Dual-Egress configuration instance for Policy Routing (2)

Source: Internet
Author: User

Previous Article: Dual-Egress configuration instance for Policy Routing 1)

Configure and debug Policy Routing dual-egress

 
 
  1. R2 # sh ip policy // display the application policy
  2.  
  3. Interface Route map
  4.  
  5. Fa0/0 isp-acc
  6.  
  7. R2 # sh route-map isp-test // display the configured route map
  8.  
  9. Route-map isp-test, permit, sequence 10
  10.  
  11. Match clses:
  12.  
  13. Ip address (access-lists): 101
  14.  
  15. Set clses: feedom.net
  16.  
  17. Ip default next-hop 123.0.0.3
  18.  
  19. Policy routing matches: 0 packets, 0 bytes
  20.  
  21. Route-map isp-test, permit, sequence 20
  22.  
  23. Match clses:
  24.  
  25. Bitscn.com
  26.  
  27. Ip address (access-lists): 102
  28.  
  29. Set clses:
  30.  
  31. Ip default next-hop 223.0.0.3
  32.  
  33. Policy routing matches: 0 packets, 0 bytes
  34.  
  35. Route-map isp-test, permit, sequence 30 feedom.net
  36.  
  37. Match clses:
  38.  
  39. Set clses:
  40.  
  41. Default interface Null0
  42.  
  43. Policy routing matches: 0 packets, 0 bytes

 
 
  1. R1 # traceroute // route tracking
  2.  
  3. Protocol [ip]: // ip traffic
  4.  
  5. Target IP address: 100.100.100.100 // Target location
  6.  
  7. Source address: 192.168.1.1 // the Source address is the first host of subnet 1.
  8.  
  9. Numeric display [n]: bitscn.com
  10.  
  11. Timeout in seconds [3]:
  12.  
  13. Probe count [3]:
  14.  
  15. Minimum Time to Live [1]:
  16.  
  17. Maximum Time to Live [30]:
  18.  
  19. Port Number [33434]:
  20.  
  21. Loose, Strict, Record, Timestamp, Verbose [none]:
  22.  
  23. Type escape sequence to abort.
  24.  
  25. Tracing the route to 100.100.100.100
  26.  
  27. 1 12.0.0.2 72 msec 216 msec 276 msec
  28.  
  29. 2 123.0.0.3 288 msec 360 msec * // ISP1 entry
  30.  
  31. -------------------------------------------------------------------------------

 
 
  1. R1 # traceroute
  2.  
  3. Protocol [ip]:
  4.  
  5. Target IP address: 100.100.100.100
  6.  
  7. Source address: 192.168.1.2 // the Source address is the second host of subnet 1.
  8.  
  9. Numeric display [n]:
  10.  
  11. Timeout in seconds [3]:
  12.  
  13. Probe count [3]:
  14.  
  15. Minimum Time to Live [1]:
  16.  
  17. Maximum Time to Live [30]:
  18.  
  19. Port Number [33434]:
  20.  
  21. Loose, Strict, Record, Timestamp, Verbose [none]:
  22.  
  23. Type escape sequence to abort.
  24.  
  25. Tracing the route to 100.100.100.100
  26.  
  27. 1 12.0.0.2 92 msec 188 msec 52 msec
  28.  
  29. 2 123.0.0.3 416 msec 436 msec * // ISP1 entry
  30.  
  31. ----------------------------------------------------------------------------------

 
 
  1. R1 # traceroute
  2.  
  3. Protocol [ip]:
  4.  
  5. Target IP address: 100.100.100.100
  6.  
  7. Source address: 192.168.2.1 // the Source address is the first host in subnet 2.
  8.  
  9. Numeric display [n]:
  10.  
  11. Timeout in seconds [3]:
  12.  
  13. Probe count [3]:
  14.  
  15. Minimum Time to Live [1]:
  16.  
  17. Maximum Time to Live [30]:
  18.  
  19. Port Number [33434]:
  20.  
  21. Loose, Strict, Record, Timestamp, Verbose [none]:
  22.  
  23. Type escape sequence to abort.
  24.  
  25. Tracing the route to 100.100.100.100
  26.  
  27. Bitscn.com
  28.  
  29. 1 12.0.0.2 136 msec 40 msec 144 msec
  30.  
  31. 2 223.0.0.3 356 msec * 132 msec // ISP2 entry
  32.  
  33. ---------------------------------------------------------

 
 
  1. R1 # traceroute
  2.  
  3. Protocol [ip]:
  4.  
  5. Target IP address: 100.100.100.100 bitscn.com
  6.  
  7. Source address: 192.168.2.2 // the Source address is the second host in subnet 2.
  8.  
  9. Numeric display [n]:
  10.  
  11. Timeout in seconds [3]:
  12.  
  13. Probe count [3]:
  14.  
  15. Minimum Time to Live [1]:
  16.  
  17. Maximum Time to Live [30]:
  18.  
  19. Port Number [33434]:
  20.  
  21. Loose, Strict, Record, Timestamp, Verbose [none]:
  22.  
  23. Type escape sequence to abort.
  24.  
  25. Tracing the route to 100.100.100.100
  26.  
  27. 1 12.0.0.2 28 msec 104 msec 200 msec
  28.  
  29. 2 223.0.0.3 300 msec * 196 msec // ISP2 entry
  30.  
  31. -----------------------------------------------------

 

Summary of Policy Routing dual-Egress Configuration

Policy Routing dual-exit configuration experiment is introduced for everyone, through the above experiment, we can see that a sub-network 192.168.1.0/24) traffic through the previous link of the R2-R3 selected ISP1 link, subnet 2 192.168.2.0/24) traffic is selected through the next link of the R2-R3 ISP2 link. Therefore, policy routing is used to achieve source-based supplier selection and network load balancing.

  1. Basic configurations of Cisco Routers
  2. Dynamic Routing Protocol for routing in WINDOWS
  3. The concept of routing in WINDOWS

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.