Reverse-path forwarding: Difference between revisions

Content deleted Content added
review: mv WP:HOWTO to notes
review: WP:NPOV - different interpretations exist, it is not for WP to determine which is correct
Line 35:
 
===Loose mode===
In loose mode each incoming packet's source address is tested against the FIB. The packet is dropped only if the source address is not reachable via ''any'' interface on that router.{{efn|name=command}}<!--[[User:Kvng/RTH]]-->
 
== {{anchor|Filtering}}UnicastFiltering RPFvs. confusionforwarding ==
RPF is often incorrectly definedinterpreted as reverse-path ''filtering'', particularly when it comes to unicast routing. This is an understandable misinterpretationalternate interpretation of the acronym in that when RPF is used with unicast routing as in RFC 3704, traffic is either permitted or denied based upon the RPF check passing or failing. The thought being that traffic is denied if it fails the RPF check and is therefore filtered,. howeverWhile asuRPF peris RFCused 3704as thean correct interpretation is that traffic isingress '''forwarded'filtering'' ifmechanism, it passesis the RPF check. Several examples of the proper usage can be seen in documentsaffected by [http://www.juniper.net/techpubs/software/junos/junos56/swconfig56reverse-interfaces/html/interfaces-family-config15.htmlpath Juniper], [http://www''forwarding''.cisco.com/web/about/security/intelligence/unicast<!--rpf.html Cisco], [http[User:Kvng//www.openbsd.org/faq/pf/filter.html#urpf OpenBSDRTH]], and most importantly RFC 3704 which defines the use of RPF with unicast.-->
 
While uRPF is used as an ingress ''filtering'' mechanism, it is affected by reverse-path ''forwarding''.
 
==Comparison to reverse-path filtering==