[119935] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: port scanning from spoofed addresses

daemon@ATHENA.MIT.EDU (Gregory Edigarov)
Fri Dec 4 04:09:44 2009

Date: Fri, 4 Dec 2009 11:08:55 +0200
From: Gregory Edigarov <greg@bestnet.kharkov.ua>
To: nanog@nanog.org
In-Reply-To: <483E6B0272B0284BA86D7596C40D29F9D775E7EE2D@PUR-EXCH07.ox.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Thu, 3 Dec 2009 13:03:20 -0500
Matthew Huff <mhuff@ox.com> wrote:

> I'm not at all concerned about door-knob twisting or network
> scanning. What concerns me is that the source addresses are spoofed
> from our address range and that our upstream providers aren't willing
> to even look at the problem. 
> 
But that can be easy addressed by yourself.
just do not allow traffic originating from your range on your
external interfaces.

-- 
With best regards,
	Gregory Edigarov


home help back first fref pref prev next nref lref last post