Well, I could see a case for layer 4 protocol being a factor too. If you're trying to enforce certain rules based on the type of traffic, that could come into play.
Yeah, I'm with you on that Quentin. I think the source IP is the key factor, but I'm curious to see what the other candidates think about the other options.
Hmm, this is an interesting question. I definitely think source IP enforcement can be based on the source IP address itself, but I'm not sure if the other options are valid as well.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Sheldon
11 months agoRoyal
11 months agoHelaine
11 months agoSheldon
12 months agoRoyal
12 months agoJonelle
1 years agoLeonor
1 years agoDannette
11 months agoOllie
11 months agoRoxane
11 months agoCorazon
1 years agoTequila
1 years agoBonita
1 years agoQuentin
1 years ago