Which command implements Unicast RPF IP spoofing protection?
A.
udp verify reverse-path interface
B.
access-list
C.
ip verify reverse-path interface
D.
tcp verify reverse-path interface
E.
access-group
Which command implements Unicast RPF IP spoofing protection?
Which command implements Unicast RPF IP spoofing protection?
A.
udp verify reverse-path interface
B.
access-list
C.
ip verify reverse-path interface
D.
tcp verify reverse-path interface
E.
access-group