Fact-checked by Grok 2 weeks ago

Policy-based routing

Policy-based routing (PBR) is a networking that enables routers and multilayer switches to make forwarding decisions for data packets based on user-defined policies rather than relying solely on the destination as in traditional . These policies classify incoming using criteria such as source or destination addresses, ports, protocols, packet length, (ToS), or lists (ACLs), allowing packets to be directed to specific next-hop addresses, interfaces, or (VRF) tables. PBR operates by applying route maps to interfaces, where the maps define matching conditions and actions, thereby overriding the standard for selected flows. Introduced to address the limitations of destination-based routing in complex environments, PBR provides network administrators with enhanced flexibility for traffic engineering, such as load balancing across multiple links or directing specific application traffic through preferred paths. It supports both IPv4 and IPv6, with mechanisms for matching IPv6-specific attributes like flow labels and setting IPv6 precedence values, ensuring compatibility in modern dual-stack networks. Configuration typically involves creating access lists for traffic classification, defining route maps with match and set clauses, and applying them to inbound interfaces using commands like ip policy route-map in Cisco IOS environments. Among its key benefits, facilitates (QoS) implementations by prioritizing critical traffic, enforces policies through selective routing, and supports service provider scenarios where traffic from different user groups is routed via designated connections or virtual private networks (VPNs). However, it requires careful planning to avoid routing loops or suboptimal paths, and performance considerations apply when using it with Express Forwarding (CEF) for efficient . Overall, complements standard routing protocols like OSPF or BGP by adding policy-driven granularity, making it essential for enterprise and service provider networks handling diverse traffic demands.

Fundamentals

Definition and Purpose

Policy-based routing (PBR) is a networking that enables routers to forward and route packets according to predefined policies established by network administrators, rather than relying solely on the destination as in traditional . These policies can evaluate various packet attributes, including source , protocol type, packet length, and application-specific identifiers, allowing for more granular control over . In essence, PBR overrides the standard lookup process, which typically uses the on the destination address to determine the next hop. The primary purpose of PBR is to facilitate advanced traffic management without necessitating changes to the global routing tables populated by protocols like RIP or OSPF. It supports traffic engineering by directing specific flows along optimized paths to avoid congestion, enhances security by routing sensitive traffic through encrypted tunnels or firewalls, and enables load balancing across multiple links to distribute workload efficiently. Additionally, PBR aids in quality of service (QoS) enforcement by prioritizing critical applications, such as voice or video traffic, ensuring they receive preferential treatment over less urgent data. PBR emerged in the 1990s as enterprise networks grew more complex, revealing limitations in destination-based protocols like and OSPF, which lacked flexibility for policy-driven decisions. Seminal work, such as the Inter-Domain Routing (IDPR) architecture proposed in 1993, laid the groundwork for policy-aware in larger-scale environments. It was first widely implemented in commercial routers, notably around that period, to address the need for customizable in diverse organizational settings.

Key Components

Policy-based routing (PBR) relies on policies defined by network administrators as sets of rules that dictate how packets are handled based on specific conditions, typically implemented through route maps that combine match criteria and associated actions. These policies override standard destination-based routing decisions, allowing for customized traffic forwarding without altering the core routing tables. In practice, access control lists (ACLs) are frequently used within these policies to specify matching rules, enabling granular control over packet classification. Match criteria form the foundational elements for identifying packets subject to a policy, encompassing various packet attributes to enable selective . Common criteria include source and destination addresses, which can be defined via standard or extended ACLs to target specific hosts or subnets. Port numbers and protocols such as , , or ICMP are also matched using extended ACLs, allowing differentiation based on application-layer details. Additional attributes cover packet size through commands like match length, ingress interface for interface-specific policies, and quality-of-service markers including (ToS) or Differentiated Services Code Point (DSCP) values via match ip dscp. These criteria collectively support policy enforcement for diverse traffic types, such as prioritizing VoIP over bulk data. Actions specify the outcomes applied to packets that satisfy the match criteria, directing their forwarding path or modification. Primary actions involve setting a specific next-hop with set ip next-hop or specifying an output via set interface, which bypasses lookups. Default options like set default ip next-hop handle unmatched next-hops by falling back to standard , while packet marking actions such as set ip dscp or set ip precedence alter ToS fields for downstream QoS treatment. Policies may also route packets for local processing on the device, such as for , though this is less common in forwarding-focused . PBR integrates with existing routing infrastructure by applying policies early in the packet forwarding pipeline, prior to consultation of the Routing Information Base (RIB) or (FIB), but without replacing these tables. If a specifies a next-hop, the device verifies its reachability using RIB entries; for certain protocols like , valid RIB/FIB paths are required to avoid drops. This interaction ensures PBR enhances rather than disrupts standard routing, with policies distributing or filtering routes based on administrative domains or network numbers as outlined in early models.

