PPT Slide
- Protects a network from external attacks
- Controls traffic in and out of a secure network
- Could be implemented in a router, gateway, or a special host
- Benefits
- Reduces risks of access to hosts
- Controlled access
- Eliminates annoyance to the users
- Protects privacy (e.g. finger)
- Hierarchical implementation of policy and and technology (e.g. finger)
Network Management: Principles and Practice