SlideShare a Scribd company logo
How to Configure PBR (Policy-Based Routing)?
Policy-Based Routing (PBR) is a very popular feature in Cisco routers; it allows the creation of
policies that can selectively alter the path that packets take within the network.
PBR provides a method to forward packets by overriding the information available in the IP
routing table. By using PBR, customers can implement policies that selectively cause packets to
take different paths. Traditional IP routing forwards packets based only on the destination IP
address in the packet. PBR can be configured to forward packets based on other criteria, such as
source address, application and the length of the packet.
PBR provides advantages like Source-Based Transit Provider Selection when multihomed to
different providers. This provides cost savings by distributing interactive traffic among low
bandwidth, low cost paths and batch traffic over high bandwidth, high cost paths. PBR can be
used to implement QoS by classifying and marking packets with IP precedence values in the Type
of Service (ToS) field of the IP header. The routers in the core can then implement queuing
techniques to prioritize the already marked traffic. PBR can also be used to route the packets over
specific traffic engineered paths, which provide the desired QoS through the network.
Configuration Overview:
PBR on Cisco router can configure using following steps:
Step1: Configure ACLs.
Permit statement in ACL is what will be matched. You don’t want to permit everything,by default
the implicit deny at the bottom of the ACL and just create an ACL that permits what you going to
take action on in the route-map.
Example:
Router(config)# access-list 101 permit ip any host 10.1.1.1(This ACL permits only traffic with a
destination IP of 10.1.1.1)
Step2: Configure route map instances.
Route maps are similar to Access Control Lists (ACLs), but have these enhanced capabilities:
->Modifying certain fields in the packet.
->Forwarding packets in a specified manner.
->Filtering and modifying the attributes of a route.
Route maps can have a sequence of statements. Each entry in a route map statement contains a
combination of match and set commands. The route map statements also have a permit or deny
action. For PBR, the match command defines the criteria for matching the packets based on the
1
defined policy. The set command defines the action to be taken on the matched packets. The action
could either be modifying or forwarding the packet, bypassing the normal routing based on the IP
routing table. Packets that are denied by a route map statement, or those that are not matched by
any statement, are forwarded normally based on the IP routing table.
Route map can configured by issuing the route-map map-tag [permit | deny] [sequence-number]
command in global configuration mode.
Example:
Router(config)# route-map 101traffic permit 10
Step3: Configure match commands.
PBR allows the user to match packets based on the length and characteristics of a packet, using a
standard or extended ACL.
To define the matching criteria based on the policy, issue these commands from route map
configuration mode:
match length minimum-length maximum-length
match ip address {access-list-number | access-list-name}
Step4: Configure set commands.
Define the action to be taken on the packets that match the criteria using set command.
For PBR, this can be done by one of these options:
->A list of interfaces through which the packets should be routed.
->A list of specified next-hop IP addresses to which the packets have to be routed.
->A list of default interfaces.
->A list of default next-hop IP addresses.
->IP precedence or ToS values in the packet.
Issue these commands in route map configuration mode:
->set interface interface-type interface-number
->set ip next-hop ip-address
->set default interface interface-type interface-number
->set ip default next-hop ip-address
->set ip precedence [number | name]
->set ip tos [number]
Step5: Configure PBR on the interface.
You need to apply this policy/route-map to the interface where the traffic is coming in.
Example:
2
Router(config)# interface Fast Ethernet 0/0
Router(config-if)#ip policy route-map reroute10traffic
Step6: (Optional) Configure local PBR.
Packets that are generated by the router are not normally policy routed. To enable PBR for packets
generated by the router, issue the
ip local policy route-map <Route map name> command.
Example:
Router(config)#ip local policy route-map 101traffic
Verification Command:
->To test the policy, issue show route-map command on router.You will able to determine whether
packets are being policy routed.
->To check policy,issue Show ip policy command.
Reference:
Configuring Policy-Based Routing:
Policy-Based Routing
Understanding Policy Routing
IPv6 Policy Based Routing (PBR)
Original Doc from: https://supportforums.cisco.com/docs/DOC-1634