Operation

Policy Matching Process

The policy matching process in policy-based routing (PBR) begins when a packet arrives at an ingress configured for PBR, typically via the application of a route map to that interface. Unless the packet's destination matches the interface's own , it undergoes initial to determine if PBR applies, bypassing local traffic destined for the device itself. This inspects key packet attributes at the hardware or software level, marking the start of the PBR pipeline before any standard routing decisions are made. Policies are evaluated sequentially based on the route map's sequence numbers, which dictate the order of clauses from lowest to highest value. The router processes the packet against each in turn until a match is found; the first matching with a permit triggers the associated set actions, halting further evaluation. If a denies the packet or no match occurs in a permit , evaluation proceeds to the next sequence; an implicit deny operates at the end of the route map if no permit match is ever found. Match logic relies on classifiers such as access control lists (ACLs) to inspect packet headers for criteria like source or destination addresses, types, ports, or packet length. For instance, an ACL might permit packets where the source falls within the 192.168.1.0/24 subnet and the is on port 80, allowing the route map clause to apply a specific action to from that . Without an explicit match clause in a route map entry, all packets are considered to match, providing a catch-all mechanism. In hardware-accelerated routers, such as those using Cisco's ASIC-based platforms, PBR matching often leverages Ternary Content-Addressable Memory (TCAM) for rapid parallel lookups of criteria, enabling line-rate processing for simple policies. Complex policies exceeding TCAM capacity or requiring dynamic updates may fall back to a software-based slow path, where the CPU handles evaluation, potentially introducing . Additionally, enabling PBR on an interface disables fast switching for affected packets, ensuring they traverse the full PBR evaluation regardless of capabilities. If no policy match occurs across the entire route map—due to the implicit deny—the packet is exempt from PBR and forwarded using the device's standard destination-based . Policy failures, such as unreachable next-hops specified in a matched set action, typically result in the packet being dropped, though can be enabled via log keywords to record denied or unmatched traffic for . This fallback ensures network continuity while prioritizing -defined paths where applicable.

Route Selection and Forwarding

Upon a successful policy match in policy-based routing (PBR), the device executes the associated set clauses to determine the packet's forwarding path, overriding standard destination-based routing. Common actions include setting a specific next-hop IP address, such as redirecting traffic to 10.1.1.1, which directs the packet toward that address regardless of the routing table's longest prefix match. Alternatively, the policy may specify an egress interface, like forcing output via WAN1, or assign the packet to a particular Virtual Routing and Forwarding (VRF) instance for network segmentation, ensuring traffic enters a isolated routing domain. These set clauses provide granular control over path selection, enabling traffic engineering without altering global routing protocols. If a next-hop is specified but not directly connected, the device performs a recursive lookup to resolve the physical and ultimate next-hop, similar to standard forwarding but bound by the 's constraints. This process allows to override equal-cost multi-path (ECMP) load balancing by pinning traffic to a single path among multiple equal-cost routes, preventing default hashing and ensuring predictable forwarding for policy-matched flows. For instance, traffic matching a QoS-sensitive might ECMP distribution to prioritize a low-latency link. The lookup ensures ; if the resolved next-hop is unreachable, the packet may fall back to normal or be dropped based on . In the forwarding pipeline, the packet undergoes standard processing tailored by the : encapsulation based on the selected next-hop or (e.g., adding MPLS labels if the path invokes an MPLS domain), decrement of the time-to-live () field by one, and egress transmission. If the invokes additional services like (), the packet may be altered accordingly before forwarding, such as rewriting source addresses for traffic steering. In certain hardware implementations, such as those using programmable , packets may recirculate through the forwarding engine for re-evaluation after policy-induced changes, like VRF reassignment requiring a fresh route lookup. This ensures complete application of layered network functions without . PBR paths inherently support monitoring through integrated tools like for flow-level statistics or IP accounting for aggregate byte and packet counts, capturing metrics specific to policy-routed traffic. For example, records can tag entries with PBR details, enabling visibility into overridden routes and aiding in or . These mechanisms provide implicit without requiring separate configuration, tying directly to the selected forwarding actions.

