Chapter 7: Configuring Anti-Spoof Settings
Related Topics
Configuring Antispoof Settings in Intrusion Detection and Prevention Devices (NSM
Procedure) on page 83
Intrusion Detection and Prevention Services and Device Configurations Supported in
NSM on page 6
Copyright © 2010, Juniper Networks, Inc.
85