
Prestige 652 Series User’s Guide
IP Policy Routing
40-1
Chapter 40
IP Policy Routing
This chapter covers setting and applying policies used for IP routing.
40.1 IP Policy Routing Overview
Traditionally, routing is based on the destination address only and the IAD takes the shortest path to
forward a packet. IP Routing Policy (IPPR) provides a mechanism to override the default routing behavior
and alter the packet forwarding based on the policy defined by the network administrator. Policy-based
routing is applied to incoming packets on a per interface basis, prior to the normal routing.
40.2 Benefits of IP Policy Routing
•
Source-Based Routing – Network administrators can use policy-based routing to direct traffic from
different users through different connections.
•
Quality of Service (QoS) – Organizations can differentiate traffic by setting the precedence or TOS
(Type of Service) values in the IP header at the periphery of the network to enable the backbone to
prioritize traffic.
•
Cost Savings – IPPR allows organizations to distribute interactive traffic on high-bandwidth, high-cost
paths while using low-cost paths for batch traffic.
•
Load Sharing – Network administrators can use IPPR to distribute traffic among multiple paths.
40.3 Routing Policy
Individual routing policies are used as part of the overall IPPR process. A policy defines the matching
criteria and the action to take when a packet meets the criteria. The action is taken only when all the criteria
are met. The criteria includes the source address and port, IP protocol (ICMP, UDP, TCP, etc.), destination
address and port, TOS and precedence (fields in the IP header) and length. The inclusion of length criterion
is to differentiate between interactive and bulk traffic. Interactive applications, for example, telnet, tend to
have short packets, while bulk traffic, for example, file transfer, tends to have large packets.
The actions that can be taken include:
•
routing the packet to a different gateway (and hence the outgoing interface).
•
setting the TOS and precedence fields in the IP header.
Содержание Prestige 652 Series
Страница 1: ...Prestige 652 Series ADSL Security Wireless LAN Router User s Guide Version 3 40 June 2003...
Страница 30: ......
Страница 40: ...Prestige 652 Series User s Guide 1 10 Getting To Know Your Prestige Figure 1 4 Prestige LAN to LAN Application...
Страница 60: ......
Страница 62: ......
Страница 86: ......
Страница 99: ...Prestige 652 Series User s Guide WAN Setup 7 13 Figure 7 7 Advanced WAN Backup...
Страница 106: ......
Страница 108: ......
Страница 128: ......
Страница 130: ......
Страница 144: ......
Страница 150: ......
Страница 176: ......
Страница 177: ...VPN IPSec V Part V VPN IPSec This part provides information about configuring VPN IPSec for secure communications...
Страница 178: ......
Страница 192: ...Prestige 652 Series User s Guide 17 8 VPN Screens Figure 17 3 VPN IKE...
Страница 212: ......
Страница 214: ......
Страница 233: ...Maintenance VII Part VII Maintenance This part covers the maintenance screens...
Страница 234: ......
Страница 248: ......
Страница 250: ......
Страница 260: ......
Страница 276: ......
Страница 292: ......
Страница 334: ......
Страница 374: ......
Страница 396: ......
Страница 400: ......
Страница 410: ......
Страница 416: ......
Страница 432: ......
Страница 440: ......
Страница 446: ......
Страница 457: ...Prestige 652 Series User s Guide Wireless LAN and IEEE 802 11 C 3 Diagram C 2 ESS Provides Campus Wide Coverage...
Страница 458: ......
Страница 462: ......
Страница 502: ......
Страница 516: ......