IP address spoofing
In computer networking, the term Internet protocol spoofing (IP) is the creation of IP packets with counterfeit (spoofed) IP source addresses.
This can be a method of attack used by network intruders to defeat network security measures such as authentication based on IP addresses.
An attack using IP spoofing may be an initial step leading to unauthorized user access, and possibly root access, on the targeted system.
A packet filtering router or a firewall may not provide adequate protection against IP spoofing attacks. It is possible to route packets through this type of device is not configured to filter incoming packets having source addresses on the local subnet.
IP spoofing is possible even if no reply packets can reach the attacker. For example if using UDP.
A method for preventing IP spoofing problems is to install access control lists on a router that does not allow incoming packets to have a source IP address different from the local network address. In addition, outgoing packets should not be allowed to contain a source address different from the IP network, in order to prevent an IP spoofing attack from originating from the local network.
Source: from Federal Standard 1037C