Administrator Guide

Table Of Contents
Access Control Lists 649
packets are considered as candidates for routing according to rules specified in
route-map. If none of the match rules are successful, then packet is routed by
the standard L3 routing process. The implicit “deny all” rule is not applicable
to interfaces on which a routing policy is configured. Configuring an explicit
deny all ACL that not associated with a route-map will drop packets prior to
them being processed by PBR.
Black Holes Possible
If the next hop specified by a policy-based rule is not reachable, packets
matching the ACL are routed using the routing table. If the routing table
does not supply a route to the destination, then the packets are lost. If a set
interface null0 statement is present in the policy map, the packets are
dropped. The set interface null0 statement can also be used to drop
undesirable or unwanted traffic, i.e. create a black hole route.
Counter Support for Route-map ACL
A counter is associated with each ACL rule associated with a route-map in
order to indicate how many packets have been policy routed. There is no
provision to non-destructively clear these counters from the UI. Counters
associated with route-map statement are cleared when the route-map is
removed from the VLAN. The hardware does not support both a counter and
a rate-limit. Therefore, the system does not support configuring ACLs with a
rate-limit being used for PBR. In this case, a separate interface or VLAN ACL
with a rate-limit can be used at the cost of consuming additional resources.
Packets matching PBR-associated ACLs that contain deny statements are not
counted. Deny ACLs in PBR rules are optimized out of the system as they
always fall through to the next PBR statement.
PBR Associated ACLs Processed After User-defined ACLs
Each ACL in an access-group is associated with a sequence number
indicating the order in which the ACL is processed by the hardware. Likewise,
a route-map may have multiple statements with different sequence numbers
associated with each ACL entry. These statements are processed in sequential
order beginning with the lowest numbered rule, but only after all user
configured ACLs that are not associated with any route-map.