Cisco Certified Internetwork Expert (CCIE) - Enterprise Infrastructure
1 Network Architecture and Design
1-1 Enterprise Network Design Principles
1-2 Network Segmentation and Micro-Segmentation
1-3 High Availability and Redundancy
1-4 Scalability and Performance Optimization
1-5 Network Automation and Programmability
1-6 Network Security Design
1-7 Network Management and Monitoring
2 IP Routing
2-1 IPv4 and IPv6 Addressing
2-2 Static Routing
2-3 Dynamic Routing Protocols (RIP, EIGRP, OSPF, IS-IS, BGP)
2-4 Route Redistribution and Filtering
2-5 Route Summarization and Aggregation
2-6 Policy-Based Routing (PBR)
2-7 Multi-Protocol Label Switching (MPLS)
2-8 IPv6 Routing Protocols (RIPng, EIGRP for IPv6, OSPFv3, IS-IS for IPv6, BGP4+)
2-9 IPv6 Transition Mechanisms (Dual Stack, Tunneling, NAT64DNS64)
3 LAN Switching
3-1 Ethernet Technologies
3-2 VLANs and Trunking
3-3 Spanning Tree Protocol (STP) and Variants (RSTP, MSTP)
3-4 EtherChannelLink Aggregation
3-5 Quality of Service (QoS) in LANs
3-6 Multicast in LANs
3-7 Wireless LANs (WLAN)
3-8 Network Access Control (NAC)
4 WAN Technologies
4-1 WAN Protocols and Technologies (PPP, HDLC, Frame Relay, ATM)
4-2 MPLS VPNs
4-3 VPN Technologies (IPsec, SSLTLS, DMVPN, FlexVPN)
4-4 WAN Optimization and Compression
4-5 WAN Security
4-6 Software-Defined WAN (SD-WAN)
5 Network Services
5-1 DNS and DHCP
5-2 Network Time Protocol (NTP)
5-3 Network File System (NFS) and Common Internet File System (CIFS)
5-4 Network Address Translation (NAT)
5-5 IP Multicast
5-6 Quality of Service (QoS)
5-7 Network Management Protocols (SNMP, NetFlow, sFlow)
5-8 Network Virtualization (VXLAN, NVGRE)
6 Security
6-1 Network Security Concepts
6-2 Firewall Technologies
6-3 Intrusion Detection and Prevention Systems (IDSIPS)
6-4 VPN Technologies (IPsec, SSLTLS)
6-5 Access Control Lists (ACLs)
6-6 Network Address Translation (NAT) and Port Address Translation (PAT)
6-7 Secure Shell (SSH) and Secure Copy (SCP)
6-8 Public Key Infrastructure (PKI)
6-9 Network Access Control (NAC)
6-10 Security Monitoring and Logging
7 Automation and Programmability
7-1 Network Programmability Concepts
7-2 RESTful APIs and NETCONFYANG
7-3 Python Scripting for Network Automation
7-4 Ansible for Network Automation
7-5 Cisco Model Driven Programmability (CLI, NETCONF, RESTCONF, gRPC)
7-6 Network Configuration Management (NCM)
7-7 Network Automation Tools (Cisco NSO, Ansible, Puppet, Chef)
7-8 Network Telemetry and Streaming Telemetry
8 Troubleshooting and Optimization
8-1 Network Troubleshooting Methodologies
8-2 Troubleshooting IP Routing Issues
8-3 Troubleshooting LAN Switching Issues
8-4 Troubleshooting WAN Connectivity Issues
8-5 Troubleshooting Network Services (DNS, DHCP, NTP)
8-6 Troubleshooting Network Security Issues
8-7 Performance Monitoring and Optimization
8-8 Network Traffic Analysis (Wireshark, tcpdump)
8-9 Network Change Management
9 Emerging Technologies
9-1 Software-Defined Networking (SDN)
9-2 Network Function Virtualization (NFV)
9-3 Intent-Based Networking (IBN)
9-4 5G Core Network
9-5 IoT Network Design and Management
9-6 Cloud Networking (AWS, Azure, Google Cloud)
9-7 Edge Computing
9-8 AI and Machine Learning in Networking
Policy-Based Routing (PBR) Explained

Policy-Based Routing (PBR) Explained

Key Concepts

Policy-Based Routing (PBR)

Policy-Based Routing (PBR) is a method of controlling the path that packets take through a network based on policies defined by network administrators. Unlike traditional routing, which uses the destination IP address to determine the path, PBR allows for more granular control by considering additional factors such as source IP address, protocol type, and port number.

Match Criteria

Match criteria are the conditions that determine whether a packet should be subject to PBR. These criteria can include source IP address, destination IP address, protocol type, and port number. For example, an administrator might define a match criterion that applies PBR to all packets originating from a specific subnet.

Set Actions

Set actions are the instructions that specify what should happen to packets that match the defined criteria. These actions can include changing the next-hop address, modifying the interface through which the packet is sent, or applying a specific QoS policy. For instance, a set action might redirect all packets from a particular source to a specific next-hop router.

Route Maps

Route maps are a configuration tool used to define and apply PBR policies. They consist of a series of match criteria and set actions that are evaluated in sequence. If a packet matches a criterion in a route map, the corresponding set action is applied. Route maps provide a flexible and powerful way to implement complex PBR policies.

Access Control Lists (ACLs)

Access Control Lists (ACLs) are used in conjunction with route maps to define the match criteria for PBR. ACLs allow administrators to specify which packets should be subject to PBR based on various attributes such as source IP address, destination IP address, and protocol type. For example, an ACL might be used to identify all packets from a specific subnet, which are then processed by a route map to apply PBR.

Examples and Analogies

Consider a large enterprise with multiple departments, each requiring different network paths for optimal performance. Using PBR, the network administrator can define policies that route traffic from the Sales department through a high-speed link, while routing traffic from the Marketing department through a different, more cost-effective link. This is similar to having a traffic management system that directs different types of vehicles to specific roads based on their needs.

In another scenario, imagine a company that needs to prioritize VoIP traffic over other types of traffic. Using PBR, the network administrator can define a policy that matches all VoIP packets and sets them to use a higher-priority path with lower latency. This is akin to having a dedicated lane on a highway for emergency vehicles, ensuring they reach their destination quickly and efficiently.

For route maps, think of a series of filters in a water treatment plant. Each filter removes specific contaminants based on predefined criteria. Similarly, route maps filter packets based on match criteria and apply specific actions to ensure they follow the desired path.

ACLs can be compared to security guards at a building entrance. They check each person's credentials (source IP address, protocol type) before allowing them to enter. In the same way, ACLs check packet attributes to determine if they should be subject to PBR.