z/OS Communications Server: IPv6 Network and Application Design Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Policy-based routing

z/OS Communications Server: IPv6 Network and Application Design Guide
SC27-3663-00

Policy-based routing enables the TCP/IP stack to make routing decisions that take into account criteria other than just the destination IP address. The additional criteria can include job name, source port, destination port, protocol type (TCP or UDP), source IP address, NetAccess security zone, and multilevel secure environment security label. Policy-based routing might be useful in the following sample scenarios:

  • You might want to use high-bandwidth links for batch traffic, but for interactive traffic you prefer low-latency links. In this scenario, you can define policies such that Telnet traffic is routed over the low-latency links, and FTP traffic is routed over the high-bandwidth links.
  • You could define a policy to ensure that traffic that is tagged with a security label and zone is routed to a secured network over an appropriate outbound interface.
  • You might want to control the links that Enterprise Extender traffic uses to keep that traffic from being impacted by other IP traffic loads.

For more information about policy-based routing, see z/OS Communications Server: IP Configuration Guide.

Restrictions:
  • Policy-based routing applies to only TCP and UDP traffic that originates at the TCP/IP stack. Traffic that is using protocols other than TCP and UDP and all traffic that is being forwarded by the TCP/IP stack is always routed by using the main route table, even when policy-based routing is in use.
  • If Common INET (CINET) is used to run multiple z/OS® Communications Server TCP/IP stacks concurrently, CINET has no knowledge of the policy-based route tables that those TCP/IP stacks use. CINET has knowledge only of the routes in the main route table of each TCP/IP stack. Avoid the use of policy-based routing in a CINET environment, unless at least one of the following conditions is true:
    • All applications establish affinity with a particular TCP/IP stack.
    • The route destinations in each TCP/IP stack route table are mutually exclusive with the route destinations on the other TCP/IP stacks, including the default route.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014