This blog was originally started to better help me understand the technologies in the CCIE R&S blueprint; after completing the R&S track I have decided to transition the blog into a technology blog.
CCIE #29033
This blog will continue to include questions, troubleshooting scenarios, and references to existing and new technologies but will grow to include a variety of different platforms and technologies. Currently I have created over 185 questions/answers in regards to the CCIE R&S track!! Note: answers are in the comment field or within "Read More" section.
You can also follow me on twitter @FE80CC1E
What command can be used to detect a packet that has been spoofed?
1 comments:
You can use unicast reverse path forwarding which ensures the packet received on an interface is the same interface that the packet would traverse if the traffic was destined to the IP address that was received.
interface config
"ip verify unicast source reachable-via rx"
Post a Comment