3Anetwork.com is a world leading Cisco networking products wholesaler, we wholesale
original new Cisco networking equipments, including Cisco Catalyst switches, Cisco
routers, Cisco firewalls, Cisco wireless products, Cisco modules and interface cards
products at competitive price and ship to worldwide.
Our website: http://www.3anetwork.com
Telephone: +852-3069-7733
Email: info@3Anetwork.com
Address: 23/F Lucky Plaza, 315-321 Lockhart Road, Wanchai, Hongkong

3

More Related Content

What's hot

B G P O S P F Interaction Report
B G P  O S P F  Interaction  ReportB G P  O S P F  Interaction  Report
B G P O S P F Interaction Report
gobed
 
BGP
BGP BGP
BGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
BGP Path Selection & Attributes BGP Weight & BGP AS-Path PrependingBGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
BGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
Shawan Roy
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
Reza Farahani
 
3 ip routing part b
3 ip routing part b3 ip routing part b
3 ip routing part b
SagarR24
 
Bgp For Presentation
Bgp For PresentationBgp For Presentation
Bgp For Presentation
Alp isik
 
214270 configure-aci-multi-site-deployment
214270 configure-aci-multi-site-deployment214270 configure-aci-multi-site-deployment
214270 configure-aci-multi-site-deployment
coolboyasif
 
Mpls Services
Mpls ServicesMpls Services
Mpls Services
Kristof De Brouwer
 
BGP
BGPBGP
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
APNIC
 
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOLEnhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Nutan Singh
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basics
Mustafa Golam
 
Ip services
Ip servicesIp services
Ip services
Student
 
Ccnp enterprise workbook v1.0 bgp zero to hero
Ccnp enterprise workbook v1.0 bgp zero to heroCcnp enterprise workbook v1.0 bgp zero to hero
Ccnp enterprise workbook v1.0 bgp zero to hero
SagarR24
 
BGP
BGPBGP
BGP
KHNOG
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
Netwax Lab
 
Cisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review NotesCisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review Notes
Duane Bodle
 
BGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route MapBGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route Map
NetProtocol Xpert
 
3 ip routing bgp-updated
3 ip routing bgp-updated3 ip routing bgp-updated
3 ip routing bgp-updated
SagarR24
 
Ospf
OspfOspf
Ospf
amit khunte
 

What's hot (20)

B G P O S P F Interaction Report
B G P  O S P F  Interaction  ReportB G P  O S P F  Interaction  Report
B G P O S P F Interaction Report
 
BGP
BGP BGP
BGP
 
BGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
BGP Path Selection & Attributes BGP Weight & BGP AS-Path PrependingBGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
BGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
 
3 ip routing part b
3 ip routing part b3 ip routing part b
3 ip routing part b
 
Bgp For Presentation
Bgp For PresentationBgp For Presentation
Bgp For Presentation
 
214270 configure-aci-multi-site-deployment
214270 configure-aci-multi-site-deployment214270 configure-aci-multi-site-deployment
214270 configure-aci-multi-site-deployment
 
Mpls Services
Mpls ServicesMpls Services
Mpls Services
 
BGP
BGPBGP
BGP
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOLEnhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basics
 
Ip services
Ip servicesIp services
Ip services
 
Ccnp enterprise workbook v1.0 bgp zero to hero
Ccnp enterprise workbook v1.0 bgp zero to heroCcnp enterprise workbook v1.0 bgp zero to hero
Ccnp enterprise workbook v1.0 bgp zero to hero
 
BGP
BGPBGP
BGP
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
 
Cisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review NotesCisco BGP Exam 642-661 Review Notes
Cisco BGP Exam 642-661 Review Notes
 
BGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route MapBGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route Map
 
3 ip routing bgp-updated
3 ip routing bgp-updated3 ip routing bgp-updated
3 ip routing bgp-updated
 
Ospf
OspfOspf
Ospf
 

Similar to How to configure pbr (policy based routing)

Pbroute
PbroutePbroute
Pbroute
neillien
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
phanleson
 
