Displaying Routing Tables
It is important to note that routing tables that are initially configured by the administrator can have
routes added, deleted and changed automatically during live operation and these changes will appear
when the routing table contents are displayed.
These routing table changes can take place for different reasons. For example, if dynamic routing
with OSPF has been enabled then routing tables will become populated with new routes learned
from communicating with other OSPF routers in an OSPF network. Other events such as route
fail-over can also cause routing table contents to change over time.
Example 4.1. Displaying the main Routing Table
This example illustrates how to display the contents of the default main routing table.
Command-Line Interface
To see the configured routing table:
gw-world:/> cc RoutingTable main
gw-world:/main> show
Route
#
Interface
Network
Gateway
Local IP
-
---------
--------
-------------
--------
1
wan
all-nets
213.124.165.1
(none)
2
lan
lannet
(none)
(none)
3
wan
wannet
(none)
(none)
To see the active routing table enter:
gw-world:/> routes
Flags Network
Iface
Gateway
Local IP Metric
----- ------------------ ------- --------------- -------- ------
192.168.0.0/24
lan
0
213.124.165.0/24
wan
0
0.0.0.0/0
wan
213.124.165.1
0
Web Interface
To see the configured routing table:
1.
Go to Routing > Routing Tables
2.
Select the main routing table
The main window will list the configured routes
To see the active routing table in the Web Interface, select the Routes item in the Status dropdown menu in the
menu bar - the main window will list the active routing table
Tip: The CLI cc command may be needed first
In the CLI example above, it was necessary to first select the name of a specific
routing table with the cc command (meaning change category or change context)
before manipulating individual routes. This is necessary for any category that could
contain more than one named group of objects.
Default Static Routes are Added Automatically for Each Interface
When the NetDefend Firewall is started for the first time, NetDefendOS will automatically add a
4.2.2. Static Routing
Chapter 4. Routing
154
Summary of Contents for NetDefend DFL-260E
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382...
Page 386: ...The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533...