Hi,
Can somebody explain better spoofing with uRPF?
Let me see if I understood:
! access-list to permit one network spoofing and log any other violation
network Access-list 100 permit ip 10.10.10.0 0.0.0.255 Access-list 100 deny
ip any any log
! applying in upstream link
Interface S0/0
Ip verify unicast source reachable-via any 100
! applying uRPF to internal interface
Interface e0/0
Ip verify unicast source reachable-via rx 100
Thanks
Gudines
Blogs and organic groups at http://www.ccie.net
Received on Mon Jun 22 2009 - 22:19:50 ART
This archive was generated by hypermail 2.2.0 : Wed Jul 01 2009 - 20:02:37 ART