Z</dc:date>
    <item>
      <title>Multicast Packets forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10708#M7891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quick simplifiy overview of the setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PA is the DHCP Server for two subnets:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subnet A&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;10.101.0.0/16&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subnet B&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;10.102.0.0./16&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All wireless clients are in subnet A&amp;nbsp; conencted via seperate enterprise Wireless LAn Controller and Apple TVs&amp;nbsp; also connected to the same WLC are in Subnet B. Subnet A and B and in seperate VLANs (VLAN101 and VLAN102)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment no clients can see the Apple TVs as the multicast Bonjour packets are not forwarded between these subnets. Is it possible to make the PA forward these packets between these subnets and then the icing on the cake would be then to use a policy to decided who can communicate with each Apple TV.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anybody tried anything similiar and can point me in the right direction??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jaggie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 15:38:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10708#M7891</guid>
      <dc:creator>JAG</dc:creator>
      <dc:date>2013-02-25T15:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast Packets forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10709#M7892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can forward multicast packets by enabling multicast in the virtual router and adding the interfaces in the interfaces tab. Some tweaking may be needed for the interface source/destination - this might help &lt;A __default_attr="2819" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; To determine who can communicate with what, I'm guessing you can just add the Apple TV's or TV subnet to an address object and permit/deny access using User-ID or subnets/objects. Depending on if you are L3 or L2 firewalling, this article may help as well &lt;A __default_attr="3947" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 16:39:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10709#M7892</guid>
      <dc:creator>das</dc:creator>
      <dc:date>2013-02-25T16:39:55Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast Packets forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10710#M7893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi das,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am working in L3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the subnets are connected to the same Vrouter and I have added IGMP and PIM on all of the interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am a little confused about the "Group Permissions" tab under VR - Multicast - Interface Group&amp;nbsp; - If I leave it balnk does that mean that all Multicast packets will be forwarded between all of the interfaces???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="MulticastPA.png" class="jive-image-thumbnail jive-image jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/5713_MulticastPA.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have then create a policy rule to allow all Multicast traffic though the required zones. I don't seem to see any Multicast traffic on the "Monitor" tab&amp;nbsp; - is this normal?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jaggie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 16:50:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10710#M7893</guid>
      <dc:creator>JAG</dc:creator>
      <dc:date>2013-02-25T16:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast Packets forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10711#M7894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As seen in the guide:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="H4_Head4" style="color: #000000; font-family: 'Tw Cen MT'; font-size: medium; font-weight: bold; margin: 12pt 0px 3pt;"&gt;&lt;A name="1488015"&gt;Security policy&lt;/A&gt;&lt;/P&gt;&lt;P class="T_Text" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 10pt; margin: 0px 0px 3pt;"&gt;&lt;A class="active_link" name="1488016"&gt;PAN-OS provides two methods to enforce security on multicast feeds. Multicast groups can be filtered in the IGMP and PIM group permission settings specified on an interface level. Multicast traffic must also be explicitly allowed by security policy. A special destination zone known as “Multicast” has been added and must be specified to control multicast traffic in security, QoS, and DoS protection rules. In contrast to unicast security policy, multicast security policies must be explicitly created when the source and destination interfaces are in the same zone. Security profiles are supported in multicast environments that require threat prevention capabilities.&lt;/A&gt;&lt;/P&gt;&lt;P class="T_Text" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 10pt; margin: 0px 0px 3pt;"&gt;&lt;/P&gt;&lt;P class="T_Text" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 10pt; margin: 0px 0px 3pt;"&gt;Also:&lt;/P&gt;&lt;TABLE cellspacing="0" class="TW_TableWide" style="margin: 10pt 0 12pt; padding: 5pt 6pt 3pt; color: #000000; font-family: 'Times New Roman'; font-size: medium;" summary=""&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding: 5pt 6pt 3pt;"&gt;&lt;P class="TB_TableBody" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; margin: 0px 0px 3pt; text-indent: 0pt;"&gt;&lt;A name="1477317"&gt;Group Permissions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding: 5pt 6pt 3pt;"&gt;&lt;P class="TB_TableBody" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; margin: 0px 0px 3pt; text-indent: 0pt;"&gt;&lt;A name="1477319"&gt;Specify general rules for multicast traffic:&lt;/A&gt;&lt;/P&gt;&lt;P class="TB1_TableBullet_outer" style="margin: 0px 0px 3pt;"&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" summary=""&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="TB1_TableBullet_inner" style="font-family: Palatino; font-size: 9pt; font-weight: bold;"&gt;•&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD width="100%"&gt;&lt;P class="TB1_TableBullet_inner" style="font-family: Palatino; font-size: 9pt; font-weight: bold;"&gt;&lt;SPAN style="font-family: 'Microsoft Sans Serif'; font-size: 9pt;"&gt;Any Source&lt;/SPAN&gt;&lt;SPAN style="font-weight: normal;"&gt;—Click &lt;/SPAN&gt;Add&lt;SPAN style="font-weight: normal;"&gt; to specify a list of multicast groups for which PIM-SM traffic is permitted.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P class="TB1_TableBullet_outer" style="margin: 0px 0px 3pt;"&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" summary=""&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="TB1_TableBullet_inner" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt;"&gt;•&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD width="100%"&gt;&lt;P class="TB1_TableBullet_inner" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt;"&gt;&lt;SPAN style="font-weight: bold;"&gt;Source-Specific&lt;/SPAN&gt;—Click &lt;SPAN style="font-weight: bold;"&gt;Add&lt;/SPAN&gt; to specify a list of multicast group and multicast source pairs for which PIM-SSM traffic is permitted.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 16:59:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10711#M7894</guid>
