Unicast Reverse Path Forwarding
Unicast Reverse Path Forwarding
IP Spoofing
• IP spoofing is a method of attempting to gain access by inserting a
false source address in the packet header
10.1.1.0/24
firewall {
filter SPOOF-PREVENTION {
term DROP-SPOOFED-LAN {
from {
Router 1 source-address 10.1.1.0/24;
ge-0/0/1 }
WAN
then {
ge-0/0/0 discard;
}
}
term ALLOW-OTHERS {
then {
10.1.1.0/24 accept;
}
}
}
}
Unicast Reverse Path Forwarding
• Unicast reverse-path-forwarding (RPF) check is a tool to reduce
forwarding of IP packets that may be spoofing an address
• If the packet is from a valid path, the router forwards the packet to
the destination address. Otherwise the router discards the packet
Unicast Reverse Path Forwarding
• Loose mode – the incoming packet’s source address must be in the
route table
R1 R4
R3 Active Path
Feasible Path
Active vs Feasible Path
• By default, when Junos performs its RPF check, it considers only
the active routes to a given destination