-- Include explicit permit statements for trusted sources that
!-- require access on the vulnerable UDP ports
!-- The following vulnerability-specific access control entries
!-- (ACEs) can aid in identification of attacks
!-- Explicit deny ACE for traffic sent to addresses configured within
!-- the infrastructure address space
!-- Permit or deny all other Layer 3 and Layer 4 traffic in accordance
!-- with existing security policies and configurations