> http://www.uniras.gov.uk/vuls/2004/236929/index.htm

Judging from this, a good idea for peering routers is probably to
filter on external interfaces inbound connections from the address
range of your loopback addresses. Assuming you have set aside an
address range for this, there should be no valid reason for someone
outside of your network sending you IP packets sourced from this
range. Such an ACL will at least protect your iBGP sessions from outside
(but not from your own customers) hijacking.

Assuming your loopbacks are in 192.168.123.0/24 (I hope they're not;-)):

ip access-list extended anti-spoofing
  deny ip 192.168.123.0 0.0.0.255 any 
  !.. possibly other things ..
  permit ip any any

interface your-peering-interface 
  ip access-group anti-spoofing in

Cheers,
Markus
-- 
VIA NET.WORKS (Schweiz) AG
Riedstrasse 1, CH-6343 Rotkreuz, Switzerland
Telefon: +41 41 798 2121 / Fax: +41 41 798 2122
Markus Wild, Manager Engineering, e-mail: [EMAIL PROTECTED]
----------------------------------------------
[EMAIL PROTECTED] Maillist-Archive:
http://www.mail-archive.com/swinog%40swinog.ch/

Reply via email to