Well, I could see a case for layer 4 protocol being a factor too. If you're trying to enforce certain rules based on the type of traffic, that could come into play.
Yeah, I'm with you on that Quentin. I think the source IP is the key factor, but I'm curious to see what the other candidates think about the other options.
Hmm, this is an interesting question. I definitely think source IP enforcement can be based on the source IP address itself, but I'm not sure if the other options are valid as well.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Sheldon
7 months agoRoyal
7 months agoHelaine
7 months agoSheldon
7 months agoRoyal
7 months agoJonelle
8 months agoLeonor
8 months agoDannette
7 months agoOllie
7 months agoRoxane
7 months agoCorazon
8 months agoTequila
8 months agoBonita
8 months agoQuentin
8 months ago