Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Announcement: Try the Ask AI chatbot for answers to your technical questions about Juniper products and solutions.

close
header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Common Criteria Guide for vSRX3.0
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configuring Default Reject Rules for Source Address Spoofing

date_range 13-Dec-23

The following guidelines describe when to configure the default reject rules for source address spoofing:

  • When the source address is equal to the address of the network interface where the network packet was received.

  • When the source address does not belong to the networks associated with the network interface where the network packet was received.

  • When the source address is defined as being on a broadcast network.

  1. Before you begin, log in with your root account on a Junos OS device running Junos OS Release 22.2R2 and edit the configuration.

Note:

You can enter the configuration commands in any order and commit all the commands at once.

To configure default reject rules to log source address spoofing:

  1. Configure the security screen features and enable the IP address spoofing IDS option.
    content_copy zoom_out_map
    [edit]
    user@host# set security screen ids-option trustScreen ip spoofing
    
  2. Specify the name of the security zone and the IDS option object applied to the zone.
    content_copy zoom_out_map
    [edit]
    user@host# set security zones security-zone trustZone screen trustScreen
    
footer-navigation