Solved

Why would Multicasting be set to go from the Nokia to the multicast network?

Posted on 2008-06-09
8
315 Views
Last Modified: 2010-04-09
The title says it all.  I have 2 checkpoint firewalls that have the source as themselves and the destination as the multicast network (224.0.0.0 255.0.0.0).  Does this make any sense to anyone?  Why would this be the case?  I know nothing about the Nokias, but I'm familiar with basic firewall setup.
0
Comment
Question by:awakenings
  • 4
  • 3
8 Comments
 
LVL 13

Expert Comment

by:kdearing
ID: 21747074
Those are probably discovery type protocols running.
0
 

Author Comment

by:awakenings
ID: 21750522
If people could provide a URL supporting their position, it would be appreciated.

Thanks,

Awakenings
0
 
LVL 13

Accepted Solution

by:
kdearing earned 500 total points
ID: 21768166
The 224.0.0.0 multicast range is reserved for local LAN traffic.
It is used for things like router discovery, routing protocols, etc.
http://www.firewall.cx/multicast-ip-list.php
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 

Author Comment

by:awakenings
ID: 21768655
Thanks.  Any clues for Nokia (Checkpoint)?  I need a specific answer.

Thanks,

Awakenings
0
 
LVL 13

Expert Comment

by:kdearing
ID: 21774409
No, I don't have anything specific for you.
It all depends on how the Checkpoint is configured, what services are running, what protocols, etc.
0
 

Author Comment

by:awakenings
ID: 21780205
I just found out the reason.  It is required for Checkpoint Clustering.  I haven't found a URL yet though.  This is from the network team.
0
 
LVL 13

Expert Comment

by:kdearing
ID: 23034291
This question is still open.
Is the problem resolved?
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Join & Write a Comment

Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now