[119935] in North American Network Operators' Group
Re: port scanning from spoofed addresses
daemon@ATHENA.MIT.EDU (Gregory Edigarov)
Fri Dec 4 04:09:44 2009
Date: Fri, 4 Dec 2009 11:08:55 +0200
From: Gregory Edigarov <greg@bestnet.kharkov.ua>
To: nanog@nanog.org
In-Reply-To: <483E6B0272B0284BA86D7596C40D29F9D775E7EE2D@PUR-EXCH07.ox.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Thu, 3 Dec 2009 13:03:20 -0500
Matthew Huff <mhuff@ox.com> wrote:
> I'm not at all concerned about door-knob twisting or network
> scanning. What concerns me is that the source addresses are spoofed
> from our address range and that our upstream providers aren't willing
> to even look at the problem.
>
But that can be easy addressed by yourself.
just do not allow traffic originating from your range on your
external interfaces.
--
With best regards,
Gregory Edigarov