Clearly, reasonable inbound perimeter protection can be accomplished by using one of many good hardware devices, some of which are very...
Separate names with a comma.