      <dc:creator>das</dc:creator>
      <dc:date>2013-02-25T16:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast Packets forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10712#M7895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am also interested in this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am curious, however: We are in a similar boat, but instead of messing with the firewall, I just dropped the Apple TV in the appropriate VlAN 101 and called it good.&amp;nbsp; Do you have reason the Apple TVs can not be on VLAN 101?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 19:00:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10712#M7895</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2013-02-25T19:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast Packets forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10713#M7896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Bob,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason that the ATVs cannot be in VLAN 101 is two fold:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FIrst of all, we are talking about an eventual 100 odd ATVs and the the ipad will only ever show 9 ( I think this s the correct number) in the list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;second is that as the clients are on an enterprise wireless solution they are in about 16 different buildings, but because they are in the same VLan no matter where they are they end up seeing ATVs that are over 1km away!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the idea is to separate the ATVs into the separate subnet and VLAN and then create rules in the PA for each ATV. I was then going to make a little app that the user launches and then choose the ATV that they want to see from a list. After submission from the app a server side routine updates the PA via the XML api to allow the users IP to access the ATV.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;well at least that is the plan! At the moment I have the clients and the ATV separated but cannot get the interface with the ATVs to forward the multicast packets to the interface with the clients on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas for me!?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 19:14:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10713#M7896</guid>
      <dc:creator>JAG</dc:creator>
      <dc:date>2013-02-25T19:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast Packets forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10714#M7897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not really a Palo Alto related fix, but, I have enabled a multicast filtering option in&amp;nbsp; on my wireless "Drop multicast packets from associated clients".&amp;nbsp; Thus the only units which can see the Apple TVs, must be connected to the same AP.&amp;nbsp; There may be some options like that in the switches as well depending on the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adding all those rule to the PA sounds like a nightmare!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 19:29:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10714#M7897</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2013-02-25T19:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast Packets forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10715#M7898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi das,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have followed the guides but I am still not getting anything. This is maybe more a question for support but if you havea ny ideas then I would be appreicative.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="MulticastGroupPermissions.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/5718_MulticastGroupPermissions.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 07:05:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10715#M7898</guid>
      <dc:creator>JAG</dc:creator>
      <dc:date>2013-02-26T07:05:20Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast Packets forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10716#M7899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could be wrong, but I don't think simple Multicast Routing will accomplish this.&amp;nbsp; This is almost more of a protocol forwarding option, like DHCP forwarding.&amp;nbsp; I haven't done research on this, but I would first google to see if there is a way of accomplishing this with a normal router.&amp;nbsp; If it can be done by configuring Multicast in a certain way then we may be able to do it on the firewall using standard Multicast configuration.&amp;nbsp; If not, broadcasting ATV traffic across L3 boundaries may take some type of proprietary solution, such as protocol (bonjour?) forwarding.&amp;nbsp; Note, that there is a reason why these protocols have broadcast-domain scope - they can be quite chatty, so it may not be in your best interest to break that model.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 02:17:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10716#M7899</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2013-02-27T02:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: Multicast Packets forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10717#M7900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I'm not sure if you've got this resolved yet, but I had a very similar requirement to route Multicast traffic between two different networks. I found that we could get multicast sessions working fine from our Cisco switches,&amp;nbsp; but when it needed to be routed, it wouldn't work. After going through the switch logs, it became apparent that the default IGMP query interval on the switches and the PA firewall are different. It was 60 seconds on the switches and 125 seconds on the firewall. These query intervals need to be synchronous for it to work. After setting it to 60 seconds on the firewall, I could get multicast sessions working over different networks, routed by the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I took the example they gave here: &lt;SPAN style="color: #1f497d; font-family: 'Calibri','sans-serif'; font-size: 11pt; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-4197"&gt;https://live.paloaltonetworks.com/docs/DOC-4197&lt;/A&gt;&lt;/SPAN&gt; which is designed for multcasting between two PA firewalls and re-accomodated it for multicast routing on just 1 firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 23:29:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multicast-packets-forwarding/m-p/10717#M7900</guid>
      <dc:creator>alexander_conn</dc:creator>
      <dc:date>2013-04-25T23:29:12Z</dc:date>
    </item>
  </channel>
</rss>

