
371
Preventing attacks
Enabling protection for logical network interfaces
Configuring protection against IP address spoofing
Spoof protection is one of the many options that you can configure on network interfaces. To configure
spoof protection, you need to know what network ranges you want to allow. Consider your current
security gateway network and routing configurations to insure that you are not cutting off access for a
network that you should allow.
Prerequisites
None.
To configure protection against IP address spoofing
1
In the SGMI, in the left pane, under Assets, click
Network
.
2
In the right pane, on the Network Interfaces tab, select the network interface on which you want to
enable protection, and click
Properties
.
3
In the Network Interface Properties dialog box, on the General tab, check
Spoof protection
.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“Host Network Entity Properties—Spoof Protection tab”
■
“Subnet Network Entity Properties—Spoof Protection tab”
■
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...