Welcome to the SOC. In this scenario, you will apply network defense concepts to mitigate an active volumetric attack. Your objective is to understand how edge controls impact threat visibility and response capabilities.
Your organization is currently experiencing a 50Gbps TCP SYN Flood targeting the external customer portal. A Tier 2 analyst escalated the ticket because they are unable to identify the source of the botnet to apply targeted Access Control Lists (ACLs).
You review the router configurations and traffic patterns to determine why the SOC lacks visibility into the true origin of the malicious traffic.
You pull NetFlow logs from the core edge router and observe the anomalous inbound traffic:
The SOC is dealing with a distributed denial-of-service (DDoS) attack utilizing IP Spoofing. The attackers are forging the source IP address in the IP header. Because the router is accepting these packets without validating them, the SOC's logs are filled with garbage IPs (including private and internal addresses). You cannot trace or block the real attackers until the spoofed traffic is dropped at the edge.
Ingress Filtering is a network edge technique that drops incoming packets whose source IP addresses do not belong to the expected downstream network. If an ISP or enterprise implements ingress filtering (often via Unicast Reverse Path Forwarding or uRPF), packets claiming to be from "10.0.0.5" arriving on the public Internet WAN interface will be instantly dropped.
By enforcing this, attackers cannot spoof their IPs. They are forced to use their actual, allocated IP addresses. This makes the flooding attack visible, traceable, and significantly easier for the SOC and ISPs to mitigate.
When investigating a volumetric DDoS, the first thing a Tier 3 analyst checks is the validity of the source IPs. If you see Bogon space (RFC 1918) hitting your external firewall's outside interface, your edge routers are misconfigured. Ingress filtering (BCP 38) is an industry-standard best practice that every ISP and enterprise edge should have enabled. If you can't see the real IP, you can't write a reliable detection rule in your SIEM or a block rule in your WAF/Firewall.
In Cisco and Juniper environments, Ingress filtering is typically handled by Unicast Reverse Path Forwarding (uRPF).
When a packet arrives, uRPF looks at the source IP and checks the routing table. If the router doesn't have a route back to that source IP out of the same interface the packet arrived on (Strict Mode), it assumes the IP is spoofed and drops the packet. This is the technical implementation of the BCP 38 standard.
Practice with more real-world threat detection scenarios.
Explore more CSA simulations