Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
53-8
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 53 Configuring Multicast Policies on Firewall Devices
Configuring Multicast Routes
Field Reference
Configuring Multicast Routes
Static multicast routes let you separate multicast traffic from unicast traffic. For example, when a path
between a source and destination does not support multicast routing, the solution is to configure two
multicast devices with a GRE tunnel between them, sending the multicast packets over the tunnel.
Static multicast routes are local to the security appliance and are not advertised or redistributed.
Use the Multicast Routes page to manage static multicast routes—currently defined routes are listed, and
you can add, edit and delete static multicast routes.
See Add/Edit MRoute Configuration Dialog Box, page 53-8 for more information about the fields
displayed in the table on this page.
Navigation Path
(Device view) Select Platform > Multicast > Multicast Routes from the Device Policy selector.
(Policy view) Select PIX/ASA/FWSM Platform > Multicast > Multicast Routes from the Policy
Type selector. Select an existing policy from the Shared Policy selector, or create a new one.
Related Topics
Chapter 53, “Configuring Multicast Policies on Firewall Devices”
Enabling PIM and IGMP, page 53-1
Configuring IGMP, page 53-2
Configuring PIM, page 53-11
Add/Edit MRoute Configuration Dialog Box
Use the Add/Edit MRoute Configuration dialog box to add a static multicast route to the security
appliance, or to change an existing route.
Navigation Path
You can access the Add/Edit MRoute Configuration dialog box from the Multicast Routing page. See
Configuring Multicast Routes, page 53-8 for more information.
Table 53-7 Configure IGMP Join Group Parameters Dialog Box
Element Description
Interface The name of the interface for which you are configuring multicast
group membership.
Join Group The multicast group address to which this rule applies. The group
address must be from 224.0.0.0 to 239.255.255.255.