The document discusses a network security configuration with a firewall, perimeter network, and bastion host. A screening router is installed between the perimeter network and the Internet to judge which packets can pass through. A bastion host in the perimeter network manages access to the internal network from the Internet, admitting only email and FTP access.