An implementation approach that places a network security mechanism inside the system that is to be protected. (Compare: bump-in-the-wire.)
An implementation approach that places a network security mechanism inside the system that is to be protected. (Compare: bump-in-the-wire.)
Example: IPsec can be implemented inboard, in the protocol stack of an existing system or existing system design, by placing a new layer between the existing IP layer and the OSIRM Layer 3 drivers. Source code access for the existing stack is not required, but the system that contains the stack does need to be modified [R4301].