Implementation

Configuration Basics

Policy-based routing (PBR) configuration involves a series of steps to define and apply routing policies that override standard destination-based forwarding. These steps generally include enabling the feature, specifying match conditions for traffic, associating actions with those conditions, and binding the policies to network interfaces. While implementations vary by platform, the process emphasizes logical ordering and verification to ensure reliable operation. To enable PBR, administrators typically activate the feature on specific or globally, depending on the device. For inbound or outbound traffic, this is done by associating a structure, such as a route map, directly to the interface; for example, in , the command ip policy route-map map-name is used in interface to apply the policy to incoming packets. Some platforms require a global enablement command followed by a , while others support it by default after policy definition. Directionality is crucial, as PBR is often applied inbound to influence traffic entering the device. Defining match criteria involves creating conditions to classify traffic, commonly using access control lists (ACLs) for IP addresses, protocols, or packet lengths. Standard or extended ACLs filter based on source/destination ranges, port numbers, or protocols like /; for instance, an extended ACL might permit traffic from a specific . Alternatively, class-maps can group multiple criteria, such as matching Code Point (DSCP) values. These matches form the basis for selective application within a route map or equivalent structure. Setting actions requires configuring a policy mechanism, like a route map, to link matches to forwarding behaviors. Route maps use sequence numbers to prioritize clauses, where a permit clause with a match triggers actions such as set ip next-hop address to specify an alternative gateway. Multiple sequences allow fallback to default routing if no match occurs, and actions can include setting IP precedence or directing to a (VRF) table. Sequence ordering ensures higher-priority policies evaluate first. Applying policies entails binding the configured route map to the target , often in the input direction for efficiency. For traffic originating from the device itself, a local application, such as ip local policy route-map map-name in mode, ensures consistent handling. Once applied, policies take effect immediately, but testing with tools like or from matching sources verifies routing changes. Verification commands, such as show route-map or show ip policy, display active policies and hit counts. Best practices include ordering policies logically by sequence numbers to process specific matches before general ones, preventing unintended overrides. To avoid routing loops, limit recursive next-hops or use maximum path constraints; enabling on route maps aids by tracking unmatched packets. Additionally, include a default permit clause to allow non-matching traffic to follow standard , and monitor for performance impacts, as can increase CPU usage on high-traffic interfaces.

Platform-Specific Variations

In and IOS-XE platforms, policy-based routing (PBR) relies on route-maps to classify and redirect traffic, using access control lists (ACLs) for matching and various set clauses for actions. A typical defines a route-map with route-map MYMAP permit 10, including match [ip address](/page/IP_address) ACL1 to identify packets and set [ip](/page/IP) next-hop 192.168.1.1 to specify the forwarding destination, then applies it to an ingress via ip policy route-map MYMAP. These platforms support local PBR for device-generated traffic through ip local policy route-map MYMAP and integration with (VRF) for isolated routing domains. A distinctive capability is recursive next-hop resolution, configured as set [ip](/page/IP) next-hop 10.1.1.1 recursive, which enables the device to perform additional lookups if the specified next-hop is not directly connected, preventing forwarding disruptions in dynamic topologies. Juniper Junos OS implements PBR via Filter-Based Forwarding (FBF), leveraging filters for packet classification based on fields such as source or destination addresses and ports. Policies are structured with terms using a from for matches (e.g., from source-address 172.16.1.1/32) and a then for actions (e.g., then next-interface ge-2/1/1.0 or then next-ip 192.168.0.3), applied to interfaces through set interfaces ge-2/1/0 unit 0 family inet filter input filter1 or extended to routing instances for virtualized environments. This filter-centric approach enables advanced Layer 3/4 matching beyond basic ACLs and supports via associated static routes with preference metrics, differing from route-map paradigms by emphasizing stateless evaluation. Huawei networking devices integrate PBR within traffic policies, classifying packets through if-match rules tied to ACLs (e.g., if-match acl name a3001 where the ACL permits source IP ranges like 10.100.0.11/24) and applying behaviors such as apply output-interface Tunnel30 for redirection. A full policy is assembled with policy-based-route aaa permit node 5, linking the classifier and behavior, then bound to an interface using ip policy-based-route aaa. This QoS-oriented framework supports multi-field (MF) classification for complex scenarios and natively handles IPv6 via IPv6 ACLs. Arista EOS employs class-maps and policy-maps specifically for PBR, matching traffic against ACLs in a class-map defined as class-map type pbr match-any CMAP1 with match ip access-group ACL1, then incorporating it into a policy-map via policy-map type pbr PMAP1, class CMAP1, and set nexthop 10.12.0.5 or set nexthop-group GROUP1 for . The policy is enforced on Layer 3 interfaces with service-policy type pbr input PMAP1. This modular structure supports both IPv4 and natively and allows multiple next-hops within VRFs for load balancing or , contrasting with filter-based systems by aligning closely with QoS policy syntax. Key implementation divergences include varying support for advanced features: Cisco and Arista emphasize route-map and policy-map flexibility with VRF integration, Juniper prioritizes firewall filter precision for high-performance environments, and Huawei embeds PBR in broader traffic engineering via classifiers. Common pitfalls arise in next-hop recursion handling; for example, Cisco mandates explicit recursive configuration to resolve indirect next-hops through the routing table, avoiding blackholing, whereas Juniper implicitly resolves via associated routes in FBF actions, potentially leading to mismatches in multi-hop setups without proper static route preferences. In multi-vendor deployments, PBR interoperability demands consistent traffic matching—typically through standardized ACL definitions across platforms—to prevent asymmetric routing or policy evasion, as each vendor's syntax (e.g., Cisco's match ip address vs. Juniper's from source-address) requires translation for uniform enforcement.

Applications

Common Use Cases

Policy-based routing (PBR) is commonly employed in traffic engineering to optimize network performance by directing specific traffic types along preferred paths based on application requirements. For instance, voice over IP (VoIP) traffic, which is sensitive to latency and jitter, can be routed over low-latency, high-quality links, while bulk data transfers utilize cost-effective, higher-capacity bandwidth. This approach ensures that real-time communications maintain quality without overprovisioning expensive infrastructure for all traffic. In security applications, PBR enables the redirection of to security devices such as firewalls or for inspection. It also supports blackholing from malicious sources by matching packets to a , thereby dropping them without altering core tables. This granular control allows organizations to enforce policies at the network edge, isolating potential threats efficiently. For load balancing, distributes outbound traffic across multiple internet service providers (ISPs) according to source subnets or protocols, mitigating risks from single-link failures and improving overall availability. By assigning different subnets to separate interfaces, enterprises can achieve resilience and even traffic distribution without relying solely on equal-cost multipath . This is particularly useful in multi-homed environments where symmetric return paths are not guaranteed. Service providers leverage in provider edge () routers to enforce customer-specific policies, such as forcing traffic into designated virtual private networks (VPNs) or applying (CoS) markings for . This ensures isolation between customer domains in MPLS networks while prioritizing traffic based on service level agreements. Such implementations support scalable, multi-tenant environments typical of ISP infrastructures. In integration scenarios, facilitates network setups by directing on-premises traffic to specific gateways based on application type or destination. This allows seamless extension of on-premises policies into the , sensitive workloads through secure gateways while optimizing paths for general traffic. It addresses challenges in distributed environments by overriding default routes for targeted application flows.

