RE: Using Policy Routing to stop DoS attacks
If you fooled the router into thinking that the reverse path for the source is on another another interface and then used strict unicast RPF checking, that may accomplish what you want without using ACLs. I don't know what impact it would have on your CPU however, you'll have to investigate or provide more details.
However you'd also risk loosing any traffic that was asymmetric in nature. -Jim
On Tue, 25 Mar 2003, Jim Deleskie wrote:
If you fooled the router into thinking that the reverse path for the source is on another another interface and then used strict unicast RPF checking, that may accomplish what you want without using ACLs. I don't know what impact it would have on your CPU however, you'll have to investigate or provide more details.
However you'd also risk loosing any traffic that was asymmetric in nature.
not necessarily, implement uRPF 'loose check' so long as the source wasn't rfc1918 or had an invalid adjacency things should work... BUT keep in mind how the uRPF is processed on the platform in question :) just turning it on might tip the 5500 over.
participants (2)
-
Christopher L. Morrow
-
Jim Deleskie