Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Checkpoint FW1 NG equivalent command for Cisco PIX "fixup protocol rtsp 554"?

Posted on 2004-04-12
3
Medium Priority
?
2,202 Views
Last Modified: 2013-11-16
Does the Checkpoint FW1 NG support inspection of RTSP traffic on port 554 to open RealAudio UDP ports like the Cisco PIX does?

If so, how is this configured?

Quoting from the Cisco documentation:

"The fixup rtsp command lets PIX Firewall pass RTSP (Real Time Streaming Protocol) packets. RTSP is used by RealAudio, RealNetworks, Apple QuickTime 4, RealPlayer, and Cisco IP/TV connections."
0
Comment
Question by:nickswanjan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 23

Expert Comment

by:Tim Holman
ID: 10816240
Yes.  CheckPoint offers full inpsection of RTSP.
0
 
LVL 3

Author Comment

by:nickswanjan
ID: 10817745
Can you give me an idea of how to enable RTSP inspection?  I don't find it in the documentation.

I am looking for functionality similar to the described Cisco PIX function where the firewall inspects the RTSP and opens UDP ports based on the contents of the RTSP request from the inside client.  I don't want to statically leave a big range of ports open.
0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 1000 total points
ID: 10822094
A full list appears here:

http://www.checkpoint.com/products/protect/vpn-1_firewall-1_appsupport.html

To enable the sort of protection you require, all you would have to do would be to create a firewall rule with a RealAudio service object in it.  The stateful inspection and protocol awareness is included by default.

The PIX leaves this sort of thing out of the default configuration in order to decrease the size of the config file and keep performance to a maximum - so if you need it, you need to enable it.

That's why Check Point's configuration files are a hundred times the size of a standard PIX config file - absolutely everything is enabled to make configuration easier...  ;)
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
When speed and performance are vital to revenue, companies must have complete confidence in their cloud environment.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question