BSCI30S05 Redistribution, DHCP.pptx
BSCI30S05 Redistribution, DHCP.pptxBSCI30S05 Redistribution, DHCP.pptx
BSCI30S05 Redistribution, DHCP.pptx
sumankumar770546
 
Configurasi ospf
Configurasi ospfConfigurasi ospf
Configurasi ospf
amri am
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
ManuelRojas960410
 
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4
Chaing Ravuth
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solution
Arnold Derrick Kinney
 
ospf-config.pdf
ospf-config.pdfospf-config.pdf
ospf-config.pdf
Denis Rasskazov
 
1cospf
1cospf1cospf
1cospf
1cospf1cospf
Route static Configuration
Route static ConfigurationRoute static Configuration
Route static Configuration
Gausul Azam
 
Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guide
Abel Saduwa
 
CCCNP ROUTE v6_ch05
CCCNP ROUTE  v6_ch05CCCNP ROUTE  v6_ch05
Fortigatefirewall routing specficatoinmmm
Fortigatefirewall routing specficatoinmmmFortigatefirewall routing specficatoinmmm
Fortigatefirewall routing specficatoinmmm
maheshumanath1
 
DBodle QoS Exam Study Notes
DBodle QoS Exam Study NotesDBodle QoS Exam Study Notes
DBodle QoS Exam Study Notes
Duane Bodle
 
Lec7
Lec7Lec7
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
Netwax Lab
 
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
Netwax Lab
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
SagarR24
 
PLNOG 4: Klaudiusz Staniek - Efficient Technique for Enforcing Internet Peeri...
PLNOG 4: Klaudiusz Staniek - Efficient Technique for Enforcing Internet Peeri...PLNOG 4: Klaudiusz Staniek - Efficient Technique for Enforcing Internet Peeri...
PLNOG 4: Klaudiusz Staniek - Efficient Technique for Enforcing Internet Peeri...
PROIDEA
 

Similar to How to configure pbr (policy based routing) (20)

Pbroute
PbroutePbroute
Pbroute
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
 
BSCI30S05 Redistribution, DHCP.pptx
BSCI30S05 Redistribution, DHCP.pptxBSCI30S05 Redistribution, DHCP.pptx
BSCI30S05 Redistribution, DHCP.pptx
 
Configurasi ospf
Configurasi ospfConfigurasi ospf
Configurasi ospf
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solution
 
ospf-config.pdf
ospf-config.pdfospf-config.pdf
ospf-config.pdf
 
1cospf
1cospf1cospf
1cospf
 
1cospf
1cospf1cospf
1cospf
 
Route static Configuration
Route static ConfigurationRoute static Configuration
Route static Configuration
 
Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guide
 
CCCNP ROUTE v6_ch05
CCCNP ROUTE  v6_ch05CCCNP ROUTE  v6_ch05
CCCNP ROUTE v6_ch05
 
Fortigatefirewall routing specficatoinmmm
Fortigatefirewall routing specficatoinmmmFortigatefirewall routing specficatoinmmm
Fortigatefirewall routing specficatoinmmm
 
DBodle QoS Exam Study Notes
DBodle QoS Exam Study NotesDBodle QoS Exam Study Notes
DBodle QoS Exam Study Notes
 
Lec7
Lec7Lec7
Lec7
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
PLNOG 4: Klaudiusz Staniek - Efficient Technique for Enforcing Internet Peeri...
PLNOG 4: Klaudiusz Staniek - Efficient Technique for Enforcing Internet Peeri...PLNOG 4: Klaudiusz Staniek - Efficient Technique for Enforcing Internet Peeri...
PLNOG 4: Klaudiusz Staniek - Efficient Technique for Enforcing Internet Peeri...
 

