Policy Routing Using Linux |
By Matthew G. Marsh |
|
Publisher | : Sams Publishing |
Pub Date | : March 06, 2001 |
ISBN | : 0-672-32052-5 |
Pages | : 224 |
Slots | : 1 | |
| | Copyright |
| | About the Author |
| | Acknowledgments |
| | Tell Us What You Think! |
| | Introduction |
| | | Conventions Used in This Book |
|
| | Part I: Theory, Usage, and Utilities |
| | | Chapter 1. Basic IPv4 Routing |
| | | Traditional IPv4 Routing |
| | | UNIX Configuration Commands |
| | | Cisco IOS Configuration Commands |
| | | IPv4 Dynamic Routing |
| | | UNIX routed and Cisco RIP Configurations |
| | | Sample Linux Router Setup |
|
| | | Chapter 2. Policy Routing Theory |
| | | Defining "Policy" in Policy Routing |
| | | Common IPv4 Routing Problems and Solutions |
| | | Policy Routing Structure |
| | | Summary |
|
| | | Chapter 3. Linux Policy Routing Structures |
| | | The Triad ElementsAddress, Route, Rule |
| | | RPDBThe Linux Policy Routing Implementation |
| | | System Packet PathsIPChains/NetFilter |
| | | Summary |
|
| | | Chapter 4. IPROUTE2 Utility for Linux |
| | | Obtaining and Compiling IPROUTE2 |
| | | General Command Structure |
| | | ip link Network Device Configuration |
| | | ip address Protocol Address Management |
| | | ip neighbour neighbour /ARP Table Management |
| | | ip route Routing Table Management |
| | | ip rule Routing Policy Database Management |
| | | ip tunnel IP Tunnelling Configuration |
| | | ip monitor and rtmon Route State Monitoring |
| | | Summary |
|
|
| | Part II: Policy Routing Implementations |
| | | Chapter 5. Simple Network Examples |
| | | IP Addressing |
| | | IP Routes |
| | | IP Rules |
| | | Multiple Route Tables |
| | | All Together Now |
| | | Summary |
|
| | | Chapter 6. Complex Network Examples |
| | | Local Service Segregation |
| | | Bounce Table Walking |
| | | Tag Routing with TOS and fwmark |
| | | Interactions with Packet Filters |
| | | Summary |
|
| | | Chapter 7. Dynamic Routing Interactions |
| | | Realms and Information Bases |
| | | gated and Zebra |
| | | Rules and Dynamic Structure |
| | | Summary |
|
| | | Chapter 8. NAT Functions |
| | | Standard NAT Defined |
| | | Policy Routing NAT |
| | | NetFilter NAT |
| | | Interactions Between FastNAT and NetFilter |
| | | Summary |
|
| | | Chapter 9. IPv6 |
| | | Theory and History |
| | | Policy Routing Usage |
| | | Summary |
|
| | | Chapter 10. Future Musings |
| | | Policy Routing Triad |
| | | The Protocols: IPv4, IPv6, and IPSec |
| | | Security and Commerce |
| | | Summary |
|
|
| | Part III: Appendixes |
| | | Appendix A. Glossary of Terms |
| | | Glossary |
|
| | | Appendix B. Source Code Listings and Locations |
| | | Kernel Configuration and Patches |
| | | NetFilter Patches |
| | | Software Versions |
| | | PakSecured Installation and Configuration |
|
|
| | Index |