Practical Examples

In a multi-homed enterprise network, policy-based routing () enables source-based ISP selection to optimize traffic distribution across redundant links. For instance, traffic originating from the 192.168.1.0/24 can be directed to ISP1 via next-hop 203.0.113.1, while all other traffic defaults to ISP2 via next-hop 198.51.100.1. This setup requires an (ACL) to match the source , a route-map to apply the policy, and application to the ingress interface. The configuration on a router might include:
access-list 101 permit ip 192.168.1.0 0.0.0.255 any
route-map ISP-SELECT permit 10
 [match](/page/Match) ip address 101
 set ip next-hop 203.0.113.1
route-map ISP-SELECT permit 20
 set ip next-hop 198.51.100.1
[interface](/page/Interface) GigabitEthernet0/1
 ip [policy](/page/Policy) route-map ISP-SELECT
To verify the policy, the show route-map ISP-SELECT command displays the route-map entries, counters, and set actions, confirming that packets from 192.168.1.0/24 increment the first sequence's count while routing to the specified next-hop. For QoS prioritization, can route voice traffic marked with Code Point (DSCP) Expedited Forwarding (EF, value 46) to a dedicated low-latency , ensuring minimal for applications. This involves matching the DSCP value in the route-map and setting the output interface accordingly. On a router, the configuration could be:
route-map VOICE-PRIORITY permit 10
 match [ip](/page/IP) dscp ef
 set [interface](/page/Interface) GigabitEthernet0/2
route-map VOICE-PRIORITY permit 20
[interface](/page/Interface) GigabitEthernet0/1
 [ip](/page/IP) policy route-map VOICE-PRIORITY
A from a voice endpoint would then show the path traversing GigabitEthernet0/2, bypassing congested default routes and confirming the policy's enforcement for EF-marked packets. Troubleshooting often involves detecting routing loops, which manifest as repeated "TTL expired in transit" ICMP messages when packets circulate indefinitely until their time-to-live () reaches zero. This can occur if overlapping policies create circular forwarding paths, such as a less-specific route-map redirecting traffic back to the ingress interface. Resolution typically requires reordering route-map sequences to prioritize specific matches first (e.g., sequence 10 over 20) and validating with packet captures using embedded packet capture () on the router, which reveals looping packet flows between interfaces. In multi-vendor environments, the equivalent Juniper implementation uses filter-based forwarding (FBF) on SRX devices, creating a firewall filter to match source addresses and direct to a forwarding routing instance with a static default route. For the same source-based ISP policy, the configuration includes:
routing-instances {
    ISP1 {
        instance-type forwarding;
        routing-options {
            static {
                route [0.0.0.0](/page/0.0.0.0)/0 {
                    next-hop 203.0.113.1;
                }
            }
        }
    }
}
firewall {
    family inet {
        filter SOURCE-SELECT {
            term isp1-match {
                from {
                    source-address {
                        192.168.1.0/24;
                    }
                }
                then {
                    routing-instance ISP1;
                }
            }
            term default {
                then accept;
            }
        }
    }
}
interfaces {
    ge-0/0/1 {
        unit 0 {
            family inet {
                filter {
                    input SOURCE-SELECT;
                }
            }
        }
    }
}
This directs matching traffic to the ISP1 instance while defaulting others to the main . To validate PBR configurations, extended ping tests from specific source IPs simulate traffic flows and confirm path selection. On a Cisco router, enter ping in privileged mode, select extended options, specify the source IP (e.g., 192.168.1.10) and destination, then observe success or the routed path, ensuring it aligns with the policy's next-hop.

Advantages and Challenges

Benefits

Policy-based routing (PBR) enhances network flexibility by enabling administrators to implement granular control over forwarding without altering the underlying route table, allowing policies to be defined based on criteria such as source or destination addresses, protocols, or ports. This approach supports the creation of multiple route maps, with limits varying by , facilitating customized decisions for diverse types while maintaining with existing interior gateway protocols (IGP) and (BGP). In terms of cost efficiency, optimizes bandwidth usage in multi-link environments by directing traffic along the most economical paths, such as lower-cost links for non-critical applications, thereby reducing overall expenses through targeted load balancing and avoidance of underutilized high-cost circuits. For instance, in hybrid setups, can steer bulk data transfers over cost-effective connections while reserving dedicated lines for latency-sensitive traffic, leading to measurable savings in operational expenditures without compromising performance. PBR bolsters enhanced security by enforcing path isolation for traffic flows, aligning with zero-trust principles through policy-driven redirection that prevents unauthorized access to sensitive network segments. It integrates seamlessly with firewalls and intrusion prevention systems by using access control lists (ACLs) to match and route traffic to inspection points, enabling early detection and dropping of malicious packets at the ingress edge to mitigate threats like DDoS attacks. Regarding scalability, PBR leverages hardware acceleration on application-specific integrated circuits (ASICs) to handle high-throughput environments, providing high-performance processing with minimal CPU overhead due to early traffic classification via flow tags on platforms like the Cisco Catalyst 8500 series. This offloading ensures efficient processing of large policy sets—supporting multiple forward classes and traffic engineering tunnels—making it suitable for data centers and enterprise networks with growing traffic demands. PBR offers ease of deployment as a non-disruptive overlay to existing IGP and BGP configurations, allowing quick policy updates through route maps without requiring session resets or convergence delays. Administrators can apply policies per interface or globally via (CLI) commands, enabling rapid adjustments to traffic engineering needs, such as in use cases, with minimal impact on ongoing operations.

