One way to compromise on this without undue security risk
is to allow source-routing one hop into your network but no
further.
One way to compromise on this without undue security risk
is to allow source-routing one hop into your network but no
further.