| Policy Routing Using Linux |
| By Matthew G. Marsh |
| |
| Publisher | : Sams Publishing |
| Pub Date | : March 06, 2001 |
| ISBN | : 0-672-32052-5 |
| Pages | : 224 |
| Slots | : 1 | |
| | | Copyright |
| | | About the Author |
| | | Acknowledgments |
| | | Tell Us What You Think! |
| | | Introduction |
| | | | Conventions Used in This Book |
|
| | | Part I: Theory, Usage, and Utilities |
| | | | Chapter 1. Basic IPv4 Routing |
| | | | Traditional IPv4 Routing |
| | | | UNIX Configuration Commands |
| | | | Cisco IOS Configuration Commands |
| | | | IPv4 Dynamic Routing |
| | | | UNIX routed and Cisco RIP Configurations |
| | | | Sample Linux Router Setup |
|
| | | | Chapter 2. Policy Routing Theory |
| | | | Defining "Policy" in Policy Routing |
| | | | Common IPv4 Routing Problems and Solutions |
| | | | Policy Routing Structure |
| | | | Summary |
|
| | | | Chapter 3. Linux Policy Routing Structures |
| | | | The Triad ElementsAddress, Route, Rule |
| | | | RPDBThe Linux Policy Routing Implementation |
| | | | System Packet PathsIPChains/NetFilter |
| | | | Summary |
|
| | | | Chapter 4. IPROUTE2 Utility for Linux |
| | | | Obtaining and Compiling IPROUTE2 |
| | | | General Command Structure |
| | | | ip link Network Device Configuration |
| | | | ip address Protocol Address Management |
| | | | ip neighbour neighbour /ARP Table Management |
| | | | ip route Routing Table Management |
| | | | ip rule Routing Policy Database Management |
| | | | ip tunnel IP Tunnelling Configuration |
| | | | ip monitor and rtmon Route State Monitoring |
| | | | Summary |
|
|
| | | Part II: Policy Routing Implementations |
| | | | Chapter 5. Simple Network Examples |
| | | | IP Addressing |
| | | | IP Routes |
| | | | IP Rules |
| | | | Multiple Route Tables |
| | | | All Together Now |
| | | | Summary |
|
| | | | Chapter 6. Complex Network Examples |
| | | | Local Service Segregation |
| | | | Bounce Table Walking |
| | | | Tag Routing with TOS and fwmark |
| | | | Interactions with Packet Filters |
| | | | Summary |
|
| | | | Chapter 7. Dynamic Routing Interactions |
| | | | Realms and Information Bases |
| | | | gated and Zebra |
| | | | Rules and Dynamic Structure |
| | | | Summary |
|
| | | | Chapter 8. NAT Functions |
| | | | Standard NAT Defined |
| | | | Policy Routing NAT |
| | | | NetFilter NAT |
| | | | Interactions Between FastNAT and NetFilter |
| | | | Summary |
|
| | | | Chapter 9. IPv6 |
| | | | Theory and History |
| | | | Policy Routing Usage |
| | | | Summary |
|
| | | | Chapter 10. Future Musings |
| | | | Policy Routing Triad |
| | | | The Protocols: IPv4, IPv6, and IPSec |
| | | | Security and Commerce |
| | | | Summary |
|
|
| | | Part III: Appendixes |
| | | | Appendix A. Glossary of Terms |
| | | | Glossary |
|
| | | | Appendix B. Source Code Listings and Locations |
| | | | Kernel Configuration and Patches |
| | | | NetFilter Patches |
| | | | Software Versions |
| | | | PakSecured Installation and Configuration |
|
|
| | | Index |