To have a better experience, please upgrade your IE browser.upgrade
Questo sito utilizza cookie di profilazione (propri e di terze parti) per ottimizzare la tua esperienza online e per inviarti pubblicità in linea con le tue preferenze. Continuando a utilizzare questo sito senza modificare le tue preferenze acconsenti all’uso dei cookie. Se vuoi saperne di più o negare il consenso a tutti o ad alcuni cookie clicca qui>
The website that you are visiting also provides Arabian language. Do you wish to switch language version?
يوفر موقع الويب الذي تزوره المحتوى باللغة العربية أيضًا. هل ترغب في تبديل إصدار اللغة؟
The website that you are visiting also provides Russia language Do you wish to switch language version?
Данный сайт есть в английской версии. Желаете ли Вы перейти на английскую версию?
1、Version and networking:
Use a single NE80E V300R003C01B205 to test the uRPF function. The networking is as follows:
184.108.40.206/24 220.127.116.11/24 18.104.22.168/24 22.214.171.124/24
The address of PC1 is set to 126.96.36.199, and its gateway address is set to 188.8.131.52. The address of PC2 is set to 184.108.40.206, and its gateway address is set to 220.127.116.11.
Start the packet capture software on PC1. Access PC2. Capture a packet sent from PC1 to PC2. Change the source address from 18.104.22.168 to 22.214.171.124 in the packet. Then, send the new packet repeatedly to PC1. When uRPF fails to be enabled on the interface of the NE80E to PC1, theoretically, the packet capture tool on PC2 can capture the spoofing packets sent from PC1. When uRPF is enabled on the interface of the NE80E to PC1, theoretically, the packet capture tool on PC2 cannot capture the spoofing packets sent from PC1.
When uRPF fails to be enabled on the interface of the NE80E to PC1, PC2 cannot receive the spoofing packets sent from PC1. Check the NE80E. The spoofing packets sent from PC1 are found having reached the NE80E. The NE80E, however, does not forward these packets.
Modify the test procedure: After the normal packets sent from PC1 to PC2 are captured, do not modify the packets, instead, modify the IP address between PC1 and NE80E to 126.96.36.199/24 and 188.8.131.52/24.
184.108.40.206/24 220.127.116.11/24 18.104.22.168/24 22.214.171.124/24PC1 sends the captured packets (source IP address 126.96.36.199) repeatedly. The expected test objective is achieved.