Your customer is receiving inappropriate traffic from a rival corporation which is using a fixed block of IP addresses that they own. No legitimate traffic is exchanged between the two companies. You must secure the customer’s network from a potential attack by their rival corporation with the lowest performance impact.
Which network device will allow you to accomplish this task?
A. edge switch
B. perimeter router
C. campus router
D. perimeter firewall