Disable IP Source Routing

On occasion, it's used for troubleshooting. However, a hacker mighi attempt to communicate with one of your hosts by inserting himself or herself as an intermediary stop between two legitimate host addresses. Figure 6-11 illustrates the scheme. Figure 6-11 A Hacker Attacking with IP Source-Routing Figure 6-11 A Hacker Attacking with IP Source-Routing The hacker. II, pretends to be an intermediary hop in a source-routed path from Host B to Host A. H creates a...