What exactly they have been thinking?
No wonder I’m always confused with all these
The documentation reads:
Note that all Allow and Deny directives are processed, unlike a typical firewall
Isn’t it like reinventing the wheel but making it square?
Could anyone explain why would someone complicate such simple thing as access list? Please …