Policy-Based Routing (PBR)

แชร์
ฝัง
  • เผยแพร่เมื่อ 18 ธ.ค. 2014
  • Start learning cybersecurity with CBT Nuggets. courses.cbt.gg/security
    In this video, Keith Barker covers how to create a lab environment using GNS3 to test and see the results of Policy-Based Routing. He’ll walk you through processes such as creating ACLs, route maps, and setting IP policy.
    Keith will show you how to set up a lab environment so you can experiment with different aspects of Policy-Based Routing, which is essentially just conditional overrides of the routing table. He’ll show you how to set up your topology in GNS3, then give you hands-on instruction for such processes as establishing access control lists, creating route maps, and setting basic IP policies. The video also features sections on configuration commands and topology diagrams, then demonstrates how you can verify the results of policy-based routing by running various simulations.
    🌐 Download the Free Ultimate Networking Cert Guide: blog.cbt.gg/fba4
    ⬇️ 13-Week Study Plan: CCNA (200-301): blog.cbt.gg/p8i5
    Start learning with CBT Nuggets:
    • Juniper Protocol Independent Routing Tunnels | courses.cbt.gg/x70
    • Cisco CCNP Routing and Switching | courses.cbt.gg/6gj
    • TCP/IP IPv4 | courses.cbt.gg/m8f

ความคิดเห็น • 33

  • @gerolejolegion8725
    @gerolejolegion8725 6 ปีที่แล้ว +16

    PBR configuration starts at 6:46

  • @singletakecovers9740
    @singletakecovers9740 4 หลายเดือนก่อน

    yep. nice video. Great stuff. Straight and to the point.

  • @PowerUsr1
    @PowerUsr1 9 ปีที่แล้ว +4

    Great job Keith. Keep up the excellent videos.

  • @samuelkimani7672
    @samuelkimani7672 6 ปีที่แล้ว

    Thanks a lot Keith. Always helpful.

  • @miltonaldridge4170
    @miltonaldridge4170 6 ปีที่แล้ว

    Needed this at work. thanks alot.

  • @williamturi5393
    @williamturi5393 7 ปีที่แล้ว

    Keith is a True Champ

  • @twanaosman1
    @twanaosman1 8 ปีที่แล้ว

    thanks Keith, it was so clear and useful

  • @ShowMeTheLyrics
    @ShowMeTheLyrics 6 ปีที่แล้ว

    Thank you Keith

  • @abiyottesfay3698
    @abiyottesfay3698 6 ปีที่แล้ว

    nice explanation and lesson.thanks

  • @Daniel77379
    @Daniel77379 2 ปีที่แล้ว

    Good stuff and clear message/information . Keep up the good work

  • @rockinron5113
    @rockinron5113 2 ปีที่แล้ว

    Superb. Cheers Keith.

  • @anwarahmed5342
    @anwarahmed5342 5 ปีที่แล้ว

    Great job👍

  • @Abdulla449
    @Abdulla449 9 ปีที่แล้ว

    Thank you Keith for the great video

  • @cisco-ponlork2689
    @cisco-ponlork2689 8 ปีที่แล้ว

    Nice to see that!.

  • @bunleangmeng4995
    @bunleangmeng4995 5 ปีที่แล้ว

    Nice explain thanks Dear

  • @sait5489
    @sait5489 5 ปีที่แล้ว

    Thanks Keith :-)

  • @sebas.av25
    @sebas.av25 3 ปีที่แล้ว

    thanks, helped a lot :)

    • @cbtnuggets
      @cbtnuggets  3 ปีที่แล้ว

      Glad it helped, Sebastian!

  • @ZUMBIDAF800R
    @ZUMBIDAF800R 6 ปีที่แล้ว

    you could make a video of how to configure vyatta or vyos closing a BGP session

  • @MarwinSatriaAnanta
    @MarwinSatriaAnanta 6 ปีที่แล้ว

    Nice !!! Can i use this in bgp ?

  • @SudhaGanapareddy
    @SudhaGanapareddy 2 ปีที่แล้ว

    Route map is implicit deny then how the ICMP suceed without permit rule ?

  • @haifa6004
    @haifa6004 6 ปีที่แล้ว

    how to tell percentage of traffic forward in different route

  • @sv0079807
    @sv0079807 9 ปีที่แล้ว

    Outstanding explanation ..but what will happen if S2/1 of R2 goes down ? will drop all the UDP packets or it will use another link for UDP ?

    • @anwarahmed5342
      @anwarahmed5342 5 ปีที่แล้ว

      Good question,
      Will not drop UDP packets, instead it will use the normal path, which is for both UDP and TCP traffic in the regular path.

  • @roy5721
    @roy5721 ปีที่แล้ว

    Can this concept applied to other routing protocols like bgp?

  • @DillyDogSays
    @DillyDogSays 2 ปีที่แล้ว

    Are the serial interfaces actually serial? Like SSH?

  • @DikiciBurak
    @DikiciBurak 9 ปีที่แล้ว +2

    Hello,
    You have applied PBR to the fa0/0 interface on R1 for inbound traffic. What about the returning or response traffic from R3 ? I think the returning traffic use the link between the R3 and R1. It doesn't use the link between R2 and R1. And it couses asymmetric routing in this case. What do you think about this situation Keith ?

    • @keithbarker4353
      @keithbarker4353 9 ปีที่แล้ว +3

      Yes. If EIGRP is running, R3 would use the 512K link to forward traffic to the PC. So would R2. :) It this topology that indeed would result in asymmetrical routing as the reply path would be different from the initial path.

    • @shujathmohiuddin264
      @shujathmohiuddin264 7 ปีที่แล้ว

      what do we need to do to change the return traffic?

  • @tejendra53
    @tejendra53 8 ปีที่แล้ว

    keith here i stuck, what if router 3 has pc hanging on router 3 and you want to route traffic to reach PC 1 on router 1
    will the traffic goes R3>R2>R1>pc1 ?
    i have tried but the traffic goes like this R3>R2>R3>R1>PC1
    how can i change this behavior

    • @Hot-1LE
      @Hot-1LE 7 ปีที่แล้ว

      Traffic from router 3 PC should go R3 > R1 > PC1 since it has the faster link. If you wanted it to use the other path R2 > R1 then you would need another policy route to specify so