Click here to start

Table of contents

BCP-38 demo

Agenda

Basic network

Network diagram

Step 1: install and run software

1(a): Download packet spoofing software

1(b): Configure

1(c): Run the spoofer

Step 2: Observe spoofed packets and responses

Step 3: Enable unicast reverse-path filtering (URPF)

Step 4: See that it worked

URPF variant for multi-homed customer

Another variant: Filtering using access-group

Author: AfNOG E2 2006

Homepage: http://www.ws.afnog.org/