Simon Murcott wrote: > One point you are missing is that it is possible using this kind of > configuration to create a firewall where you cannot address any of it's > external interfaces. So how can you do an intrusion attack on a firewall > that you cannot address?
Another advantage is the transperacy. There is no need to change any routing-setup but just insert this "firewall-bridge" between two nodes. Phil