Skip to main content

PE PBR

This document provides a simple explanation of what Policy Based Routing (PBR) is and how it works in PE (Provider Edge) devices. However, the basic rules are the same as those in CE (Customer Edge) devices.

PBR stands for Policy-Based Routing. This technology allows network administrators to decide where a data packet will go. They don't just look at the final destination of the packet, but also look at many other things like the type of packet or where it came from. This allows them to better control the traffic in the network and create different rules for different needs.

See the CE PBR documentation. It explains in simple terms how to configure, modify, and delete. The basics and methods are the same for both.

Link to CE PBR Documentation: CE PBR Document

Core Concepts of PBR

Below are the key fields used when configuring a PBR rule, along with their descriptions:

FieldDescription
PriorityPBR rules are checked in order, with lower numbers given more importance.
LookupDetermines where the rule applies.
Input InterfaceWhere the traffic comes from and matches the rule.
Output InterfaceInterface for sending specific traffic.
Source IP AddressIts range is determined by combining the sender's IP address and netmask.
Select Source NetmaskNA netmask is used with the source IP to find a specific network range.
Source PortThe port from which the traffic originated
Destination IP AddressThe receiver's IP address determines which traffic rule applies.
Select Destination NetmaskThe destination IP and netmask are used for a specific IP range.
Destination PortThe port to which traffic is sent
InvertIf enabled, the rule applies to all but the defined IP and port.
ActionProvides options to edit or delete the IP Rule.

Basic Process of Implementing PBR

The general procedure for performing PBR is as follows, although there may be minor variations depending on the manufacturer and model of your PE device.

  1. Defining PBR Rules: Specify specific rules, such as where the data comes from (source IP), where it goes (destination port), and what to do next (e.g., where to send the data).
  2. Applying PBR Policies to Interfaces: Attaching the defined PBR (Policy Based Routing) rules to the PE (Provider Edge) device for specific interfaces. Traffic coming into this interface will then be checked against the defined PBR policy.
  3. Verification: Checking and verifying the PBR configuration to see if the road is running properly according to traffic rules.