This document explores the goals of a firewall, including traffic filtering and authorized access. It also provides an example of firewall configuration and discusses the design of packet filter rule sets. Additionally, it discusses achieving anonymity and privacy requirements with a proxy. The document then addresses IPsec and its protocols, explaining the purpose of sequence numbers and the difference between AH and ESP. Finally, it investigates the use of AH in transport mode behind a NAT box.