Figure 2.18  Proxy-based firewall with application-level controls