The key aspect of an OSPF setup is that connected NetDefend Firewalls share the information in
their routing tables so that traffic entering an interface on one of the firewalls can be automatically
routed so that it exits the interface on another gateway which is attached to the correct destination
network.
Another important aspect is that the firewalls monitor the connections between each other and route
traffic by an alternate connection if one is available. A network topology can therefore be designed
to be fault tolerant. If a connection between two firewalls fails then any alternate route that also
reaches the destination will be used.
4.5.3. OSPF Components
This section looks at the NetDefendOS objects that need to be configured for OSPF routing.
Defining these objects creates the OSPF network. The objects should be defined on each NetDefend
Firewall that is part of the OSPF network and should describe the same network.
An illustration of the relationship between NetDefendOS OSPF objects is shown below.
Figure 4.12. NetDefendOS OSPF Objects
4.5.3.1. OSPF Router Process
This object defines the autonomous system (AS) which is the top level of the OSPF network. A
similar Router Process object should be defined on each NetDefend Firewall which is part of the
OSPF network.
General Parameters
Name
Specifies a symbolic name for the OSPF AS.
Router ID
Specifies the IP address that is used to identify the router in a
AS. If no Router ID is configured, the firewall computes the
Router ID based on the highest IP address of any interface
participating in the OSPF AS.
Private Router ID
This is used in an HA cluster and is the ID for this firewall and
4.5.3. OSPF Components
Chapter 4. Routing
184
Summary of Contents for NetDefend DFL-260E
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382...
Page 386: ...The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533...