tion and even the existence of each PC is hidden. From the external viewpoint, there is no network, only a single device - the
∙Firewall. All incoming data packets are monitored and all incoming server re- quests are filtered, thus protecting your network from malicious attacks from external sources.
∙Protection against DoS attacks. DoS (Denial of Service) attacks can flood your Internet connection with invalid packets and connection requests, using so much bandwidth and so many resources that Internet access becomes unavailable. The
4