ZXR108900SeriesUserManual(BasicCongurationVolume)
IPaddressmayalsobeusedtowageanattackaslongasitis
unreachable.
Module2AnothernetworkmodelisshowninFigure38.
FIGURE38SOURCEADDRESSSNOOPING2
Theattackermayforgeasourceaddressthatistheaddressof
anotherlegalnetworkandexistsinglobalroutingtable.Forex-
ample,attackermayforgeasourceaddresssothattheattacked
willthinkthattheattackcomesfromforgedsourceaddressbut
infactsourceaddressiscompletelyinnocent.Inaddition,some-
timesnetworkadministratorwillclosealldataowscomingfrom
thatsourceaddressandthisinreturnmakesDOSattackofthe
attackersuccessfullybecometrue.
AmorecomplexscenarioisthatTCPSYNoodingattackwillcause
TCPSYN-ACKdatapackettobesenttomanyhostscompletely
independentoftheattackandsuchhostswillbecomevictims.As
aresult,attackermayspoofoneormoresystemsatthesame
time.
Similarly,UDPandICMPmaybeusedtoimplementoodingat-
tacks.
Alltheseattackswillseverelylowerthesystemperformanceor
evencausesystemtocrash.URPFisatechnologytoguardagainst
suchattacks.
ConfiguringURPF
TherearethreetypesofURPF:StrictURPF(SRPF),LooseURPF
(lRPF)andURPFthatignoresthedefaultroute(lnRPF).
TocongureURPF ,performthefollowingsteps.
Step
CommandFunction
1
ZXR10(config-if)#ipverify{strict|loose|
loose-ingoring-default-route}
ThisenablestheURPFcheck
functiononaninterface
2
ZXR10(config-if)#urpflog{on|off}
Thisenablesordisablesthe
URPFlogfunction
158CondentialandProprietaryInformationofZTECORPORATION