This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

XG Firewall and Netflix

I have recently changed my home network from a SG VM to XG VM running on ESXi

 

I am getting errors when running Netflix via Apple TV

 

To try get around this, I created a new firewall policy as follows:

  • Rule Name: Bypass Web
  • Source Zones: LAN
  • Source Networks and Devices: Bypass MAC's (with a MAC List with my ATV's in there)
  • Destination Zones: WAN
  • Destination Network: Any
  • Services: Any
  • Match known users: Unchecked
  • All Malware Scanning: Unchecked
  • Advanced:
    • Intrusion Prevention: None
    • Traffic Shaping Policy: None
    • Web Policy: None
    • Application Control: None
    • Apply Web Category based Traffic Shaping Policy: Unchecked
    • Apply Application based Traffic Shaping Policy: Unchecked
    • Rewrite source address (Masquerading): Checked

Even in the firewall log I get all green:

 

What am I doing wrong?

 

Thanks



This thread was automatically locked due to age.
Parents Reply Children
  • when you configured a fqdn, xg would automatically resolve all ip that associates with netflix. give it a try, let us know how it goes

     

    regards

     

    rap

  • OK, Thanks; so a quick google search found:

    1. netflix.com
    2. nflximg.com
    3. nflximg.net
    4. llnwd.net

    So I added those 4 under System --> FQDN Host

     

    Then Created a Host Group Called Netflix Host Group

     

    Then added that host group under Destination Networks.

     

    I will give this a try shortly.

     

    Thanks

  • Rap, it looks like all of your suggestions helped!

    The rule is working perfectly!!! 

     

    Thanks so much!

     

     

    I should also make note of one unrelated matter for anybody starting out

    Protect --> Intrusion Prevention --> DOS & Spoof Protection --> DOS Settings --> TCP Flood absolutely kills my connection. I go from 96/38mb to 1/1mb

     

  • Hi All, 

    Have updated the Netflix list and also check the Drop packets if any via command. 

    console drop 'host <Src Address>

    ^https?://([A-Za-z0-9.-]*\.)?ne?t?fli?x(img|ext|video)?\.(com|net)/
    ^http?://[A-Za-z0-9.-]*netflix.com/
    ^http?://[A-Za-z0-9.-]*nflximg.com/
    ^https?://([A-Za-z0-9.-]*\.)?nflximg\.com\.?/
    ^https?://([A-Za-z0-9.-]*\.)?nflxvideo\.net\.?/
    ^https?://([A-Za-z0-9.-]*\.)?netflix\.com/
    ^http?://([A-Za-z0-9.-]*\.)?netflix-*.vo.llnwd.net/.*
    ^https?://secure\.netflix\.com/*
    ^https?://uiboot\.netflix\.com/*
    ^http?://23.246.[0-63].*
    ^http?://37.77.1(8[4-9])|(9[0-1])].*
    ^http?://45.57.([0-1][0-1][0-9])|(12[0-7]).*
    ^http?://64.120.(12[8-9])|(1[3-9][0-9])|(2[0-4][0-9])|(25[0-5]).*
    ^http?://66.197.(12[8-9])|(1[3-9][0-9])|(2[0-4][0-9])|(25[0-5]).*
    ^http?://108.175.(3[2-5,8,9])|(4[0-4,6,7]).*
    ^http?://185.2.22[0-3].*
    ^http?://185.9.(188)|(19[0-1]).*
    ^http?://192.173.(6[4-9])|([7-9][0-9])|(10[0-9])|(11[0-7]).*
    ^http?://198.38.(9[6-9])|(10[2-3,8-9])|(11[0-9])|(12[0-5]).*
    ^http?://198.45.(4[8-9])|(5[2-8])|(6[1-3]).*

  • Hi  please make sure that you post that list with correct syntax. I know that it has been corrected in the KB article  https://community.sophos.com/kb/en-us/125061 after I had problems with it earlier

    For example I had unexpected results with the regex

    ^http?://198.45.(4[8-9])|(5[2-8])|(6[1-3]).* and was fixed by correcting the syntax to

    ^198\.45\.(4[8-9]|5[2-8]|6[1-3])\.*

     correctly identified the issue with the regex and the problem I was having and fixed the KB article.

    Also on a side note, I understand people using regex to bypass traffic for their phones/tablets and computers but it makes more sense to me to completely bypass webfiltering in firewall rules on pure streaming devices like roku, amazonfire, or appleTV etc.

     

  • It is hard for us to test with all the different streaming services, on all device types, in all versions of their products.

    For example, netflix using ips rather than hostnames, downloading using range requests with no mimetype.

    However specifically with Netflix and with the devices I've tested with and heard, the items in the KB article are the only ones that are required.  You may choose to do more, but AFAIK they are not required (there is a difference between excluding all NetFlix, excluding the failing video streams, or excluding the entire device).  If anyone is finding different, please let me know.

    Note: I have no expert knowledge in this, but I've heard that "smart devices" such as TVs and refrigerators are being increasing targets for hacking due to low security and ability to hide.  Hacked devices can be used for spying or more commonly botnets (do your own google searches for this).  I am personally not a proponent of excluding the entire device from the firewall.  You have no idea if the next variant of wannacry will enter your network through a TV and once there spread through OS vulnerabilities.

  • Haha, we are back to chicken and egg problem. Devices want to connect to the cloud and we don't trust the cloud (over simplification of the problem). I am not saying don't firewall the devices or disable any of the other NGFW protections, but url filtering brings nothing but headaches to any of the streaming devices. I didn't think of smart tvs because all my tvs are used as dumb devices but your point on smart tvs is taken. I do filter other IoT like my nest thermostat (not that I don't trust google[:$])

    On an unrelated note, I noticed that all the other vendors touted their protection for wannacry pretty soon after it was discovered however sophos never made any claims of such protection although IPS/AV signatures were updated to mitigate such traffic. The community board instead had warnings to patch the OS. Usually the marketing department never passes an opportunity to brag [:D] 

    P.S. Regarding my comments above on regex, I was recommending to tighten the list and not expand it.