Network requirements
As shown in Figure 122, Host A, Host B, and Host C are internal users, and external user Host D is considered an attacker.
Configure Device to always filter packets from Host D, and to prevent internal users from guessing passwords.
Figure 122: Network diagram