Fig9 ← Previous Next → Figure 9 — The network is ready to perform the Anti-Spoofing check on AS B. In the figure, each client has an IPv4 address assigned. The ‘Internet’ client acts as the malicious host (source of the spoofed packet).