What be done by an Autonomous System(AS) to prevent insecure traffic from entering its domain from other AS.
I know that an AS is a collection of hosts/servers under administration control and it may contains multiples LANs.
Traffic shaping can be performed on a "per connection" OR on a "per host basis". Give one concrete example where you would want to use it on a "per connection" basis and one example for the "per host basis".
I know that an AS is a collection of hosts/servers under administration control and it may contains multiples LANs.
Traffic shaping can be performed on a "per connection" OR on a "per host basis". Give one concrete example where you would want to use it on a "per connection" basis and one example for the "per host basis".