By configuring flow-based URPF, you can perform URPF check for flows of certain types on an interface. In this manner, you can prevent the packets of these types from starting source address spoofing attacks.
This section describes the typical application scenario of URPF, including networking requirements, configuration roadmap, and data preparation, and provides related configuration files.