Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. If you'd prefer to explore, try our test area to get started. And see here for current known issues.

New Member

FWSM 2.3 "fixup protocol rtsp" security question

Hi all,

We've recently implemented SonicFoundry's Mediasite system on campus and are having an interesting problem. It's a media content streaming solution (Mediasite) that uses RTSP.

A percentage of users external to the University cannot view the video streams, but a lot of others can. When testing, using our own external DSL connection, I also cannot view the video streams (same result from home using my personal DSL connection). After spending hours scanning packet-captures and knowledgebase articles I discovered that the inspection of RTSP packets - actioned because of the "fixup protocol rtsp" command in the FWSM 2.3 - could be the cause of the problem.

I switched this feature off and I was then able to view the streams from off, and on, campus.

My concern is this: being not overly experienced with the firewall, is turning off this inspection of RTSP leaving us open (or vulnerable) to anything else?

The organisation is pushing to turn off the protocol inspection, but I want to have a basic understanding of the security or functionality ramifications before I allow this to happen.

I've read the doco that I could find on but I find I'm still somewhat in the dark. As usual, all help greatly appreciated.


Ben Johnson


Re: FWSM 2.3 "fixup protocol rtsp" security question

The fixup rtsp command lets PIX Firewall pass RTSP (Real Time Streaming Protocol) packets. RTSP is used by RealAudio, RealNetworks, Apple QuickTime 4, RealPlayer, and Cisco IP/TV connections. PIX Firewall does not support multicast RTSP.

Firewall Services Module Frequently Asked Questions :