[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Blocking IP Spoofing

One method of attempting to gain access to a restricted area of the network is to insert a bogus source address in the packet header to make the packet appear to come from a trusted source. This technique is called IP spoofing.

Before You Begin

For background information, read Understanding Attacker Evasion Techniques.

To block IP spoofing, use the JUNOS CLI configuration editor.

user@host# set security screen ip-spoofing ip spoofing
user@host# set security zones security-zone zone screen ip-spoofing

[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]