Figure 2.19
Using proxy and stateful packet filter firewalls