Westonci.ca is the ultimate Q&A platform, offering detailed and reliable answers from a knowledgeable community. Get immediate answers to your questions from a wide network of experienced professionals on our Q&A platform. Discover detailed answers to your questions from a wide network of experts on our comprehensive Q&A platform.

Your manager has asked you to improve network security by confining sensitive internal data traffic to computers on a specific subnet using access control lists (ACLs). On which device(s) should the ACLs be deployed