What is the typical relationship between the untrusted network, the firewall, and the trusted network?
How is an application-layer firewall different from a packet filtering firewall? Why is an application-layer firewall sometimes called a proxy server?