If VLAN interfaces have IP addreses, configure anti spoofing / ingress filtering protections


If VLAN interfaces have IP addresses, it is important that anti-spoofing protections are in place, to prevent an attacker from spoofing an address that is illegal on that inbound interface.


If an attacker is allowed to 'spoof' addresses to the point that packets are permitted to arrive on the incorrect interface, it becomes possible for an attacker to spoof their trust level from a network point of view, for instance to source 'inside' addresses from an 'outside' interface.


The URPF feature uses the same tables as the routing protocol, so the CPU impact of configuring this feature is low. However, logging of high volume URPF attacks (or URPF misconfigurations) can result in:

higher CPU impacts on the switch

as higher network utilization on the path to the logging server

higher disk utilization on the logging server

higher cpu utilization on the logging server

Because of this, URPF events, especially in higher volumes should be configured to generate a high priority alert in your logging server or SIEM.


Apply the command 'ip verify unicast source reachable-via rx' to all VLAN interfaces that have IP addresses. This forces the check to verify that the packet is arriving on the correct interface.
The command variant 'ip verify unicast source reachable-via any' is not recommended, as it only filters for valid IP addresses. If the device has a default route, then this command variant has no affect.

switch(config)# interface Vlan X
switch(config-if)# ip verify unicast source reachable-via rx

Default Value:

By default, unicast reverse forwarding protections are not enabled

See Also


Item Details


References: 800-53|AU-6, 800-53|CA-3, 800-53|CA-9, CSCv7|6.8, CSCv7|11.2

Plugin: Cisco

Control ID: caf3d89eb8e95d9a7732af3d2e2fd26ff12fc0f9a0bc74b599d160318b5fbc8d