This chapter describes the anti-spoofing set of commands and how to use them on the S- K- and 7100-Series platforms. For information about configuring anti-spoofing, refer to Authentication Configuration in the S-, K-, and 7100 Series Configuration Guide.