Figure 2.18
Proxy-based firewall with
application-level controls