Use various perimeter router implementations; Consider physical security, operating system security, and router ...
www.cs.rpi.edu