First page Back Continue Last page Overview Graphics
Design Goals
All traffic, from inside to outside and vice versa, must pass through the firewall
Only authorized traffic (defined by the security policy) is allowed to flow
Firewall is immune to penetration – uses a trusted system