Created on ‎09-13-2011 02:14 AM
PCNSE
NSE
StrongSwan
 
 
 With traditional layer3 devices, they make routing decision solely via the  dst_address,  unless you have  RPF ( unicast verify )  or PBR routing going on.
 Here we make choice that include;  protocol, which interface it comes in, what src_address, but  this ( PBR )  is not the normal and any router, still looks up the destination address going forward.
 
 With multicast routing, the source address is just as important or more so  than the group subscription address of the subscriber. 
 
 So this where the problems comes into play , & with routing and more so with  Firewalls.
 
 e.g in you dns request example,
 
 
 you send a packet to the  dst_addr x.x.x.x:53/udp. Any router(s) involved thru the path , don' t make any  decision, based  on the source of the client, but rather via of  the  dst_addr of the target
 
 
 but in ..................
 
 
 
 In mcast routing, they (multicast-routers)  have more  complexity due to the dst_group  that a client is a member of, and the intra-routers, must show how know of the src_address(s) of the mcast and what interface to expect that src_address on, plus when and if I should forward it ( dense mode vrs sparse... igmp and group(s) subscriptions & leaves )
 
 
 Your not technically routing to an " address"  per se with multicast, sense an igmp subscriber could be at any part of the multicast tree.
 
 A lot of the newer firewalls does allow you to route local multicast and have options for IGMP proxy and setting of PIM Dense/Sparse mode interfaces. But to do this over a IPSEC tunnel, is yet to be seen.
 
 So unless you can define a tunnel interface, with ip_addres and PIM/IGMP multicast configurations, I highly doubt you can just send multicast traffic thru it ( ipsec/tunnel ) , without deploying a true native multicast architect underneath.
					
				
			
			
				PCNSE
NSE
StrongSwan
Created on ‎09-20-2011 12:55 AM
| User | Count | 
|---|---|
| 2727 | |
| 1416 | |
| 810 | |
| 738 | |
| 455 | 
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.