Yeah, I’m missing what the big deal is here.  If you’re talking about your 
border router to your upstream, why would you allow outbound traffic with 
source IPs outside your IP blocks?  Allow your IPs, block the rest.

If you’re talking about other routers within your network and are wanting to 
stop the traffic at the source, it could get more complicated since I assume we 
all use some private IP space within our networks for various purposes mostly 
management addresses on network equipment.

Dennis mentions customer IPs, if you route customer blocks those would also be 
allowed, based on an LOA.


From: Dennis Burgess 
Sent: Monday, January 12, 2015 10:43 AM
To: [email protected] 
Subject: Re: [AFMUG] BCP38

Very simple.  In MT we do an address list of all valid subnets behind the core 
routers, this would include any prefixes that you own or use, plus any BGP 
prefixes learned from your customers.  Then a simple, out interface (internet) 
drop if its not SRCed from that list.  Not exactly IP tables, but there ya go..

 

 

 

Dennis Burgess, CTO, Link Technologies, Inc.

[email protected] – 314-735-0270 – www.linktechs.net

 

From: Af [mailto:[email protected]] On Behalf Of Sean Heskett
Sent: Monday, January 12, 2015 10:25 AM
To: [email protected]
Subject: Re: [AFMUG] BCP38

 

Hey Mike,

 

Would you be willing to post an iptables statement that would drop this traffic?

 

Thanks,

Sean



On Monday, January 12, 2015, Mike Hammett <[email protected]> wrote:

http://www.bcp38.info/index.php/Main_Page

Make sure you implement this in your networks. Drop all outbound traffic to 
your upstream that is not from valid public IP space.



-----
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com

Reply via email to