Limitations and Considerations

Policy-based routing (PBR) introduces performance overhead due to the additional processing required to evaluate policies for each packet, particularly in software implementations without . On low-end routers, this can lead to significant CPU utilization increases under high traffic loads when PBR is process-switched rather than CEF-switched. To mitigate this, hardware offloading via CEF and the ip route-cache policy command is recommended for interfaces handling speeds greater than 1 Gbps, as software PBR results in reduced throughput compared to hardware forwarding. The complexity of configurations often results in errors related to policy ordering, where mismatched or incomplete route-map sequences can cause traffic blackholing by failing to forward packets correctly. such issues typically requires advanced tools for , such as packet analyzers or logging features, to trace policy matches and identify misconfigurations that disrupt forwarding. Scalability limitations arise from resource constraints in hardware components like TCAM, which stores PBR entries alongside ACLs and routes. Large policy sets can exhaust TCAM capacity on certain platforms, leading to entry carving or allocation failures and rendering unsuitable for core routers managing millions of flows. Dynamic TCAM allocation helps in some modern devices, but fixed static limits still impose boundaries, potentially delaying policy programming during high-scale operations. Lack of standardization across vendors contributes to implementation challenges, including syntax differences that create and complicate migrations. For instance, uses route-maps for , while employs filter-based forwarding, requiring platform-specific expertise. support also varies; provides full capabilities across recent IOS versions, whereas platforms have supported filter-based forwarding since Junos OS Release 12.2 on compatible hardware. Maintaining policies demands careful synchronization with protocols, as changes in BGP can invalidate specified next-hops if availability verification is not enabled, potentially causing intermittent forwarding failures or route leaks. Administrators must regularly policies against updates to prevent such risks, often using features like next-hop tracking to ensure ongoing validity. In virtualized and cloud environments, PBR may face additional challenges in integration with software-defined networking (SDN) controllers or network function virtualization (NFV), where policy enforcement can be limited by overlay complexities or require specialized extensions as of 2025.

