Attackers can use IP source route options to hide their true
address and access restricted areas of a network by specifying
a different path. The security device should be able to either
block any packets with loose or strict source route options
set or detect such packets and then record the event for the
ingress interface.
This attribute records the detection of loose source route
packets.