Westonci.ca is the Q&A platform that connects you with experts who provide accurate and detailed answers. Discover reliable solutions to your questions from a wide network of experts on our comprehensive Q&A platform. Explore comprehensive solutions to your questions from knowledgeable professionals across various fields on our platform.

Your manager has asked you to improve network security by confining sensitive internal data traffic to computers on a specific subnet using access control lists (ACLs). On which device(s) should the ACLs be deployed