References

  1. [1]
    Understanding Policy Routing - Cisco
    Aug 10, 2005 · Policy-based routing provides a tool for forwarding and routing data packets based on policies defined by network administrators.
  2. [2]
    IP Routing Configuration Guide, Cisco IOS XE 17.x - IPv6 Policy ...
    Nov 2, 2022 · Policy-based routing (PBR) gives you a flexible means of routing packets by allowing you to configure a defined policy for traffic flows.
  3. [3]
    Policy Based Routing [Cisco Secure Firewall Management Center]
    Policy Based Routing (PBR) gives you more control over routing by extending and complementing the existing mechanisms provided by routing protocols.
  4. [4]
  5. [5]
    Policy-Based Routing: What Is It and How Is It Used?
    Policy-based routing (PBR) provides network administrators with agility and flexibility to better manage traffic.
  6. [6]
    [PDF] Policy Based Routing - Cisco
    Allows Internet service providers and other organizations to route traffic originating from various sets of users through well-defined Internet connections.
  7. [7]
    [PDF] Policy-Based Management: A Historical perspective - Raouf Boutaba
    Similar to BGP, IDRP allows manually enforceable policy-based routing. In 1993, Steenstrup introduced an architecture for inter-domain policy routing (IDPR) ...
  8. [8]
    RFC 1478 - An Architecture for Inter-Domain Policy Routing
    Mar 2, 2013 · ... Policy Based Routing in the Research Internet", RFC 1125, November 1989. ... in the Internet", RFC 1164, June 1990. [8] Lougheed, K. and ...
  9. [9]
    [PDF] Policy-Based Routing - Cisco
    Policy-based routing (PBR) is a process whereby the device puts packets through a route map before routing them. The route map determines which packets are ...Missing: key components
  10. [10]
    RFC 1104 - Models of policy based routing - IETF Datatracker
    The purpose of this RFC is to outline a variety of models for policy based routing. The relative benefits of the different approaches are reviewed.
  11. [11]
    IP Routing Configuration Guide, Cisco IOS XE 17.x - Policy-Based ...
    Nov 2, 2022 · The Policy-Based Routing feature is a process whereby a device puts packets through a route map before routing the packets. The route map ...
  12. [12]
    [PDF] Policy-Based Routing - Cisco
    To enable policy-based routing on an interface, indicate which route map the device should use by using the ip policy route-map map-tag command in interface ...Missing: 1993 | Show results with:1993
  13. [13]
    Chapter: Configuring Policy-Based Routing - Cisco
    Mar 12, 2019 · The scale of hardware-based PBR is determined by the TCAM size and the time required for the CPU to flatten the ACL before programming into the ...
  14. [14]
    Multi-VRF Selection Using Policy Based Routing (PBR) - Cisco
    Jun 5, 2007 · The PBR implementation of the VRF selection feature allows you to policy-route VPN traffic based on match criteria. Match criteria are defined ...
  15. [15]
    IP Routing Configuration Guide, Cisco IOS XE 17.x - PBR Recursive ...
    Nov 2, 2022 · The PBR Recursive Next Hop feature enhances route maps to enable configuration of a recursive next-hop IP address that is used by policy-based routing (PBR).Missing: lookup recirculation
  16. [16]
    Equal cost multi-path | FortiGate / FortiOS 6.2.0
    Just like routes in a routing table, ECMP is considered after policy routing, so any matching policy routes will take precedence over ECMP. ECMP pre-requisites ...
  17. [17]
    [PDF] Implementing Policy-Based Routing - Cisco
    Apr 15, 2025 · Policy-Based Routing (PBR) gives you a flexible means of routing packets by allowing you to configure a defined policy for traffic flows, ...
  18. [18]
    [PDF] NetFlow Policy Routing - Cisco
    NetFlow policy routing (NPR) integrates policy routing, which enables traffic engineering and traffic classification, with NetFlow services, which provide ...
  19. [19]
    How to configure Policy Based Routing - NetworkLessons.com
    Policy based routing can be used to overrule your routing table and change the next hop IP address for traffic meeting certain requirements.
  20. [20]
    [PDF] Policy-based Routing Feature Overview and Configuration Guide
    Policy-based routing (PBR) routes packets to a specific next-hop, controlling paths based on parameters like priority, address, protocol, or VLAN membership.<|separator|>
  21. [21]
    [PDF] PBR Recursive Next Hop - Cisco
    The PBR Recursive Next Hop feature enhances route maps to enable configuration of a recursive next-hop. IP address that is used by policy-based routing (PBR).Missing: Juniper | Show results with:Juniper
  22. [22]
    Configuring Filter-Based Forwarding to a Specific Outgoing Interface ...
    Policy-based routing (also known as filter-based forwarding) refers to the use of firewall filters that are applied to an interface to match certain IP header ...
  23. [23]
    Policy-based Routing Configuration - Huawei Technical Support
    Nov 24, 2022 · Policy-based routing (PBR) is a QoS policy in which the traffic behavior redirects packets to an outbound interface for multi-field (MF) ...
  24. [24]
    EOS 4.35.0F - Traffic Management - Arista
    Policy-Based Routing (PBR) allows the operator to specify the next hop for selected incoming packets on an L3 interface, overriding the routing table. Incoming ...
  25. [25]
    Quality of Service for Voice over IP - Cisco
    Apr 13, 2001 · Policy-Based Routing Classification and Marking Example. Policy-based routing (PBR) ... VoIP packets will be serviced with low latency and ...