Recently uploaded

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 

Recently uploaded (20)

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 

How to configure pbr (policy based routing)

  • 1. How to Configure PBR (Policy-Based Routing)? Policy-Based Routing (PBR) is a very popular feature in Cisco routers; it allows the creation of policies that can selectively alter the path that packets take within the network. PBR provides a method to forward packets by overriding the information available in the IP routing table. By using PBR, customers can implement policies that selectively cause packets to take different paths. Traditional IP routing forwards packets based only on the destination IP address in the packet. PBR can be configured to forward packets based on other criteria, such as source address, application and the length of the packet. PBR provides advantages like Source-Based Transit Provider Selection when multihomed to different providers. This provides cost savings by distributing interactive traffic among low bandwidth, low cost paths and batch traffic over high bandwidth, high cost paths. PBR can be used to implement QoS by classifying and marking packets with IP precedence values in the Type of Service (ToS) field of the IP header. The routers in the core can then implement queuing techniques to prioritize the already marked traffic. PBR can also be used to route the packets over specific traffic engineered paths, which provide the desired QoS through the network. Configuration Overview: PBR on Cisco router can configure using following steps: Step1: Configure ACLs. Permit statement in ACL is what will be matched. You don’t want to permit everything,by default the implicit deny at the bottom of the ACL and just create an ACL that permits what you going to take action on in the route-map. Example: Router(config)# access-list 101 permit ip any host 10.1.1.1(This ACL permits only traffic with a destination IP of 10.1.1.1) Step2: Configure route map instances. Route maps are similar to Access Control Lists (ACLs), but have these enhanced capabilities: ->Modifying certain fields in the packet. ->Forwarding packets in a specified manner. ->Filtering and modifying the attributes of a route. Route maps can have a sequence of statements. Each entry in a route map statement contains a combination of match and set commands. The route map statements also have a permit or deny action. For PBR, the match command defines the criteria for matching the packets based on the 1
  • 2. defined policy. The set command defines the action to be taken on the matched packets. The action could either be modifying or forwarding the packet, bypassing the normal routing based on the IP routing table. Packets that are denied by a route map statement, or those that are not matched by any statement, are forwarded normally based on the IP routing table. Route map can configured by issuing the route-map map-tag [permit | deny] [sequence-number] command in global configuration mode. Example: Router(config)# route-map 101traffic permit 10 Step3: Configure match commands. PBR allows the user to match packets based on the length and characteristics of a packet, using a standard or extended ACL. To define the matching criteria based on the policy, issue these commands from route map configuration mode: match length minimum-length maximum-length match ip address {access-list-number | access-list-name} Step4: Configure set commands. Define the action to be taken on the packets that match the criteria using set command. For PBR, this can be done by one of these options: ->A list of interfaces through which the packets should be routed. ->A list of specified next-hop IP addresses to which the packets have to be routed. ->A list of default interfaces. ->A list of default next-hop IP addresses. ->IP precedence or ToS values in the packet. Issue these commands in route map configuration mode: ->set interface interface-type interface-number ->set ip next-hop ip-address ->set default interface interface-type interface-number ->set ip default next-hop ip-address ->set ip precedence [number | name] ->set ip tos [number] Step5: Configure PBR on the interface. You need to apply this policy/route-map to the interface where the traffic is coming in. Example: 2
  • 3. Router(config)# interface Fast Ethernet 0/0 Router(config-if)#ip policy route-map reroute10traffic Step6: (Optional) Configure local PBR. Packets that are generated by the router are not normally policy routed. To enable PBR for packets generated by the router, issue the ip local policy route-map <Route map name> command. Example: Router(config)#ip local policy route-map 101traffic Verification Command: ->To test the policy, issue show route-map command on router.You will able to determine whether packets are being policy routed. ->To check policy,issue Show ip policy command. Reference: Configuring Policy-Based Routing: Policy-Based Routing Understanding Policy Routing IPv6 Policy Based Routing (PBR) Original Doc from: https://supportforums.cisco.com/docs/DOC-1634 3Anetwork.com is a world leading Cisco networking products wholesaler, we wholesale original new Cisco networking equipments, including Cisco Catalyst switches, Cisco routers, Cisco firewalls, Cisco wireless products, Cisco modules and interface cards products at competitive price and ship to worldwide. Our website: http://www.3anetwork.com Telephone: +852-3069-7733 Email: info@3Anetwork.com Address: 23/F Lucky Plaza, 315-321 Lockhart Road, Wanchai, Hongkong 3