[Contents] [Prev] [Next] [Index] [Report an Error]

Blocking IP Spoofing

One method of attempting to gain access to a restricted area of the network is to insert a bogus source address in the packet header to make the packet appear to come from a trusted source. This technique is called IP spoofing.

Before You Begin

For background information, read Understanding Attacker Evasion Techniques.

You can use either J-Web or the CLI configuration editor to block IP spoofing.

This topic covers:


[Contents] [Prev] [Next] [Index] [Report an Error]