mirror of
				https://github.com/vyos/vyos-documentation.git
				synced 2025-10-26 08:41:46 +01:00 
			
		
		
		
	policy: fix lint errors
This commit is contained in:
		
							parent
							
								
									8a43e769a0
								
							
						
					
					
						commit
						95f1bc6724
					
				| @ -10,8 +10,10 @@ routes and their attributes needs to be put into the routing table. | ||||
| There could be a wide range of routing policies. Some examples are below: | ||||
| 
 | ||||
| * Set some metric to routes learned from a particular neighbor | ||||
| * Set some attributes (like AS PATH or Community value) to advertised routes to neighbors | ||||
| * Prefer a specific routing protocol routes over another routing protocol running on the same router | ||||
| * Set some attributes (like AS PATH or Community value) to advertised routes | ||||
|   to neighbors | ||||
| * Prefer a specific routing protocol routes over another routing protocol | ||||
|   running on the same router | ||||
| 
 | ||||
| Example | ||||
| ======= | ||||
| @ -65,8 +67,6 @@ neighbor. | ||||
| You now see the longer AS path. | ||||
| 
 | ||||
| 
 | ||||
| .. include:: /_include/need_improvement.txt | ||||
| 
 | ||||
| .. _routing-pbr: | ||||
| 
 | ||||
| ### | ||||
| @ -136,7 +136,7 @@ Add default routes for routing ``table 10`` and ``table 11`` | ||||
| 
 | ||||
| .. code-block:: none | ||||
| 
 | ||||
|   set protocols static table 10 route 0.0.0.0/0 next-hop 192.0.1.1 | ||||
|   set protocols static table 10 route 0.0.0.0/0 next-hop 192.0.2.1 | ||||
|   set protocols static table 11 route 0.0.0.0/0 next-hop 192.0.2.2 | ||||
| 
 | ||||
| Add policy route matching VLAN source addresses | ||||
| @ -175,11 +175,13 @@ each other using the main routing table. | ||||
| Local route | ||||
| =========== | ||||
| 
 | ||||
| The following example allows VyOS to use :abbr:`PBR (Policy-Based Routing)` for traffic, which originated from the router itself. | ||||
| That solution for multiple ISP's and VyOS router will respond from the same interface that the packet was received. | ||||
| Also, it used, if we want that one VPN tunnel to be through one provider, and the second through another. | ||||
| The following example allows VyOS to use :abbr:`PBR (Policy-Based Routing)` | ||||
| for traffic, which originated from the router itself. That solution for multiple | ||||
| ISP's and VyOS router will respond from the same interface that the packet was | ||||
| received. Also, it used, if we want that one VPN tunnel to be through one | ||||
| provider, and the second through another. | ||||
| 
 | ||||
| * ``192.168.1.254`` IP addreess on VyOS eth1 from ISP1 | ||||
| * ``203.0.113.0.254`` IP addreess on VyOS eth1 from ISP1 | ||||
| * ``192.168.2.254`` IP addreess on VyOS eth2 from ISP2 | ||||
| * ``table 10`` Routing table used for ISP1 | ||||
| * ``table 11`` Routing table used for ISP2 | ||||
| @ -188,10 +190,10 @@ Also, it used, if we want that one VPN tunnel to be through one provider, and th | ||||
| .. code-block:: none | ||||
| 
 | ||||
|   set policy local-route rule 101 set table '10' | ||||
|   set policy local-route rule 101 source '192.0.1.254' | ||||
|   set policy local-route rule 101 source '203.0.113.0.254' | ||||
|   set policy local-route rule 102 set table '11' | ||||
|   set policy local-route rule 102 source '192.0.2.254' | ||||
|   set protocols static table 10 route '0.0.0.0/0' next-hop '192.0.1.1' | ||||
|   set protocols static table 10 route '0.0.0.0/0' next-hop '203.0.113.0.1' | ||||
|   set protocols static table 11 route '0.0.0.0/0' next-hop '192.0.2.2' | ||||
| 
 | ||||
| Add multiple source IP in one rule with same priority | ||||
| @ -199,7 +201,7 @@ Add multiple source IP in one rule with same priority | ||||
| .. code-block:: none | ||||
| 
 | ||||
|   set policy local-route rule 101 set table '10' | ||||
|   set policy local-route rule 101 source '192.0.1.254' | ||||
|   set policy local-route rule 101 source '192.0.1.253' | ||||
|   set policy local-route rule 101 source '203.0.113.0/24' | ||||
|   set policy local-route rule 101 source '203.0.113.0.254' | ||||
|   set policy local-route rule 101 source '203.0.113.0.253' | ||||
|   set policy local-route rule 101 source '198.51.100.0/24' | ||||
| 
 | ||||
|  | ||||
| @ -1218,9 +1218,11 @@ That is how it is possible to do the so-called "ingress shaping". | ||||
| 
 | ||||
| 
 | ||||
| .. stop_vyoslinter | ||||
| 
 | ||||
| .. _that can give you a great deal of flexibility: https://blog.vyos.io/using-the-policy-route-and-packet-marking-for-custom-qos-matches | ||||
| .. _tc: https://en.wikipedia.org/wiki/Tc_(Linux) | ||||
| .. _tocken bucket: https://en.wikipedia.org/wiki/Token_bucket | ||||
| .. _HFSC: https://en.wikipedia.org/wiki/Hierarchical_fair-service_curve | ||||
| .. _Intermediate Functional Block: https://www.linuxfoundation.org/collaborate/workgroups/networking/ifb | ||||
| 
 | ||||
| .. start_vyoslinter | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user