Network requirements
As shown in Figure 127, a client (Switch A) directly connects to an ISP switch (Switch B). Enable strict URPF check on Switch A and Switch B to prevent source address spoofing attacks.
Figure 127: Network diagram
As shown in Figure 127, a client (Switch A) directly connects to an ISP switch (Switch B). Enable strict URPF check on Switch A and Switch B to prevent source address spoofing attacks.
Figure 127: Network diagram