From: Tony Schaffran (groupstudy@cconlinelabs.com)
Date: Tue May 10 2005 - 00:58:52 GMT-3
I guess we would need more information here.
I assumed that the 150.15.0.0/16 address would be on the Ethernet (LAN)
interface and therefore would be in the routing table. RPF would then stop
any packet sourcing from the 150.15.0.0/16 address from entering the Serial
interface, would it not?
Tony Schaffran
Network Analyst
CCIE #11071
CCNP, CCNA, CCDA,
NNCDS, NNCSS, CNE, MCSE
www.cconlinelabs.com
Your #1 choice for online Cisco rack rentals.
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Security Candidate
Sent: Monday, May 09, 2005 8:40 PM
To: mani poopal; Tony Schaffran; ccielab@groupstudy.com
Subject: RE: smurf attack
small correction here , the RPF does not stop packets of source not in the
routing table
what it does is it verifies that the source is in the routing table from the
same interface it should come from , so lets say you have default route to
serial 0 , it means any packet with unknown source should be received from
serial 0 ..not any other interface
hope this help
yahoo.com> wrote:
Hi Tony,
I think the "ip verify unicast reverse-path" command stops packets from
sources of ip address not in the routing table. ie: without verifiable
source address. But this major network is in the routing table of the
router, so how this command stops the smurf attack
thanks
Mani
Tony Schaffran wrote:
Here is the best way to stop a smurf attack.
ip verify unicast reverse-path
The access list was used to filter spoofed IP packets before this command
was introduced.
Tony Schaffran
Network Analyst
CCIE #11071
CCNP, CCNA, CCDA,
NNCDS, NNCSS, CNE, MCSE
www.cconlinelabs.com
Your #1 choice for online Cisco rack rentals.
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of Tony
Schaffran
Sent: Monday, May 09, 2005 6:52 PM
To: 'Tony Schaffran'; 'mani poopal'; ccielab@groupstudy.com
Subject: RE: smurf attack
Disregard my last.
I was thinking of another attack.
Tony Schaffran
Network Analyst
CCIE #11071
CCNP, CCNA, CCDA,
NNCDS, NNCSS, CNE, MCSE
www.cconlinelabs.com
Your #1 choice for online Cisco rack rentals.
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of Tony
Schaffran
Sent: Monday, May 09, 2005 6:48 PM
To: 'mani poopal'; ccielab@groupstudy.com
Subject: RE: smurf attack
You need to understand what a SMURF attack is before you can know how to
stop it.
Google it.
Tony Schaffran
Network Analyst
CCIE #11071
CCNP, CCNA, CCDA,
NNCDS, NNCSS, CNE, MCSE
www.cconlinelabs.com
Your #1 choice for online Cisco rack rentals.
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of mani
poopal
Sent: Monday, May 09, 2005 6:27 PM
To: ccielab@groupstudy.com
Subject: smurf attack
Hi Group,
If your network(150.15.0.0/16) is subjected to smurf attack how do you
prevent it. Is it attck by inturder stealing your own ip address. Is the
following config is enough to stop the smurf attack.
access-list 101 deny ip 150.15.0.0 0.0.255.255 any
access-list 101 permit ip any any
int s 0
ip access-group 101 in
thanks
Mani
B.ENG,A+,CCNA,CCNP,CCNP-VOICE, CSS1,CNA,MCSE
(416)431 9929
MANI_CCIE@YAHOO.COM
This archive was generated by hypermail 2.1.4 : Fri Jun 03 2005 - 10:11:57 GMT-3