| Introduction |
|
1 | (1) |
|
Conventions Used in This Book |
|
|
2 | (1) |
| Part I Theory, Usage, and Utilities |
|
3 | (76) |
|
|
|
5 | (12) |
|
|
|
5 | (1) |
|
UNIX Configuration Commands |
|
|
6 | (3) |
|
|
|
6 | (1) |
|
|
|
7 | (2) |
|
Cisco IOS Configuration Commands |
|
|
9 | (1) |
|
|
|
10 | (1) |
|
|
|
10 | (1) |
|
|
|
10 | (3) |
|
|
|
11 | (1) |
|
|
|
12 | (1) |
|
Dynamic Routing Tradition |
|
|
13 | (1) |
|
UNIX routed and Cisco RIP Configurations |
|
|
13 | (2) |
|
|
|
13 | (2) |
|
Cisco IOS RIP Configuration |
|
|
15 | (1) |
|
Sample Linux Router Setup |
|
|
15 | (2) |
|
|
|
17 | (10) |
|
Defining ``Policy'' in Policy Routing |
|
|
18 | (1) |
|
Common IPv4 Routing Problems and Solutions |
|
|
19 | (3) |
|
The Quality of Service Explosion |
|
|
20 | (2) |
|
|
|
22 | (3) |
|
Implementation Considerations for Policy Routing |
|
|
23 | (2) |
|
|
|
25 | (2) |
|
Linux Policy Routing Structures |
|
|
27 | (14) |
|
The Triad Elements---Address, Route, Rule |
|
|
27 | (4) |
|
|
|
28 | (1) |
|
|
|
29 | (1) |
|
|
|
30 | (1) |
|
RPDB---The Linux Policy Routing Implementation |
|
|
31 | (5) |
|
System Packet Paths---IPChains/NetFilter |
|
|
36 | (4) |
|
IPChains---Kernel 2.1/2.2 |
|
|
37 | (1) |
|
NetFilter---Kernel 2.3/2.4 |
|
|
38 | (2) |
|
|
|
40 | (1) |
|
IPROUTE2 Utility for Linux |
|
|
41 | (38) |
|
Obtaining and Compiling IPROUTE2 |
|
|
42 | (1) |
|
General Command Structure |
|
|
43 | (4) |
|
|
|
44 | (1) |
|
|
|
45 | (2) |
|
ip link---Network Device Configuration |
|
|
47 | (4) |
|
ip link set---Change Device Attributes |
|
|
47 | (1) |
|
ip link show---Look at Device Attributes |
|
|
48 | (3) |
|
ip address---Protocol Address Management |
|
|
51 | (8) |
|
|
|
52 | (3) |
|
Primary/Secondary Addressing Versus Multiple Addresses Explained |
|
|
55 | (4) |
|
ip neighbour---neighbour/ARP Table Management |
|
|
59 | (3) |
|
|
|
59 | (3) |
|
ip route---Routing Table Management |
|
|
62 | (11) |
|
ip route {add/change/replace} |
|
|
63 | (10) |
|
ip rule---Routing Policy Database Management |
|
|
73 | (3) |
|
ip tunnel---IP Tunnelling Configuration |
|
|
76 | (2) |
|
ip monitor and rtmon---Route State Monitoring |
|
|
78 | (1) |
|
|
|
78 | (1) |
| Part II Policy Routing Implementations |
|
79 | (98) |
|
|
|
81 | (26) |
|
|
|
81 | (7) |
|
Fundamental IP Address Concept |
|
|
82 | (1) |
|
Example 5.1: Multiple IP Addressing |
|
|
83 | (2) |
|
|
|
85 | (2) |
|
Example 5.2: Primary/Secondary IP Addressing |
|
|
87 | (1) |
|
|
|
88 | (8) |
|
Example 5.3: Host Routing |
|
|
88 | (2) |
|
Example 5.4: Basic Router Filters |
|
|
90 | (3) |
|
Example 5.5: Multiple Routes to Same Destination |
|
|
93 | (1) |
|
Example 5.6: Troubleshooting Unbalanced Multiple Loop Routes |
|
|
94 | (2) |
|
|
|
96 | (2) |
|
Example 5.7: Basic Router Filters v2.0 |
|
|
96 | (2) |
|
|
|
98 | (3) |
|
Example 5.8: Basic Router Filters v3.0 |
|
|
99 | (2) |
|
|
|
101 | (5) |
|
|
|
106 | (1) |
|
|
|
107 | (20) |
|
Local Service Segregation |
|
|
108 | (5) |
|
Example 6.1---The Art of Ping |
|
|
108 | (2) |
|
Example 6.2---Loopback Dummy |
|
|
110 | (2) |
|
Example 6.3---Reality Is Loopy |
|
|
112 | (1) |
|
|
|
113 | (3) |
|
Example 6.4---Throw Routes |
|
|
113 | (3) |
|
Tag Routing with TOS and fwmark |
|
|
116 | (8) |
|
Example 6.5---Mark My Route |
|
|
117 | (2) |
|
Linux DiffServ Architecture |
|
|
119 | (2) |
|
|
|
121 | (3) |
|
Interactions with Packet Filters |
|
|
124 | (2) |
|
Example 6.7---Double Play Packet |
|
|
124 | (2) |
|
|
|
126 | (1) |
|
Dynamic Routing Interactions |
|
|
127 | (18) |
|
Realms and Information Bases |
|
|
127 | (4) |
|
rtacct---Route Realms and Policy Propagation |
|
|
129 | (2) |
|
|
|
131 | (10) |
|
|
|
132 | (5) |
|
|
|
137 | (4) |
|
Rules and Dynamic Structure |
|
|
141 | (2) |
|
gated and Multiple Routing Tables |
|
|
141 | (1) |
|
Zebra and Multiple Routing Tables |
|
|
141 | (1) |
|
gated & zebra & rules = Fun |
|
|
142 | (1) |
|
|
|
143 | (2) |
|
|
|
145 | (12) |
|
|
|
145 | (3) |
|
|
|
148 | (3) |
|
|
|
151 | (3) |
|
Interactions Between FastNAT and NetFilter |
|
|
154 | (1) |
|
|
|
155 | (2) |
|
|
|
157 | (12) |
|
|
|
157 | (9) |
|
|
|
158 | (2) |
|
IPv6 Routing and Neighbors |
|
|
160 | (2) |
|
RADVD---Router Advertisement Daemon |
|
|
162 | (4) |
|
|
|
166 | (1) |
|
|
|
167 | (2) |
|
|
|
169 | (8) |
|
|
|
169 | (2) |
|
The Protocols: IPv4, IPv6, and IPSec |
|
|
171 | (2) |
|
|
|
173 | (3) |
|
|
|
176 | (1) |
| Part III Appendixes |
|
177 | (14) |
|
|
|
179 | (4) |
|
B Source Code Listings and Locations |
|
|
183 | (8) |
|
Kernel Configuration and Patches |
|
|
183 | (1) |
|
|
|
184 | (1) |
|
|
|
184 | (1) |
|
|
|
184 | (1) |
|
|
|
185 | (1) |
|
|
|
186 | (1) |
|
PakSecured Installation and Configuration |
|
|
186 | (1) |
|
Minimum System Requirements |
|
|
186 | (1) |
|
Phase I---Initial Files Install |
|
|
186 | (1) |
|
Phase II---Kernel Configuration |
|
|
187 | (1) |
|
Final Phase---PakSecured Configuration |
|
|
188 | (3) |
| Index |
|
191 | |