Yep no problem.
When a hacker uses IP spoofing, he is typically attempting an exploitation exercise where the remote system regards specific IP address(es) as being trusted. For example, Unix servers can trust other servers if their source address is a trusted IP address when you use utilities like rlogin, rcp etc.
Anyway ways to counter IP spoofing include:
1. Don't base trust relationships on servers by IP address alone. Combine with proper user authentication techniques.
2. Update your perimeter firewalls/routers such that you have an access list that scans traffic originating on the outside and drops it if it matches an internal subnet. e.g.
access-list 110 deny ip 202.44.54.0 0.255.255.255 any
This particular ACL, when applied inbound on an Internet/edge router, will prevent people spoofing a trusted IP range (in this example 212.44.54.0/24) that has been allocated to you.
Similarly you may be using private 10.x.x.x address space, you could also include in that ACL something like:
access-list 110 deny ip 10.0.0.0 0.0.0.255 any
access-list 110 permit any
Cisco have extended this by utilising something called Reverse Path Forwarding (RPF) that basically checks the interface a source IP connects on. If that source IP shouldn't be seen on that interface (i.e. it matches say a 10.x.x.x range you've deployed internally), the router/firewall determines this to be a spoofing attack and drops it right away.
Cisco talk in greath depth (as part of their SAFE program) about securing their devices. Their recommendations to be fair apply to any router. I've found a link from Cisco that explain all the kind of things you should consider doing at the edge of your network:
Hope this helps!