4. Authentication / Authorization 4.1 Threat Description 4.2 Best Current Practice 4.2.1 Device Access 4.2.2 Routing 4.2.3 MAC Address
5. Filtering 5.1 Threat Description 5.2 Best Current Practice 5.2.1 General Inbound Traffic Filters 5.2.2 General Outbound Traffic Filters 5.2.3 Device Access Filters 5.2.4 Route Filters 5.2.5 MAC Address Filters 5.2.6 DoS Mitigation Filtering 5.2.7 SinkHole / Blackhole 5.2.8 uRPF
-- Pekka Savola "You each name yourselves king, yet the Netcore Oy kingdom bleeds." Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings