Cisco Certified Network Professional (CCNP) - Service Provider
1 Core Technologies
1-1 IP Routing
1-1 1 IPv4 and IPv6 Routing Protocols
1-1 2 Routing Information Protocol (RIP)
1-1 3 Open Shortest Path First (OSPF)
1-1 4 Intermediate System to Intermediate System (IS-IS)
1-1 5 Border Gateway Protocol (BGP)
1-1 6 Route Redistribution and Filtering
1-1 7 Route Maps and Policy-Based Routing
1-1 8 Troubleshooting IP Routing
1-2 Layer 2 Technologies
1-2 1 Ethernet and Switching Concepts
1-2 2 Virtual LANs (VLANs)
1-2 3 Spanning Tree Protocol (STP)
1-2 4 Link Aggregation and EtherChannel
1-2 5 VLAN Trunking Protocol (VTP)
1-2 6 Troubleshooting Layer 2 Technologies
1-3 VPN Technologies
1-3 1 VPN Concepts and Architectures
1-3 2 IPsec VPNs
1-3 3 SSLTLS VPNs
1-3 4 Troubleshooting VPN Technologies
1-4 Infrastructure Security
1-4 1 Access Control Lists (ACLs)
1-4 2 Network Address Translation (NAT)
1-4 3 Port Security
1-4 4 Troubleshooting Infrastructure Security
1-5 Infrastructure Services
1-5 1 Dynamic Host Configuration Protocol (DHCP)
1-5 2 Domain Name System (DNS)
1-5 3 Network Time Protocol (NTP)
1-5 4 Troubleshooting Infrastructure Services
2 Network Services
2-1 MPLS
2-1 1 MPLS Concepts and Architecture
2-1 2 MPLS LDP and RSVP-TE
2-1 3 MPLS VPNs
2-1 4 Troubleshooting MPLS
2-2 QoS
2-2 1 QoS Concepts and Models
2-2 2 Classification and Marking
2-2 3 Congestion Management and Avoidance
2-2 4 Policing and Shaping
2-2 5 Troubleshooting QoS
2-3 Multicast
2-3 1 Multicast Concepts and Protocols
2-3 2 PIM Sparse Mode (PIM-SM)
2-3 3 PIM Dense Mode (PIM-DM)
2-3 4 Troubleshooting Multicast
2-4 Network Management
2-4 1 SNMP Concepts and Operations
2-4 2 Cisco Network Assistant
2-4 3 Cisco Configuration Professional
2-4 4 Troubleshooting Network Management
3 Infrastructure Maintenance
3-1 Network Automation
3-1 1 Automation Concepts and Tools
3-1 2 Python Scripting for Network Automation
3-1 3 RESTful APIs and NETCONF
3-1 4 Troubleshooting Network Automation
3-2 Network Optimization
3-2 1 Network Performance Monitoring
3-2 2 Traffic Analysis and Optimization
3-2 3 Troubleshooting Network Optimization
3-3 Network Security
3-3 1 Security Concepts and Best Practices
3-3 2 Intrusion Detection and Prevention Systems (IDPS)
3-3 3 Security Information and Event Management (SIEM)
3-3 4 Troubleshooting Network Security
3-4 Network Troubleshooting
3-4 1 Troubleshooting Methodologies
3-4 2 Cisco IOS Troubleshooting Tools
3-4 3 Troubleshooting Common Network Issues
3-4 4 Troubleshooting Advanced Network Issues
Route Maps and Policy-Based Routing Explained

Route Maps and Policy-Based Routing Explained

Key Concepts

Route Maps

Route Maps are a powerful tool in Cisco networking that allow for the manipulation of routing information based on specific policies. They are used to filter routes, modify route attributes, and apply policies to routing protocols. Route Maps consist of a series of match and set statements, each with a sequence number.

Policy-Based Routing (PBR)

Policy-Based Routing (PBR) is a technique that allows network administrators to control the path that packets take through the network based on policies rather than just the destination IP address. PBR uses Route Maps to define these policies, enabling more granular control over traffic flow.

Match and Set Statements

Match statements are used to specify the criteria that a packet must meet to be affected by the Route Map. Common match criteria include source IP address, protocol type, and access control lists (ACLs). Set statements define the actions to be taken on packets that match the criteria, such as changing the next-hop address or modifying the route metric.

Sequence Numbers

Sequence numbers are used to order the match and set statements within a Route Map. Each statement is assigned a unique sequence number, and the Route Map processes these statements in ascending order. This allows for complex policies to be built by chaining multiple match and set statements together.

Application of Route Maps

Route Maps are applied to various routing protocols and features, including BGP, EIGRP, and PBR. For example, in BGP, Route Maps can be used to filter inbound and outbound routes, modify attributes like local preference and MED, and apply community tags. In PBR, Route Maps are used to define policies that dictate how packets are forwarded based on their source IP address or other criteria.

Examples and Analogies

Consider a corporate network where different departments have specific routing requirements. Using Route Maps, the network administrator can create policies that route traffic from the finance department through a high-bandwidth link, while routing traffic from the marketing department through a cost-effective link. This is similar to having a traffic officer directing cars to different routes based on their destination or the time of day.

Another example is in an ISP network where Route Maps are used to apply different policies to customer traffic. For instance, premium customers might have their traffic routed through a low-latency path, while standard customers use a default path. This is akin to a shipping company prioritizing express deliveries over standard shipments.

Conclusion

Understanding Route Maps and Policy-Based Routing is essential for anyone pursuing the CCNP Service Provider certification. These tools provide the flexibility and control needed to manage complex network environments, ensuring that traffic is routed according to specific policies and business requirements. By mastering Route Maps and PBR, network professionals can design and maintain high-performance networks that meet the diverse needs of modern organizations.