Download presentation
Presentation is loading. Please wait.
Published byRudolf Johns Modified over 9 years ago
1
Policy Based Routing using ACL & Route Map By Group 7 Nischal (304360958) Pranali (304378534)
2
Access Control List ACL specifies which users or system processes are granted access to which objects. Access Control List refers to rules that are applied to port numbers or IP address that are available on host or on layer 3. Can be configured to control both inbound and outbound traffic that is very similar to working of firewall. ACLs are subject to security regulations and standards such as PCI, DSS.
3
Types of Access List Standard Access List Extended Access List Named Access List
4
Access List types cont.… Standard Access List These ACLs use only the source IP address in an IP packet as the condition test. All decisions are made based on the source IP address. This means that standard access lists basically permit or deny an entire suite of protocols.
5
Extended Access List They can evaluate source and destination IP addresses, the Protocol field in the Network layer header, and the port number at the Transport layer header. This gives extended access lists the ability to make much more granular decisions when controlling traffic. Access List types cont.…
6
Route Map A route map defines which of the routes from the specified routing protocol are allowed to be redistributed into the target routing process. Route maps have many features in common with widely known ACLs. Route maps are more flexible than ACLs and can verify routes based on criteria which ACLs can not verify.
7
Route Map contd... Route map using a permit clause Route map deny clause Route map permit or deny clause
8
Policy Based Routing (PBR) It provides a mechanism for expressing and implementing forwarding/routing of data packets based on the policies defined by the network administrators. Routers forward packets to the destination addresses based on information from static routes or dynamic routing protocols such as RIP, OSPF, or Enhanced IGRP.
9
Objectives
10
Benefits of PBR Source-Based Transist Provider Selection Quality of Service (QoS) Cost Saving Load Sharing
11
Topology
12
Configuration of Router
14
Configuring PBR
15
Verifying PBR
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.