This typical network security configuration employs several methods to protect data from unauthorized access.
Source: Trusted Information Systems