Rerouting attacks attempt to redirect traffic from its valid destination to a false one, often for criminal use of the information (credit card or identity theft data) that can be acquired from the victims.
This is alos called as Data manipulation attacks. Google search should give you lots of info.
Many thanks for your reply. I dont want to bother you too much so dont feel like you have to answer this question but does this kind of attack change a routers ARP table, host table or is it as obvious as the routing table as stated in your answer? The reason I am persisting for this answer is because I recently took a Cisco exam and one of the questions was 'What table in a router does a rerouting attack adjust?'
A rerouting attack "adjusts" the routing table. By inserting a new route with a lower metric then the old route to redirect traffic to another source. It is done by manipulating a routing update packet and sending it to the target router. The routing process picks it up and since it has a lower metric (or newer version number) depending on what routing protocol you are using. It inserts the route in to the table and forwards traffic to where the attacker wants.. I would think to avoid this problem you could use a static route. The type of attack that is targeted at the ARP table is ARP posioning.. (remember ARP is a means to get a MAC address and that is a LAYER 2 function not routing). By changing the MAC address with a ARP the traffic for a ip address would be sent to your MAC instead of the right one.. but you have to be on the same physical network as your target to make this work. where as a routing table attack could get interesting..
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :