When implementing boundary controls, you often link your network and its users to information assets worth protecting should avoid taking such a chance (what amounts of your network environment, decide what traffic you want to permit .