1.1.1. Firewalling 1.1.2. Intrusion Detection and Prevention 1.1.3. DoS and Network Flood Protection 1.1.4. Checking Traffic for Malware 1.1.5. Email Traffic Checking 1.1.6. Integrating with External Security Systems 1.1.7. Scenario-Based Security Policy Configuration ‹ 1. Introduction up 1.1.1. Firewalling ›