Figure 2.19  Using proxy and stateful packet filter firewalls