An implementation approach that places a network security mechanism outside of the system that is to be protected. (Compare: bump-in-the-stack.)
An implementation approach that places a network security mechanism outside of the system that is to be protected. (Compare: bump-in-the-stack.)
Example: IPsec can be implemented outboard, in a physically separate device, so that the system that receives the IPsec protection does not need to be modified at all [R4301]. Military- grade link encryption has mainly been implemented as bump-in-the- wire devices.