Firewalls use rules to inspect network traffic and deny or permit passage. Proxy servers forward requests from clients to other servers. Access routers are located at customer sites like branch offices and are optimized for low cost. Bastion hosts are special computers configured to provide an additional layer of security when accessing an organization's private network.