Questo sito utilizza cookie di profilazione (propri e di terze parti) per ottimizzare la tua esperienza online e per inviarti pubblicità in linea con le tue preferenze. Continuando a utilizzare questo sito senza modificare le tue preferenze acconsenti all’uso dei cookie. Se vuoi saperne di più o negare il consenso a tutti o ad alcuni cookie clicca qui>
The website that you are visiting also provides Arabian language. Do you wish to switch language version?
يوفر موقع الويب الذي تزوره المحتوى باللغة العربية أيضًا. هل ترغب في تبديل إصدار اللغة؟
The website that you are visiting also provides Russia language Do you wish to switch language version?
Данный сайт есть в английской версии. Желаете ли Вы перейти на английскую версию?
1、Version and networking:
Use a single NE80E V300R003C01B205 to test the uRPF function. The networking is as follows:
220.127.116.11/24 18.104.22.168/24 22.214.171.124/24 126.96.36.199/24
The address of PC1 is set to 188.8.131.52, and its gateway address is set to 184.108.40.206. The address of PC2 is set to 220.127.116.11, and its gateway address is set to 18.104.22.168.
Start the packet capture software on PC1. Access PC2. Capture a packet sent from PC1 to PC2. Change the source address from 22.214.171.124 to 126.96.36.199 in the packet. Then, send the new packet repeatedly to PC1. When uRPF fails to be enabled on the interface of the NE80E to PC1, theoretically, the packet capture tool on PC2 can capture the spoofing packets sent from PC1. When uRPF is enabled on the interface of the NE80E to PC1, theoretically, the packet capture tool on PC2 cannot capture the spoofing packets sent from PC1.
When uRPF fails to be enabled on the interface of the NE80E to PC1, PC2 cannot receive the spoofing packets sent from PC1. Check the NE80E. The spoofing packets sent from PC1 are found having reached the NE80E. The NE80E, however, does not forward these packets.
Modify the test procedure: After the normal packets sent from PC1 to PC2 are captured, do not modify the packets, instead, modify the IP address between PC1 and NE80E to 188.8.131.52/24 and 184.108.40.206/24.
220.127.116.11/24 18.104.22.168/24 22.214.171.124/24 126.96.36.199/24PC1 sends the captured packets (source IP address 188.8.131.52) repeatedly. The expected test objective is achieved.