-
Router:
- A networking device that forwards packets at Layer 3 of the OSI model, the Network Layer.
- Routers have the ability to filter traffic and make forwarding decisions based on Layer 3 addresses (IP addresses).
-
ACLs
- Access Control Lists (ACLs) can be set up on a router to further filter IP address traffic, based on specific permit and deny statements given to it by the system administrator.
- While a router can act as a firewall, a dedicated hardware device should perform these functions separately.
-
Anti-Spoofing
-
Implement ACLs
-
Block IP Addresses
- The first step in preventing spoofing is blocking IP addresses that pose a risk.
- While there can be a reason that an attacker might spoof any IP address, the most commonly spoofed IP addresses are private IP addresses (RFC 1918) and other types of shared/special IP addresses.
-
Block these IP address ranges inbound on your perimeter routers:
- 10.0.0.0/8
- 172.16.0.0/12
- 192.168.0.0/16
- 127.0.0.0/8
- 224.0.0.0/3
- 169.254.0.0/16
- RFC 1918 Private IP Addresses
- Special Use IP Addresses
-
Configuration example:
- Router# conf t
- Enter configuration commands, one per line. End with CNTL/Z.
- Router(config)# ip access-list ext ingress-antispoof
- Router(config-ext-nacl)# deny ip 10.0.0.0 0.255.255.255 any
- Router(config-ext-nacl)# deny ip 172.16.0.0 0.15.255.255 any
- Router(config-ext-nacl)# deny ip 192.168.0.0 0.0.255.255 any
- Router(config-ext-nacl)# deny ip 127.0.0.0 0.255.255.255 any
- Router(config-ext-nacl)# deny ip 224.0.0.0 31.255.255.255 any
- Router(config-ext-nacl)# deny ip 169.254.0.0 0.0.255.255 any
- Router(config-ext-nacl)# permit ip any any
- Router(config-ext-nacl)# exit
- Router(config)#int s0/0
- Router(config-if)#ip access-group ingress-antispoof in
- Internet service providers (ISPs) must use filtering like this on their networks, as defined in RFC 2267.
- Notice how this ACL includes permit ip any any at the end. In reality, you would probably have a stateful firewall inside this router that protects your internal LAN.
- Keep in mind that this should be just one part of your overall network security strategy.
-
Use Reverse Path Forwarding (ip verify):
- RPF works much like part of an anti-spam solution.
- RPF receives inbound packet traffic inspects the source address, and performs a recipient lookup on the sending server.
- If the sender doesn't exist, the server drops the e-mail message
-
Configuration example:
- Router(config)# ip cef
- Router(config)# ipv6 cef
- Router(config)# int serial0/0
- Router(config-if)# ip verify unicast reverse-path
- Router(config-if)# ipv6 verify unicast reverse-path