[c-nsp] Unicast Reverse Path Forwarding - Loose Mode

Frederic LOUI frederic.loui at renater.fr
Thu Apr 8 08:05:57 EDT 2010


As mentioned before, it still can be useful and necessary if you want to 
deploy some central filtering mechanism "RTBH" or variant.
More detailed here (As a start): 
http://www.cisco.com/web/about/security/intelligence/blackhole.pdf

After having activated uRPF in loose mode you can verify if you're 
effectively dropping packets using the "show ip interface  
<INTERFACE_NAME> | b  IP verify"

sh ip int X/Y
...
  IP verify source reachable-via ANY
   708 verification drops
   745456 suppressed verification drops
   0 verification drop-rate
...

Best regards / Frederic

-- 
Frederic LOUI / GIP RENATER

Pilotage & Suivi du Réseau
Network Backbone Engineering & Planning

Tel: +33 1 53 94 20 40 / Fax: +33 1 53 94 20 31
loui at renater.fr http://www.renater.fr 



Reuben Farrelly a écrit :
> I've been reading up about uRPF on Cisco's website, at:
>
> http://www.cisco.com/en/US/docs/ios/12_2t/12_2t13/feature/guide/ft_urpf.html 
>
>
> I've heard many people suggest that having uRPF filtering on in an ISP 
> environment is a good idea (and best practice).
>
> However I'm grappling with the idea in terms of how effective it might 
> be, and if it will solve a specific problem that I have observed 
> recently.
>
> We are a multihomed ISP, and have uplinks to two separate carriers 
> taking full BGP feeds as well as multiple peering sessions from other 
> parties.  This means that there is some asymmetric routing present - a 
> situation which is pretty much unavoidable in this situation.
>
> Now going by the document above, deploying loose mode uRPF on our 
> edge/outside interfaces would mean that our border router would be 
> able to drop traffic from non routable sources from coming into our 
> network.
>
> Two questions:
>
> 1. Given the global routing table is increasing and there is not all 
> that much unallocated/non-routed IP networks left (and thus fewer 
> invalid source addresses to draw from), is uRPF much of an advantage 
> in todays ISP/IPv4 networks?
>
> 2. We are also seeing some traffic sourced from IPs within a specific 
> /24 subnet inside our AS, entering from outside of our AS.  It is 
> being sourced from somewhere on the Internet by some host(s) which are 
> sending the traffic out with our source address but are not actually 
> originating the traffic from within our AS (which I guess is along the 
> lines of a DoS but the traffic volumes are relatively low).  I am 
> dropping this on our 7200 via ACLs deployed on the outside 
> edges/interfaces of our network.  Could loose mode uRPF help solve 
> this problem?
>
> Thanks,
> Reuben
>
>
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/


More information about the cisco-nsp mailing list