1 List three design goals for a firewall. 2 List four techniques used by firewalls to control access and enforce a security policy. 3 What information is used by a typical packet filtering firewall? 4 What are some weaknesses of a packet filtering firewall? 5 What is the difference between a packet filtering firewall […]