¨Justify
suitability of objectives for each threat, e.g.
–T2 An attacker
on the hostile network may exploit inappropriate use of service protocols
–O2 and O3 limit the hosts and service ports that can be accessed
from, respectively, the hostile and private networks. O6 monitors possible attacks,
providing the firewall administrator with the means of detecting them and
hence taking
appropriate action.