Prerequisites for Unicast Reverse Path Forwarding ACL Support
-
Unicast RPF requires Cisco Express Forwarding to function properly on a device.
-
Prior to configuring Unicast RPF, you must configure the following ACLs: -
Configure standard or extended ACLs to mitigate the transmission of invalid IP addresses (by performing egress filtering). Configuring standard or extended ACLS, permit only valid source addresses to leave your network and enter the Internet.
-
Configure standard or extended ACL entries to drop (deny) packets that have invalid source IP addresses (by performing ingress filtering). Invalid source IP addresses include the following types:
- Broadcast addresses (including multicast addresses)
- Loopback addresses
-
Private addresses (RFC 1918, Address Allocation for Private Internets)
- Reserved addresses
-
Source addresses that fall outside the range of valid addresses associated with a protected network
-
Configure standard or extended ACL entries to forward (permit) packets that fail the Unicast RPF checks and allow specific traffic from known asymmetric routed sources.
-
-
Configure ACLs to track Unicast RPF events to provide additional information about network attacks.