Any network security guru out there want to tell me how exactly you can use BOGON addresses in an attack on a network. The reason I ask is that I recently implemented some BOGON filtering at the enterprise edge and some of those ACLs have actually been hit. What I don't get is how the heck someone carries out such an attack since those addresses are not going to be routeable.
Check it out:
250 deny ip 5.0.0.0 0.255.255.255 any log (40 matches)300 deny ip 10.0.0.0 0.255.255.255 any log (235 matches)1150 deny ip 172.16.0.0 0.15.255.255 any log (4 matches)