Remote false adjacency

During a remote false adjacency attack, the attacker plays the role of a router and exploits the fact that routers can successfully complete the adjacency setup. This attack can be avoided by enabling TTL security:

Get Advanced Infrastructure Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.