|
发表于 2017-4-18 11:38:35
|
显示全部楼层
本帖最后由 liugangpaul 于 2017-4-18 12:13 编辑
2 X# r9 e4 N0 C& b& I/ m1 F
* x4 p, F* \0 W z( [) c5 ^QUESTION 202和222问的其实是一样的内容. v' F( [3 A, }6 [1 @6 k3 l1 [
参考CCNP学习指南英文版(300新版)关于uRPF的叙述:& [/ q0 w' K, U- J% j3 o
Network administrators can use Unicast Reverse Path Forwarding (uRPF) to help limit
, L" {' _ W- ], x# Fthe malicious traffic on an enterprise network. This security feature works with Cisco
9 H# T/ A: L# P8 h, Y4 y7 CExpress Forwarding (CEF) by enabling the router to verify that the source of any IP' s, j( h0 W6 J& y- m: t9 M/ [0 C+ W
packets received is in the CEF table and reachable via the routing table. If the source IP+ L1 F3 L$ Q$ A6 Y4 ?/ K
address is not valid, the packet is discarded.: {; c$ {% U4 t& i- e6 P
5 z/ q6 u+ p1 K) Z4 `# B
access list与ACL有关,可以排除, k5 l0 L, D8 H; J, T5 H T; B) \
CEF和FIB,我倾向于选FIB,符合上述中的reachable via the routing table! ^, O6 D3 G. k: Z$ C
' `* Y. L, a) c' |- N
: S5 `1 u5 o1 V1 Z& Y! [2 O2 }( S; C, f& n. j
请各位指教
( ?$ l+ g- c; j: B |
地板
2017-4-18 11:38:35
回复(0)
收起回复
|