Applying detailed instructions to manage the flow of network traffic at the edge of the network, including allowing or denying traffic based on port, protocol, address, or direction is an implementation of which of the following?
A.
Virtualization
B.
Port security
C.
IPSec
D.
Firewall rules