Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Configuring Forwarding Table (NSM Procedure)

    A forwarding table contains the routes actually used to forward packets through the device to their next-hop destination. This feature enables you to configure forwarding table in NSM.

    To configure forwarding table in NSM:

    1. In the navigation tree, select Device Manager > Devices .
    2. In the Devices list, double click the device to select it.
    3. Click the Configuration tab.
    4. In the configuration tree, expand Routing Options.
    5. Select Forwarding Table.
    6. Add or modify the parameters as specified in Table 1.
    7. Click one:
      • OK—To save the changes.
      • Cancel—To cancel the modifications.
      • Apply—To apply the routing option settings.

    Note: After you make changes to a device configuration, you must push that updated device configuration to the physical security device for those changes to take effect. You can update multiple devices at one time. See the Updating Devices section in the Network and Security Manager Administration Guide for more information.

    Table 1: Forwarding Table Fields

    Option

    Function

    Your Action

    Comment

    Specifies the comment for the forwarding table.

    Enter a comment.

    None

    Specifies that no next- hop parameter is to be added to the forwarding table.

    Select the option button.

    indirect-next-hop

    Specifies that the forwarding table supports indirectly connected next hops.

    Select the option button to enable indirect-next- hop.

    no-indirect-next-hop

    Specifies that the forwarding table does not support indirectly connected next hops.

    Select the option button to enable no-indirect-next- hop.

    Unicast Reverse Path

    Enables you to check path validity to protect the network from IP spoofing. A unicast reverse-path-forwarding (RPF) check performs a routing table lookup on an IP packet’s source address and checks the incoming interface. The device determines whether the packet is arriving from a path that the sender would use to reach the destination. If the packet is from a valid path, the device forwards the packet to the destination address. If it is not from a valid path, the device discards the packet.

    Select the path from the drop-down list.

    Export

    Enables you to apply one or more policies to routes being exported from the routing table into the forwarding table.

    1. Expand the Forwarding Table tree and select Export.
    2. Enter the export policies.

    Published: 2013-01-06