Policy Routing Using Linux

by
Format: Paperback w/CD
Pub. Date: 2001-01-01
Publisher(s): Sams
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $39.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently depending not only on the destination addresses but also on other packet fields such as source address, IP protocol, transport protocol ports or even packet payload? This is Policy Routing and this book tells you how to do it.

Table of Contents

Introduction 1(1)
Conventions Used in This Book
2(1)
Part I Theory, Usage, and Utilities 3(76)
Basic IPv4 Routing
5(12)
Traditional IPv4 Routing
5(1)
UNIX Configuration Commands
6(3)
ifconfig Utility
6(1)
route Utility
7(2)
Cisco IOS Configuration Commands
9(1)
ip address
10(1)
ip route
10(1)
IPv4 Dynamic Routing
10(3)
RIP/Distance Vector
11(1)
OSPF/Link State
12(1)
Dynamic Routing Tradition
13(1)
UNIX routed and Cisco RIP Configurations
13(2)
routed
13(2)
Cisco IOS RIP Configuration
15(1)
Sample Linux Router Setup
15(2)
Policy Routing Theory
17(10)
Defining ``Policy'' in Policy Routing
18(1)
Common IPv4 Routing Problems and Solutions
19(3)
The Quality of Service Explosion
20(2)
Policy Routing Structure
22(3)
Implementation Considerations for Policy Routing
23(2)
Summary
25(2)
Linux Policy Routing Structures
27(14)
The Triad Elements---Address, Route, Rule
27(4)
Address
28(1)
Route
29(1)
Rule
30(1)
RPDB---The Linux Policy Routing Implementation
31(5)
System Packet Paths---IPChains/NetFilter
36(4)
IPChains---Kernel 2.1/2.2
37(1)
NetFilter---Kernel 2.3/2.4
38(2)
Summary
40(1)
IPROUTE2 Utility for Linux
41(38)
Obtaining and Compiling IPROUTE2
42(1)
General Command Structure
43(4)
IP Global Command Syntax
44(1)
Error Conditions
45(2)
ip link---Network Device Configuration
47(4)
ip link set---Change Device Attributes
47(1)
ip link show---Look at Device Attributes
48(3)
ip address---Protocol Address Management
51(8)
Arguments
52(3)
Primary/Secondary Addressing Versus Multiple Addresses Explained
55(4)
ip neighbour---neighbour/ARP Table Management
59(3)
Arguments
59(3)
ip route---Routing Table Management
62(11)
ip route {add/change/replace}
63(10)
ip rule---Routing Policy Database Management
73(3)
ip tunnel---IP Tunnelling Configuration
76(2)
ip monitor and rtmon---Route State Monitoring
78(1)
Summary
78(1)
Part II Policy Routing Implementations 79(98)
Simple Network Examples
81(26)
IP Addressing
81(7)
Fundamental IP Address Concept
82(1)
Example 5.1: Multiple IP Addressing
83(2)
IP Address Scoping
85(2)
Example 5.2: Primary/Secondary IP Addressing
87(1)
IP Routes
88(8)
Example 5.3: Host Routing
88(2)
Example 5.4: Basic Router Filters
90(3)
Example 5.5: Multiple Routes to Same Destination
93(1)
Example 5.6: Troubleshooting Unbalanced Multiple Loop Routes
94(2)
IP Rules
96(2)
Example 5.7: Basic Router Filters v2.0
96(2)
Multiple Route Tables
98(3)
Example 5.8: Basic Router Filters v3.0
99(2)
All Together Now
101(5)
Summary
106(1)
Complex Network Examples
107(20)
Local Service Segregation
108(5)
Example 6.1---The Art of Ping
108(2)
Example 6.2---Loopback Dummy
110(2)
Example 6.3---Reality Is Loopy
112(1)
Bounce Table Walking
113(3)
Example 6.4---Throw Routes
113(3)
Tag Routing with TOS and fwmark
116(8)
Example 6.5---Mark My Route
117(2)
Linux DiffServ Architecture
119(2)
Example 6.6---Class Wars
121(3)
Interactions with Packet Filters
124(2)
Example 6.7---Double Play Packet
124(2)
Summary
126(1)
Dynamic Routing Interactions
127(18)
Realms and Information Bases
127(4)
rtacct---Route Realms and Policy Propagation
129(2)
gated and Zebra
131(10)
The gated Utility
132(5)
The Zebra Routing Suite
137(4)
Rules and Dynamic Structure
141(2)
gated and Multiple Routing Tables
141(1)
Zebra and Multiple Routing Tables
141(1)
gated & zebra & rules = Fun
142(1)
Summary
143(2)
NAT Functions
145(12)
Standard NAT Defined
145(3)
Policy Routing NAT
148(3)
NetFilter NAT
151(3)
Interactions Between FastNAT and NetFilter
154(1)
Summary
155(2)
IPv6
157(12)
Theory and History
157(9)
IPv6 Addresses
158(2)
IPv6 Routing and Neighbors
160(2)
RADVD---Router Advertisement Daemon
162(4)
Policy Routing Usage
166(1)
Summary
167(2)
Future Musings
169(8)
Policy Routing Triad
169(2)
The Protocols: IPv4, IPv6, and IPSec
171(2)
Security and Commerce
173(3)
Summary
176(1)
Part III Appendixes 177(14)
A Glossary of Terms
179(4)
B Source Code Listings and Locations
183(8)
Kernel Configuration and Patches
183(1)
Kernel 2.2.12
184(1)
Kernel 2.4
184(1)
IPROUTE2
184(1)
NetFilter Patches
185(1)
Software Versions
186(1)
PakSecured Installation and Configuration
186(1)
Minimum System Requirements
186(1)
Phase I---Initial Files Install
186(1)
Phase II---Kernel Configuration
187(1)
Final Phase---PakSecured Configuration
188(3)
Index 191

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.