D-Link DRO-210i manual Routing Table, Policy Based Routing

Page 26

Routing

4.3 Routing Table

The router maintains all the active route entries, and displays them in the Routing table. The static routes configured manually by the administrator are displayed in grey color. And the dynamic routes learnt via RIP are displayed in yellow color.

Select Status Route Table to view the Routing Table as explained below.

Web UI

Routing Table

Destination IP

The destination network reachable through this route.

address

 

 

 

Subnet Mask

The subnet mask for this route. When there are multiple routes to the

 

same destination, the route with the longest subnet mask will be given

 

preference.

 

 

Gateway IP address

This is the next hop router’s IP Address to which packets matching this

 

route will be forwarded.

 

 

Interface

This is the interface on which the route is active

 

 

4.4 Policy Based Routing

Policy Based Routing (PBR) is an extension of normal routing, which offers network administrators significant flexibility to implement their own custom policies for making routing decisions. Typically, Static/Dynamic routing defines routes based on the destination IP Address of the packet. With PBR, the administrator has more control to choose a specific path for certain traffic flows based on various criteria, such as source/destination IP Addresses, Ports and Protocol.

Policy-based routing helps to define custom policies for routing traffic. For example, policy can be defined to route all HTTP traffic through WAN1 and E-mail traffic through WAN2. These policies help to achieve efficient traffic distribution. A set of parameters (e.g. source IP address, destination IP address, inbound interface, protocol, source/destination ports) are used to identify and direct the traffic out of a specific outbound interface.

Select Routing Policy-Based to configure Policy Based Routing as explained below.

Web UI

Policy Based Routing

Policy Based

Select Enable to activate Policy based routing in the router.

Routing

 

 

 

Dlink DRO-210i User Guide

26

Image 26
Contents DRO-210i Table Of Contents Virtual Private Network About This Manual BoldDlink DRO-210i User Guide Product OverviewProduct Overview DRO-210i Package Contents Hardware DetailsFront Panel Rear Panel Software Features RoutingVPN Tools Disabled WAN2/DMZ Port ConfigurationOptional Port Configuration InterfacesDMZ Interface LAN SettingsLAN Interface Forgot LAN IP ?Maximum Transmission Unit DMZ SettingsWAN Interface IP Settings for WAN1 Interface Static ModeDynamic Mode Dhcp Settings for WAN1 InterfacePPPoE Mode Unnumbered InterfacesPPPoE Settings for WAN1 Interface Dhcp Server DHCP, DNS and TimeDhcp DHCP, DNS and TimeDhcp Static Mapping Dhcp Static MappingDhcp Relay Dhcp RelayDNS Proxy Settings DNS ProxySystem Time Settings Time Routing RoutingStatic Routing Static RoutingDynamic Routing RIP Settings Routing Table Routing TablePolicy Based Routing Policy Based RoutingTo the same destination High Availability Auto BackupBackup Configuration High AvailabilityEthernet Link Detection Load Balancing ConfigurationLoad Balancing Ethernet WAN Link Detection Network Address Translation NAT Interface ConfigurationNAT Interface Configuration NATNAT Exception NAT ConfigurationNAT Configuration Virtual Server/NAPT Virtual ServerNAT Exception SIP ALG Configuration SIP-ALGNAT Table NAT Session TableFirewall Interface ConfigurationFirewall Interface Configuration Firewall PoliciesPolicy Rules Policy RulesInbound Policies Permitted ServicesInbound Policies Permitted Services Inbound PoliciesAdd Permitted IP Rule Outbound PoliciesIP Permitted Rules Outbound Policies Outbound PoliciesIP Blocked Rules Blocked ServicesOutbound Policies Service Blocked Rule Add Blocked IP RuleOutbound Policies Untrusted Domain Domain FilterUntrusted Domain Trusted DomainCookie Filter Web FilterJava Filter ActiveX FilterFile Extension Filter Keyword FilterKeyword Exception Add Blocked MAC Address MAC FilterBlocking Log Blocking Log TableIDS Configuration Intrusion DetectionIDS Configuration Intrusion Log Table Intrusion LogBlack List Black List TableVirtual Private Network Virtual Private NetworkIPSec Passthrough IPSec Tunnel or PassthroughPeer-To-Peer IPSec TunnelVirtual Private Network Same IKE Encryption algorithm on both ends of a VPN tunnel IPSec Server Configurations IPSec ServerMaximum life duration is 86400 seconds Limitation Tunnel Remote ID ConfigurationTunnel Table IPSec Status IPSec StatusIPSec Log IPSec Log TableQuality of Service Quality of ServiceClass Configuration HTB QoS ConfigurationsQuality of Service Filter Configuration QoS Filter ConfigurationsType Of Service/DiffServ TOS/DiffServQuality of Service Device Information AdministrationAdministration Device InfoTraffic Statistics Traffic StatisticsSession Log Session Log Password ChangeSysLog System LogSystem Change PasswordPassword Recovery SystemUpdate Firmware/Configuration Upload/DownloadPing Test Remote AccessRemote Access Ping TestAdministration Dlink DRO-210i User Guide General Frequently Asked QuestionsFrequently Asked Questions Q6. What is the purpose of Dhcp Server Auto Configuration? DHCP, DNSRouting High AvailabilityFirewall Frequently Asked Questions 11.6 NAT Q21. What are the call features supported by SIP-ALG? 11.7 VPN11.8 QoS Frequently Asked Questions