Planet XGS3-24042 User Manual Page 206

  • Download
  • Add to my manuals
  • Print
  • Page
    / 721
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 205
22-43
22.3 IP Forwarding
22.3.1 Introduction to IP Forwarding
Gateway devices can forward IP packets from one subnet to another; such forwarding uses routes to find a
path. IP forwarding of switch is done with the participation of hardware, and can achieve wire speed
forwarding. In addition, flexible management is provided to adjust and monitor forwarding. Switch supports
aggregation algorithm enabling/disabling optimization to adjust generation of network route entry in the switch
chip and view statistics for IP forwarding and hardware forwarding chip status.
22.3.2 IP Route Aggregation Configuration Task
IP route aggregation configuration task:
1. Set whether IP route aggregation algorithm with/without optimization should be used
1. Set whether IP route aggregation algorithm with/without optimization should be used
Command
Explanation
Global Mode
ip fib optimize
no ip fib optimize
Enables the switch to use optimized IP
route aggregation algorithm; the “no ip fib
optimize” disables the optimized IP route
aggregation algorithm.
22.4 URPF
22.4.1 Introduction to URPF
URPF (Unicast Reverse Path Forwarding) introduces the RPF technology applied in multicast to unicast, so
to protect the network from the attacks which is based on source address cheat.
When switch receives the packet, it will search the route in the route table using the source address as the
destination address which is acquired from the packet. If the found router exit interface does not match the
entrance interface acquired from this packet, the switch will consider this packet a fake packet and discard it.
In Source Address Spoofing attacks, attackers will construct a series of messages with fake source addresses.
For applications based on IP address verification, such attacks may allow unauthorized users to access the
system as some authorized ones, or even the administrator. Even if the response messages cant reach the
attackers, they will also damage the targets.
Router A
Router B
Router C
1.1.1.8/8
2.2.2.1/8
S
ource IP2.2.2.1/8
Page view 205
1 2 ... 201 202 203 204 205 206 207 208 209 210 211 ... 720 721

Comments to this Manuals

No comments