This blog was originally started to better help me understand the technologies in the CCIE R&S blueprint; after completing the R&S track I have decided to transition the blog into a technology blog.

CCIE #29033

This blog will continue to include questions, troubleshooting scenarios, and references to existing and new technologies but will grow to include a variety of different platforms and technologies. Currently I have created over 185 questions/answers in regards to the CCIE R&S track!! Note: answers are in the comment field or within "Read More" section.

You can also follow me on twitter @FE80CC1E


Saturday, May 15, 2010

Question 90

What command can be used to detect a packet that has been spoofed?

1 comments:

Packets Analyzed said...

You can use unicast reverse path forwarding which ensures the packet received on an interface is the same interface that the packet would traverse if the traffic was destined to the IP address that was received.

interface config
"ip verify unicast source reachable-via rx"

Post a Comment