Reference Guide
track
Congures and manages tracked objects.
Syntax
track object-id
Parameters object-id — Enter the object ID to track (up to 500).
Defaults Not congured
Command Mode CONFIGURATION
Usage Information The no version of this command deletes the tracked object from an interface.
Example
OS10# track 100
Supported Releases 10.3.0E or later
Policy-based routing
Policy-based routing (PBR) provides a mechanism to redirect IPv4 and IPv6 data packets based on the policies dened to override the
switch’s forwarding decisions based on the routing table.
Policy-based route-maps
A route-map is an ordered set of rules that control the redistribution of IP routes into a protocol domain. When you enable PBR on an
interface, all IPv4 or IPv6 data packets received are processed based on the policies that you dene in the route-maps. The rules dened in
the route-maps are based on access control lists (ACLs) and next-hop addresses, and only apply to ACLs used in policy-based routing.
You can create a route-map that species the match criteria and the resulting action if all the match clauses are met. After you create the
route-map, you can enable PBR for that route-map on a specic interface. Route-maps contain match and set statements that you can
mark as
permit.
Access-list to match route-map
You can assign an IPv4 or IPv6 access-list to match a route-map.
The IP access list contains the criteria to match the trac content based on the header eld, such as destination IP or source IP.
When permit or deny is present in the access-list, it is omitted and the action present in the route-map command is used for
policy-based routing. permit in the route-map statement indicates policy-based routing, as where deny in the route-map statement
indicates a switch-based forwarding decision—PBR exception. Access-list is used only for the packet match criteria in policy-based
routing.
1 Assign an access-list to match the route-map in CONFIGURATION mode.
ip access-list access-list-name
2 Set the IP address to match the access-list in IP-ACL mode.
permit ip ip-address
3 Save the conguration.
do commit
Layer 3
315