Randi is concerned about unauthorized users connecting to company routers and she wants to prevent spoofing. What is the most essential antispoofing technique for routers?