Well, I could see a case for layer 4 protocol being a factor too. If you're trying to enforce certain rules based on the type of traffic, that could come into play.
Yeah, I'm with you on that Quentin. I think the source IP is the key factor, but I'm curious to see what the other candidates think about the other options.
Hmm, this is an interesting question. I definitely think source IP enforcement can be based on the source IP address itself, but I'm not sure if the other options are valid as well.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Sheldon
8 months agoRoyal
8 months agoHelaine
8 months agoSheldon
9 months agoRoyal
9 months agoJonelle
10 months agoLeonor
10 months agoDannette
8 months agoOllie
8 months agoRoxane
9 months agoCorazon
10 months agoTequila
10 months agoBonita
10 months agoQuentin
10 months ago