This document discusses firewalls and their architecture. It covers common firewall threats like viruses, worms, and denial of service attacks. It explains the differences between internal and external threats and provides examples of common firewall rules. It also summarizes common firewall architectures like screening routers, screened hosts, and DMZ setups with one or two firewalls. Finally, it lists some common firewall attacks like DNS spoofing, session hijacking, and buffer overflows.