This typical network security configuration employs several methods to protect data from unauthorized access.

Source: Trusted Information Systems