North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: Network Operators and smurf
- From: Havard.Eidnes
- Date: Sat Apr 25 12:21:49 1998
> > 2. Routers/Gateways should be configured to drop all packets
> > with invalid source addresses.
> > The problem is us. This isn't a research network run and
> > maintained by the knowledgable. This is a business. We're
> > selling a product, and if we expect it to operate as
> > advertised, it's up to us to educate those we sell it to.
> The problem isn't us. It's cicso, and Bay, and Ascend,
> and... everyone who won't put an anti-forging filter on their
> border routers so we _can_ turn it on. The first time someone
> co-sues cisco, it'll get fixed with 30 days.
Current recipe for anti-forging with Cisco hardware:
o Pick up CEF code (11.1(17)CC, which doesn't yet (?) exist for all
Cisco platforms, unfortunately)
ip cef switch
! or "ip cef distributed switch" for an RSP+VIP2 based box
ip verify unicast reverse-path
This should (naturally) be implemented where routing is symmetric
and where a "reverse-path check" (looking up the source address in
the routing table to find the "expected" incoming interface and
checking whether the packet did indeed enter through that interface)
makes sense. If you have Ascend/Livingston or other dial-up
equipment this check should probably be implemented in the closest
up-stream router which has this capability, and definately not in a
router which could take part in asymmetric traffic patterns.