Interesting tidbit, thanks for sharing. I do all the proper filtering but didn't consider blocking spoofing attacks from the outside. Not seeing much on how a Mikrotik would handle this. Probably firewall?
[ https://www.wavedirect.net/ | ] [ https://www.facebook.com/ruralhighspeed ] [ https://www.instagram.com/wave.direct/ ] [ https://www.linkedin.com/company/wavedirect-telecommunication/ ] [ https://twitter.com/wavedirect1 ] [ https://www.youtube.com/user/WaveDirect ] STEVEN KENNEY DIRECTOR OF GLOBAL CONNECTIVITY & CONTINUITY A: 158 Erie St. N | Leamington ON E: st...@wavedirect.org | P: 519-737-9283 W: www.wavedirect.net From: "John Osmon" <jos...@rigozsaurus.com> To: "af" <af@af.afmug.com> Sent: Monday, October 12, 2020 11:57:26 PM Subject: Re: [AFMUG] Brigham Young University's Internet Measurement and Anti-Abuse Laboratory On Mon, Oct 12, 2020 at 05:49:18PM -0400, Mark - Myakka Technologies wrote: [...] > I can not think of any > valid reason for someone to spoof my IP on incoming packets. There are some asymmetrical cases where you may see your own addresses coming in over an edge router. Most of them are solved better with VPNs, but they do exist. There are few cases anymore where not following BCP38 is required... -- AF mailing list AF@af.afmug.com http://af.afmug.com/mailman/listinfo/af_af.afmug.com
-- AF mailing list AF@af.afmug.com http://af.afmug.com/mailman/listinfo/af_af.afmug.com