Configuration procedure ························································································································· 363
Configuration guidelines ························································································································· 363
Configuration procedure ························································································································· 363
Configuration example ··························································································································· 364
Configuring ARP filtering ································································································································ 364
Configuration guidelines ························································································································· 364
Configuration procedure ························································································································· 365
Configuration example ··························································································································· 365
Configuring uRPF ······················································································· 367
Overview ························································································································································ 367
uRPF check modes ································································································································ 367
Features ················································································································································· 367
uRPF operation ······································································································································ 368
Network application ································································································································ 369
Configuration procedure ································································································································ 370
uRPF configuration example ·························································································································· 370
Configuring IPv6 uRPF ··············································································· 372
Overview ························································································································································ 372
IPv6 uRPF check modes ························································································································ 372
Features ················································································································································· 372
IPv6 uRPF operation ······························································································································ 373
Network application ································································································································ 374
Configuration procedure ································································································································ 375
Configuring FIPS ························································································· 377
Overview ························································································································································ 377
Configuring FIPS mode ·································································································································· 378
Entering FIPS mode ······························································································································· 378
Exiting FIPS mode ································································································································· 380
FIPS self-tests ················································································································································ 380
Power-up self-tests ································································································································ 381
Conditional self-tests ······························································································································ 381
Triggering self-tests ································································································································ 382
FIPS configuration examples ························································································································· 382
Overview ························································································································································ 387
Single-packet attacks ····························································································································· 387
Scanning attacks ···································································································································· 388
Flood attacks ·········································································································································· 389
viii