Design Reference

Table Of Contents
4. Prevent unknown devices from influencing the spanning tree topology.
Packet spoofing
You can stop spoofed IP packets by configuring the switch to forward only IP packets that contain
the correct source IP address of your network. By denying all invalid source IP addresses, you
minimize the chance that your network is the source of a spoofed DoS attack.
A spoofed packet is one that comes from the Internet into your network with a source address equal
to one of the subnet addresses on your network. The source address belongs to one of the address
blocks or subnets on your network. To provide spoofing protection, you can use a filter that
examines the source address of all outside packets. If that address belongs to an internal network or
a firewall, the packet is dropped.
To prevent DoS attack packets that come from your network with valid source addresses, you need
to know the IP network blocks in use. You can create a generic filter that:
Permits valid source addresses
Denies all other source addresses
To do so, configure an ingress filter that drops all traffic based on the source address that belongs to
your network.
If you do not know the address space completely, it is important that you at least deny private (see
RFC1918) and reserved source IP addresses. The following table lists the source addresses to
filter.
Table 19: Source addresses to filter
Address Description
0.0.0.0/8 Historical broadcast. High Secure mode blocks addresses 0.0.0.0/8 and
255.255.255.255/16. If you enable this mode, you do not need to filter
these addresses.
10.0.0.0/8 RFC1918 private network
127.0.0.0/8 Loopback
169.254.0.0/16 Link-local networks
172.16.0.0/12 RFC1918 private network
192.0.2.0/24 TEST-NET
192.168.0.0/16 RFC1918 private network
224.0.0.0/4 Class D multicast
240.0.0.0/5 Class E reserved
248.0.0.0/5 Unallocated
255.255.255.255/32 Broadcast1
You can also enable the spoof-detect feature on a port.
For more information about the spoof-detect feature, seeConfiguring VLANs and Spanning Tree on
Avaya Virtual Services Platform 4000 Series, NN46251-500.
System and network stability and security
118 Network Design Reference for Avaya VSP 4000 Series January 2015
Comments? infodev@avaya.com