Urpf Configuration Example - HPE Moonshot 45Gc Security Configuration Manual

Switch module
Table of Contents

Advertisement

Task
Display uRPF configuration.

uRPF configuration example

Network requirements
As shown in
Enable strict uRPF check on Switch A and Switch B to prevent source address spoofing attacks.
Figure 136 Network diagram
Configuration procedure
1.
Enable strict uRPF check on Switch A.
<SwitchA> system-view
[SwitchA] ip urpf strict
2.
Enable strict uRPF check on Switch B.
<SwitchB> system-view
[SwitchB] ip urpf strict
Figure
136, a client (Switch A) directly connects to an ISP switch (Switch B).
Command
display ip urpf [ slot slot-number ]
434

Advertisement

Table of Contents
loading

Table of Contents