129
Establishing your network
Defining security gateway routing
Configuring dynamic routing
The security gateway includes the RIP and OSPF portions of the GNU Zebra IP routing suite to support
dynamic routing. The GNU Zebra suite includes zebrad (the manager daemon) and two protocol
daemons: ripd and ospfd, that implement the RIP-2 and OSPF protocols, respectively. By default, GNU
Zebra is disabled, which means that both RIP and OSPF are also disabled as they are managed by GNU
Zebra.
Unlike other security gateway components, the log messages these daemons generate are not stored in
the security gateway’s log file. However, you can configure each daemon to log messages in their own
separate files. These separate log files are also stored on the security gateway.
Before you begin, you should use a text editor to review and familiarize yourself with the following
files:
■
/var/log/sg/ospfd.log
■
/var/log/sg/ripd.log
■
/var/log/sg/zebra.log
Note:
To verify that the advanced parameters for RIP and OSPF have taken effect, inspect the
/var/lib/sg/portcontrol.cf file and look for entries such as enable UDP 520 or enable IP 89.
Configuring RIP support
RIP is configured on each interface separately. Changes made here take affect immediately after
activating the configuration.
Prerequisites
None.
To configure RIP support
1
In the SGMI, in the left pane, under Assets, click
Network
.
2
In the right pane, on the Network Interfaces tab, select the interface on which you want to enable
RIP, and then click
Properties
.
3
In the Network Interface Properties dialog box, on the Routing tab, check
Allow multicast (UDP-
based) traffic
.
4
Check
Enable RIP on interface
.
5
In the Default Metric list box, select a value for this interface’s cost.
6
If you have decided to use authentication in your RIP network:
■
In the Authentication Mode list box, select the authentication mode you assigned to your RIP
routers.
■
In the Authentication Key text box, type the key you assigned to your RIP routers.
7
Click
OK
.
8
Optionally, do one of the following:
■
To save your configuration now an activate later, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...