Example 4.9. Forwarding of Multicast Traffic using the SAT Multiplex Rule
In this example, we will create a multiplex rule in order to forward the multicast groups 239.192.10.0/24:1234 to
the interfaces if1, if2 and if3. All groups have the same sender 192.168.10.1 which is located somewhere behind
the wan interface. The multicast groups should only be forwarded to the out interfaces if clients behind those
interfaces have requested the groups using IGMP. The following steps need to be executed to configure the
actual forwarding of the multicast traffic. IGMP has to be configured separately.
Web Interface
A. Create a custom service for multicast called multicast_service:
1.
Go to Objects > Services > Add > TCP/UDP
2.
Now enter:
•
Name: multicast_service
•
Type: UDP
•
Destination: 1234
B. Create an IP rule:
1.
Go to Rules > IP Rules > Add > IP Rule
2.
Under General enter.
•
Name: a name for the rule, for example Multicast_Multiplex
•
Action: Multiplex SAT
•
Service: multicast_service
3.
Under Address Filter enter:
•
Source Interface: wan
•
Source Network: 192.168.10.1
•
Destination Interface: core
•
Destination Network: 239.192.10.0/24
4.
Click the Multiplex SAT tab and add the output interfaces if1, if2 and if3 one at a time. For each interface,
leave the IPAddress field blank since no destination address translation is wanted.
5.
Make sure the forwarded using IGMP checkbox is set
6.
Click OK
Creating Multiplex Rules with the CLI
Creating multiplex rules through the CLI requires some additional explanation.
First, the IPRuleset, in this example main, needs to be selected as the current category:
gw-world:/> cc IPRuleset main
The CLI command to create the multiplex rule is then:
add IPRule SourceNetwork=<srcnet> SourceInterface=<srcif>
DestinationInterface=<srcif> DestinationNetwork=<destnet>
Action=MultiplexSAT Service=<service>
MultiplexArgument={outif1;ip1},{outif2;ip2},{outif3;ip3}...
4.6.2. Multicast Forwarding using the
SAT Multiplex Rule
Chapter 4. Routing
157
Summary of Contents for 800 - DFL 800 - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...