Network requirements

As shown in Figure 127, a client (Switch A) directly connects to an ISP switch (Switch B). Enable strict URPF check on Switch A and Switch B to prevent source address spoofing attacks.

Figure 127: Network diagram