  26. [26]
    [PDF] Policy-based Routing Feature Overview and Configuration Guide
    The VoIP traffic is marked with a DSCP value of 46. Policy routing is used to ensure that the VoIP packets are sent via the dedicated circuit, whilst all other ...
  27. [27]
    Policy-Based Forwarding - Palo Alto Networks
    Policy-Based Forwarding (PBF) allows you to override the routing table, and specify the outgoing or egress interface based on specific parameters.
  28. [28]
    Policy Based Routing [Cisco Secure Firewall Management Center]
    Mar 5, 2025 · Policy Based Routing (PBR) gives you more control over routing by extending and complementing the existing mechanisms provided by routing protocols.
  29. [29]
    UniFi Gateway - Policy-Based Routing - Ubiquiti Help Center
    There are many possible applications of policy-based routing, however some of the common use-cases include: Split Traffic Across WANs: Direct specific types of ...
  30. [30]
    Policy Based Routing and WAN Load Balancing Example on ...
    Dec 20, 2021 · The following example walks you through creating a route policy for two simultaneously active WAN interfaces. For this example, a secondary WAN ...
  31. [31]
    Policy-Based Routing Policies - HPE Aruba Networking
    A typical use case for PBR would be to force all traffic to a specific VPNC or a tunnel endpoint. PBR allows your network administrators to create policies for ...
  32. [32]
    Hybrid Cloud Networking: Key Strategies & Use Cases
    Proactive capacity planning, combined with policy-based routing, ensures that network resources align with application priorities. For example, business ...
  33. [33]
    Policy-based routes | Virtual Private Cloud
    Policy-based routes let you select a next hop based on more than a packet's destination IP address. You can match traffic by protocol and source IP address as ...Specifications · Limitations · Skipping other policy-based...Missing: attributes | Show results with:attributes
  34. [34]
    Configure Policy-based Routing with Next-Hop Commands - Cisco
    Nov 20, 2023 · This document describes how to use the set ip default next-hop and set ip next-hop commands to configure policy-based routing (PBR).
  35. [35]
    Use a Static Route to the Null0 Interface for Loop Prevention - Cisco
    The packs then loop between ISP-R1 and cust-R2 until the TTL expires. This can have a huge impact on the router CPU and link utilization. An example of where ...Missing: pbr | Show results with:pbr
  36. [36]
    Example: Configuring Filter-Based Forwarding on the Source Address
    This example shows how to configure filter-based forwarding (FBF), which is sometimes also called Policy Based Routing (PBR). The filter classifies packets ...<|separator|>
  37. [37]
    Understand the Extended Ping and Extended Traceroute Commands
    The extended ping is used to perform a more advanced check of host reachability and network connectivity.Missing: policy | Show results with:policy
  38. [38]
    Routing Configuration Guide for Cisco 8000 Series Routers, IOS XR ...
    Sep 16, 2025 · Policy-Based Routing (PBR) gives you a flexible means of routing packets by allowing you to configure a defined policy for traffic flows.
  39. [39]
    Policy based routing what is the limit of the number of routes you can ...
    Nov 1, 2022 · You can define a maximum of 128 IP policy route maps on the switch or switch stack. • You can define a maximum of 512 access control entries ( ...
  40. [40]
    [PDF] Guide to WAN Architecture & Design - Cisco
    such as Policy Based Routing (PBR). PBR allows network administrators to ... As mentioned, one example of cost reduction is the savings that results from ...
  41. [41]
    Cisco Application Centric Infrastructure Policy-Based Redirect ...
    This document provides PBR service graph design and configuration guidance using a variety of use cases and options.Missing: expired | Show results with:expired
  42. [42]
    Cisco Catalyst 8500 Series Edge Platforms Data Sheet
    The Cisco Catalyst 8500 Series Edge Platforms are high-performance cloud edge platforms designed for accelerated services, multi-layer security, cloud-native ...
  43. [43]
    IP Routing Configuration Guide, Cisco IOS XE 17.x - BGP 4 Soft ...
    Nov 2, 2022 · BGP4 soft configuration allows BGP4 policies to be configured and activated without clearing the BGP session, hence without invalidating the forwarding cache.
  44. [44]
    High CPU usage after configured PBR - Cisco Community
    Oct 13, 2013 · After I configured Policy Base Routing(PBR), cpu utilization was about 97% when the high traffic was passing through to this policy.Missing: overhead | Show results with:overhead
  45. [45]
    Load due to PBR - Cisco Community
    Sep 21, 2006 · Yes, PBR is extremely heavy on the CPU. Depending on the CPU, PBR will not be able to process more than 1.000 - 10.000 pps. On the 1721 I ...Missing: overhead | Show results with:overhead
  46. [46]
    inter-VRF PBR - blackhole safeguard? - Cisco Community
    Aug 17, 2024 · We suffer traffic blackholes due to route-map sequences not matching any existing ACL. In most cases (if not all), it's because someone has added a new route- ...Solved: Policy Base Routing (PBR) QuestionsPolicy Based Routing - DoubtMore results from community.cisco.com
  47. [47]
    TCAM allocation on SR Linux devices
    ### Summary of TCAM Usage and Limitations for Policy-Based Routing on SR Linux Devices