I’m used to the idea of L3 devices like routers or firewalls being the termination point into the network. This kind of threw me off but I’m glad to have come across the design. I’m just wondering if it’s secure to have internet traffic ingress on a L2 connection and trunk data across the internal network.
No comments:
Post a Comment