Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All
     

    Related Documentation

     

    Understanding Unicast Reverse Path Forwarding

    Unicast reverse path forwarding protects the switch against denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks by comparing the source address of a received unicast packet against the switch’s routing table to see if the source address is valid or spoofed (faked). Reverse path forwarding (RPF) works in two modes:

    • Strict mode: In this mode, the switch checks to see if a packet is received on the interface that the switch would use if it were sending a packet to the incoming packet’s source address. If the packet fails this test, the switch discards it.
    • Loose mode: In this mode, the switch checks to see if the incoming packet’s source address is in the switch’s routing table, but the switch does not verify whether it would use the ingress interface to send a packet to the incoming packet’s source address. If the source address is in the routing table, the switch accepts the packet and forwards it as required.

    To configure unicast reverse path forwarding, issue the rpf-check statement at the [edit interfaces unit family] hierarchy level.

     

    Related Documentation

     

    Published: 2013-07-01