Network requirements

As shown in Figure 122, Host A, Host B, and Host C are internal users, and external user Host D is considered an attacker.

Configure Device to always filter packets from Host D, and to prevent internal users from guessing passwords.

Figure 122: Network diagram