O'Reilly logo

Policy Routing Using Linux® by Matthew G. Marsh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IP Rules

One of the topics that you have not seen is the supposed original basis for using Policy Routing in the first place—the ability to route based on source, TOS, packet data, and other packet features. This is where the final member of the Policy Routing triad, rules, enters the scene.

As you saw in Chapter 3, rules are what provide the decision structure in the RPDB. Rules function not just as logical packet selectors, but also possess the capability to act upon a selected packet. In this sense the true power becomes apparent. Rules have much the same set of actions as routes when acting directly on a packet. Unlike routes, they cannot specify any forwarding actions but only the blocking actions. To illustrate, consider Example 5.7 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required