5.1.5.1. Procedure – Configuring spoof protection

Steps: 

  1. Select the Networking interface and next to the Connects field, click .

  2. Select the zones the configured interface is connected to either directly or indirectly through routers.

    Zone selection for the Connects control

    Figure 5.6. Zone selection for the Connects control

    Note

    The Zone tree in the dialog window displays organized IP addresses, starting from the most generic (0.0.0.0/0) to the most specific. There is an implicit inheritance in the Connects specification: if the 10.0.0.0/8 address range is specified to connect to eth1, all more specific subnets of this address range (10.0.0.0/9, /10, .../32) connect to eth1 also, unless a more specific binding is explicitly specified.

  3. Select Spoof protection.

    Note

    The Management Access ruleset must be regenerated after modifying any interface settings. It is not done automatically.