White Papers
3 Using Policy Based Routing and Access Control Lists in a Virtualized Network
Table of Contents
Revisions ...................................................................................................................................................................................................... 2
Executive Summary................................................................................................................................................................................... 4
1 Introduction..........................................................................................................................................................................................5
1.1 User Scenarios ..........................................................................................................................................................................5
1.2 Dell Networking Switches Supporting PBR...................................................................................................................... 6
2 Example 1 – Traffic Isolation............................................................................................................................................................7
2.1 Validation .................................................................................................................................................................................. 9
3 Example 2 – Server Priority ............................................................................................................................................................ 11
3.1 Validation ................................................................................................................................................................................ 13
4 Example 3 – VLAN Traffic Redirection ........................................................................................................................................15
4.1 Validation ................................................................................................................................................................................ 19
5 Dropping Packets .............................................................................................................................................................................20
6 Rerouting Remaining Packets on an Interface......................................................................................................................... 21
7 Other Resources .............................................................................................................................................................................. 22
Appendix A: Packet Process flow through a Route-map ............................................................................................................ 23