<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Student - Help Understanding with uRPF and IOS Firewall Usage in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/student-help-understanding-with-urpf-and-ios-firewall-usage/m-p/2654751#M195354</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Quick question and advanced apologizes is this is the wrong place to post this. Trying to understand Unicast Reverse Path Forwarding I have to ask what is the difference using the two methods below if any? Thank you all in advance for your time to read and help a stranger out.&lt;/P&gt;&lt;P&gt;access-list 101 deny 10.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 deny 172.16.0.0 0.15.255.255 any&lt;BR /&gt;access-list 101 deny 192.168.0.0 0.0.255.255 any&lt;BR /&gt;access-list 101 permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface FastEthernet 4&lt;BR /&gt;Description WAN/Outside Zone&lt;BR /&gt;ip verify unicast source reachable-via rx 101&lt;/P&gt;&lt;P&gt;versus&lt;/P&gt;&lt;P&gt;interface FastEthernet 4&lt;BR /&gt;Description WAN/Outside Zone&lt;BR /&gt;ip access-group 101 in&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 05:44:13 GMT</pubDate>
    <dc:creator>StevenMH1982</dc:creator>
    <dc:date>2019-03-12T05:44:13Z</dc:date>
    <item>
      <title>Student - Help Understanding with uRPF and IOS Firewall Usage</title>
      <link>https://community.cisco.com/t5/network-security/student-help-understanding-with-urpf-and-ios-firewall-usage/m-p/2654751#M195354</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Quick question and advanced apologizes is this is the wrong place to post this. Trying to understand Unicast Reverse Path Forwarding I have to ask what is the difference using the two methods below if any? Thank you all in advance for your time to read and help a stranger out.&lt;/P&gt;&lt;P&gt;access-list 101 deny 10.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 deny 172.16.0.0 0.15.255.255 any&lt;BR /&gt;access-list 101 deny 192.168.0.0 0.0.255.255 any&lt;BR /&gt;access-list 101 permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface FastEthernet 4&lt;BR /&gt;Description WAN/Outside Zone&lt;BR /&gt;ip verify unicast source reachable-via rx 101&lt;/P&gt;&lt;P&gt;versus&lt;/P&gt;&lt;P&gt;interface FastEthernet 4&lt;BR /&gt;Description WAN/Outside Zone&lt;BR /&gt;ip access-group 101 in&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/student-help-understanding-with-urpf-and-ios-firewall-usage/m-p/2654751#M195354</guid>
      <dc:creator>StevenMH1982</dc:creator>
      <dc:date>2019-03-12T05:44:13Z</dc:date>
    </item>
    <item>
      <title>This commands check the</title>
      <link>https://community.cisco.com/t5/network-security/student-help-understanding-with-urpf-and-ios-firewall-usage/m-p/2654752#M195355</link>
      <description>&lt;P&gt;This commands check the incoming packet "source ip" and matches in its routing table and sees if this network is reachable only through that interface.&lt;/P&gt;&lt;P&gt;Example&lt;/P&gt;&lt;P&gt;if you have this route in routing table&lt;/P&gt;&lt;P&gt;192.168.1.0/24&amp;nbsp;&amp;nbsp; via gi0/0&lt;/P&gt;&lt;P&gt;So the traffic from 192.168.1.2 should only come from gi0/0. This is called strict mode.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2015 20:22:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/student-help-understanding-with-urpf-and-ios-firewall-usage/m-p/2654752#M195355</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2015-04-05T20:22:38Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply. Would</title>
      <link>https://community.cisco.com/t5/network-security/student-help-understanding-with-urpf-and-ios-firewall-usage/m-p/2654753#M195356</link>
      <description>&lt;P&gt;Thanks for the reply. Would not both methods (uRPF &amp;amp; static ACL) prevent spoofed traffic from the private IP ranges from ingress traffic to the WAN interface?&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2015 21:50:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/student-help-understanding-with-urpf-and-ios-firewall-usage/m-p/2654753#M195356</guid>
      <dc:creator>StevenMH1982</dc:creator>
      <dc:date>2015-04-05T21:50:11Z</dc:date>
    </item>
    <item>
      <title>well uRPF is an intelligent</title>
      <link>https://community.cisco.com/t5/network-security/student-help-understanding-with-urpf-and-ios-firewall-usage/m-p/2654754#M195357</link>
      <description>&lt;P&gt;well uRPF is an intelligent way of avoiding&amp;nbsp; spoofed traffic. Where configring static ACL is difficult unless you have idea of what all ACE you need to create. rpf feature can do it intelligently with the help of routing table. uRPF can also help in avoiding traffic loop where a route is coming back looping from a wrong interface.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2015 22:01:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/student-help-understanding-with-urpf-and-ios-firewall-usage/m-p/2654754#M195357</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2015-04-05T22:01:19Z</dc:date>
    </item>
  </channel>
</rss>

