In IP spoofing, the sender of a packet pretends to be another computer. This is done either to outsmart firewalls that trust packets from their own network more than packets from untrusted networks, or to disguise the originator of an attack.
The device firewall protects against spoofing by route examination, i.e. whether a packet is allowed to be received at the interface where it arrived.