SEARCH Articles Figures Tables 1C and D Authorizes each packet for each protocol differently. Follows specific rules and may allow some commands to a server hut not others, OR limits access to certain types based on authenticated user. Setup is quite complex every client program needs to be set up. Also each protocol must have a proxy in it. True proxy is much safer. [Publishers Imprint]