Proxicast LAN-Cell 2 User's Guide Page 343

  • Download
  • Add to my manuals
  • Print
  • Page
    / 650
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 342
LAN-Cell 2 User’s Guide
343
CHAPTER 17
Policy Route Screens
17.1 Overview
Traditionally, routing is based on the destination address only and the LAN-Cell takes the
shortest path to forward a packet. IP Policy Routing (IPPR) provides a mechanism to override
the default routing behavior and alter the packet forwarding based on the policy defined by the
network administrator. Policy-based routing is applied to incoming packets on a per interface
basis, prior to the normal routing.
17.1.1 What You Can Do in the Policy Route Screens
Use the Policy Route Summary screen (Section 17.2 on page 344) to display the current
policy route entries.
Use the Policy Route Edit screen (Section 17.3 on page 345) to configure a policy route
to override the default.
17.1.2 What You Need To Know About Policy Route
Benefits
Source-Based Routing – Network administrators can use policy-based routing to direct
traffic from different users through different connections.
Quality of Service (QoS) – Organizations can differentiate traffic by setting the
precedence or ToS (Type of Service) values in the IP header at the periphery of the
network to enable the backbone to prioritize traffic.
Cost Savings – IPPR allows organizations to distribute interactive traffic on high-
bandwidth, high-cost paths while using low-cost paths for batch traffic.
Load Sharing – Network administrators can use IPPR to distribute traffic among multiple
paths.
Routing Policy
Individual routing policies are used as part of the overall IPPR process. A policy defines the
matching criteria and the action to take when a packet meets the criteria. The action is taken
only when all the criteria are met. The criteria include the source address and port, IP protocol
(ICMP, UDP, TCP, etc.), destination address and port, ToS and precedence (fields in the IP
header) and length. The inclusion of length criterion is to differentiate between interactive and
bulk traffic. Interactive applications, e.g., telnet, tend to have short packets, while bulk traffic,
e.g., file transfer, tends to have large packets.
Page view 342
1 2 ... 338 339 340 341 342 343 344 345 346 347 348 ... 649 650

Comments to this Manuals

No comments