137
Establishing your network
Allowing multicast traffic
To enable multicast support
◆
From a HyperTerminal connection, edit the raptor.init file located in the /etc/init.d directory. Use
the command:
/usr/raptor/bin/vpn set Callout/Multicast_Forwarding True
The example multicast interface in the raptor.init file below uses eth0 and eth2. Replace the
interface ID numbers with the proper IDs specific to your configuration.
The raptor.init file is not saved as part of the security gateway backup. To preserve the multicast
configuration when the appliance is restored, back up raptor.init and replace it if you restore your
appliance.
To configure the security gateway and each interface to support multicast
1
From an SRL or Microsoft HyperTerminal (serial port) connection to the security gateway, edit:
/etc/init.d/raptor.init
2
Insert the commands (see bold text), as they appear in the file below:
#!/bin/sh
#
# raptor startup file
#
PATH=/sbin:/usr/sbin:/usr/bin:/bin
JAVA_HOME=/usr/java/jre1.3.1_04
LD_LIBRARY_PATH=/usr/raptor/bin:$LD_LIBRARY_PATH
export PATH JAVA_HOME LD_LIBRARY_PATH
. /etc/rc.d/init.d/functions
case "$1" in
'start')
# Assign vpn0 address
/sbin/ifconfig vpn0 0.0.0.1 broadcast 0.0.0.0
/sbin/route add default dev vpn0 metric 2
# start up ups if needed
if [ -f /var/lib/sg/upsenable ]; then
/etc/rc.d/init.d/ups start
fi
# adds static routes
if [ -f /var/lib/sg/static-routes ]; then
grep "^NONE " /var/lib/sg/static-routes | while read ignore args ; do
/sbin/route add -$args
done
fi
# start the gateway
/usr/raptor/bin/startgw &
# multicast callout
/usr/raptor/bin/vpn set Callout/Multicast_Forwarding True
# multicast interface
ifconfig eth0 allmulti
ifconfig eth2 allmulti
;;
'stop')
appliance_name
[ -w /proc/lcd ] && echo -e "\003$SHORTNAME\nShutting down..." > /proc/lcd
[ -w /proc/sys/led_logo ] && echo high low > /proc/sys/led_logo
kill `ps ax | grep /raptor/ | grep -v grep | cut -c1-5`
sleep 5
kill -9 `ps ax | grep /raptor/ | grep -v grep | cut -c1-5`
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...