Got it

Creating a Routing Policy

Latest reply: Oct 29, 2018 08:53:15 806 6 6 0 0
Routing policies are used to filter routes and control the receiving and advertising of routes. By changing route attributes, such as reachability, you can change the path through which network traffic passes. You can configure a route-policy to import or advertise routes of a specified protocol.
A route-policy filters routes and defines attributes for matching routes. A route-policy consists of multiple nodes. Each node contains multiple filter attributes and configurable attributes. Filter attributes define conditions against which packets are matched. Configurable attributes define attributes for matching routes.
The rules used by route-policies to filter routes are as follows:
1), Filter attributes of the same route-policy are ANDed. Routes that match all filter attributes can be used.
2), for the same node in a route-policy, the relationship between the matching rules of the same match attribute is OR. Specifically, a route matches the match attribute if it meets any matching rule of the match attribute.
3), Filter attributes of different nodes are ORed. If routes match filter attributes defined on a node, the route matches the routing policy. If none of nodes is matched, the route does not match the route-policy.
Procedure
1. Choose Configuration > Dynamic Management > Route Management > Routing Policy > Routing Policy from the Function Tree of the NE Explorer. The Routing Policy tab is displayed.
2. Click Create. The Routing Policy[Create] window is displayed.
3. Set Routing Policy parameters. Set Set an MPLS Label to true. If an NE is configured as an LSP transit node, set Match an MPLS Label to true. If the NE is not a transit node, set Match an MPLS Label to false.

A large number of packets need to be forwarded on the network, which may cause network congestion and degrade network performance. IP performance optimization can solve the problem. You can adjust parameters or forwarding modes for IP packets to achieve optimal network performance.

IP performance can be optimized using any of the following functions:

  • Configuring source IP addresses verification
  • Configuring the switch to fragment outgoing IP packets
  • Configuring a load balancing mode for IP packet forwarding
  • Configuring layer 3 hardware forwarding of IPv4 packets
  • Configuring the switch to discard IP packets with options
  • Configuring the switch to discard IP packets with expired TTL
  • Configuring the switch to discard IP packets matching no routing entry
  • Configuring an interface to forward directed broadcast packets
  • Disabling the IP packet checking function
  • Enabling the switch to perform layer 2 forwarding for IP traffic during a ring network switchover
  • Configuring ICMP properties
  • Configuring TCP properties
This post was last edited by No.9527 at 2018-10-31 03:25.
View more
  • x
  • convention:

    By default, if a routing policy changes, the RM module immediately informs the protocols to apply a new routing policy.

    If the valid time of a routing policy is configured, the RM module does not immediately inform the protocols to process the changes when the related command configurations of the routing policy change. Instead, routing protocols wait for the configured valid time and then apply a new routing policy.

    If the configuration of the routing policy changes again during the configured valid time, the RM module resets the timer. This post was last edited by SupperRobin at 2018-10-31 06:09.
View more
  • x
  • convention:

Probesthat do not contain an SSID: The STA periodically broadcasts a Probe Requestframe that does not contain an SSID in the supported channels , TheAPs return Probe Response frames to notify the STA of the wireless servicesthey can provide
Probescontaining an SSID: The STA sends a Probe Request frame containing an SSID ineach channel to search for the AP with the same SSID. Only the AP with the sameSSID will respond to the STA

This post was last edited by littlestone at 2018-10-30 01:38.
View more
  • x
  • convention:

Thanks
View more
  • x
  • convention:

If you can add the screenshots of the steps involved, it would be very helpful
View more
  • x
  • convention:

well explained
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.