An IP spoofing is a hacker uses some tools to modify the source address in the packet header to make the receiving system or device think the packet is from a trusted source, such as another computer on a local network, and accept it. Here comes two methods to prevent such spoofing events from WAN or LAN site:
Go to Firewall >>Defense Setup >> Spoofing Defense page.
1. Telnet into Vigor Route
2. Enter command,
While receiving packets from WAN, Vigor Router will check if the source IP address and the coming WAN interface is reasonable. If not, Vigor will drop the packet instead of forwarding it to the internal server.
For example, if Vigor’s LAN network IP address is 192.168.1.1 and it receives the packet from WAN with the source IP 192.168.1.100, Vigor will drop the packet and send the defense log like the follows:
[IP Spoofing Defense]Block packet from WAN with source IP: 192.168.1.100
When receiving packets from LAN and the option is enabled, Vigor Router will check if the source IP and the coming LAN interface is reasonable. If not, Vigor will drop the packet and display the log below:
[IP Spoofing Defense]Block packet from LAN with source IP: 192.168.239.31
Was this helpful?
Sorry about that. Contact Support if you need further assistance, or leave us some comments below to help us improve.