To enable PBR, create a redirect list. Redirect lists are defined by rules or routing policies. You can define
following parameters in routing policies or rules:
• IP address of the forwarding router (next-hop IP address)
• Protocol as defined in the header
• Source IP address and mask
• Destination IP address and mask
• Source port
• Destination port
• TCP Flags
After you apply a redirect-list to an interface, all traffic passing through it is subjected to the rules defined in
the redirect-list.
Traffic is forwarded based on the following:
• Next-hop addresses are verified. If the specified next hop is reachable, traffic is forwarded to the
specified next-hop.
• If the specified next-hops are not reachable, the normal routing table is used to forward the traffic.
• Dell Networking OS supports multiple next-hop entries in the redirect lists.
• Redirect-lists are applied at Ingress.
PBR with Redirect-to-Tunnel Option:
You can provide a tunnel ID for a redirect rule. In this case, the resolved next hop is the tunnel interface IP.
The qualifiers of the rule pertain to the inner IP details. You must provide a tunnel ID for the next hop to be a
tunnel interface. If you do not provide the tunnel destination IP as the next hop, the next hop is treated as an
IPv4 next hop and not a tunnel next hop.
PBR with Multiple Tracking Option:
PBR with the multiple tracking option enabled extends and introduces the capabilities of object tracking to
verify the next hop IP address before forwarding the traffic to the next hop. The multiple tracking options
feature is most suitable for routers which have multiple devices as the next hop (primarily indirect next-hops
and/or Tunnel Interfaces). These options allow you to backup Indirect next-hop with another. Choose the
specific Indirect next-hop and/or Tunnel interface which is available by sending ICMP pings to verify the
reach ability and/or check the Tunnel interface UP or DOWN status, and then route traffic out to that next-
hop and/or Tunnel Interface
Implementing PBR
• Non-contiguous bitmasks for PBR
• Hot-Lock PBR
Non-Contiguous Bitmasks for PBR
Non-contiguous bitmasks for PBR allows more granular and flexible control over routing policies. You can
include or exclude network addresses that are in the middle of a subnet can be included or excluded. Enter
specific bitmasks using the dotted decimal format.
Dell#show ip redirect-list
IP redirect-list rcl0:
Policy-based Routing (PBR)
768
Summary of Contents for S4048T
Page 1: ...Dell Configuration Guide for the S4048T ON System 9 10 0 1 ...
Page 98: ... saveenv 7 Reload the system uBoot mode reset Management 98 ...
Page 113: ...Total CFM Pkts 10303 CCM Pkts 0 LBM Pkts 0 LTM Pkts 3 LBR Pkts 0 LTR Pkts 0 802 1ag 113 ...
Page 411: ...mode transit no disable Force10 Resilient Ring Protocol FRRP 411 ...
Page 590: ...Figure 67 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 590 ...
Page 646: ...Figure 87 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 646 ...
Page 647: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 647 ...
Page 653: ...Figure 91 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 653 ...
Page 654: ...Figure 92 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 654 ...
Page 955: ...Figure 119 Single and Double Tag First byte TPID Match Service Provider Bridging 955 ...