Routing and WAN connections
358
11.2
 
IP routing
BAT54-Rail/F..
Release
 
7.54
 
06/08
11.2.2 Policy-based routing
Policy-based routing does not rely exclusively upon the destination IP ad-
dress to define the destination route (meaning the remote device that is to be 
used to transfer the data). Further information can be used-such as the ser-
vice or the protocol used, sender addresses or the destination for the data 
packets-for the selection of the destination route. Policy-based routing can 
be used to achieve a significantly finer-grained routing behavior, such as in 
the following application scenarios:
D The LAN's entire Internet traffic is diverted to a proxy without entering the 
proxy address into the browsers. As the users do not notice the proxy 
routing, the scenario is named "transparent" proxy.
 
D With load balancing, the data traffic for selected protocols is diverted over 
a certain DSL port that uses an additional external ADSL modem.
D A server in the local network is only supposed to be accessible from the 
WAN via a fixed IP address; this is routed via a certain WAN interface.
D VPN traffic is forwarded to a VPN tunnel with dynamic end points by using 
the routing tag '0'; the company's remaining Internet traffic is diverted to 
another firewall by means of another suitable routing tag.
Suitable entries can be made in the firewall to select channels according to 
information other than just the destination IP address. These entries are sup-
plemented with a special routing tag that is used to control the channel se-
lection with the routing table. For example, a rule adds the routing tag '2' to 
the entire data traffic for a local group of computers (defined by an IP address 
range). Alternatively, certain protocols receive a different supplementary 
routing tag.
The diagram demonstrates the application of policy-routing with load balanc-
ing:
Data packet with 
target address in 
Internet
IP address Netmask Rt-Tag Router
255.255.255.255 0.0.0.0 1 Proxy
255.255.255.255 0.0.0.0 0 Internet
Extract of IP routing table
Source: local Net-
work
Destination: all
Port: 80
Action: Transfer
Tag: 1
Data packet with desti-
nation  address and IP 
routing tag '1'
Firewall rule
Source: Proxy
Destination: all
Port: 80
Action: Transfer
Tag: 0
Firewall rule
Data packet with  desti-
nation address and IP 
routing tag '0'
Data packet rout-
ed to the Internet