Well, I could see a case for layer 4 protocol being a factor too. If you're trying to enforce certain rules based on the type of traffic, that could come into play.
Yeah, I'm with you on that Quentin. I think the source IP is the key factor, but I'm curious to see what the other candidates think about the other options.
Hmm, this is an interesting question. I definitely think source IP enforcement can be based on the source IP address itself, but I'm not sure if the other options are valid as well.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Jonelle
6 days agoLeonor
8 days agoCorazon
9 days agoTequila
10 days agoBonita
12 days agoQuentin
13 days ago