Chapter 7: Configuring Anti-Spoof Settings
Related
Configuring Antispoof Settings in Intrusion Detection and Prevention Devices (NSM
Documentation
Procedure) on page 85
Intrusion Detection and Prevention Services and Device Configurations Supported in
NSM on page 6
Copyright © 2010, Juniper Networks, Inc.
87