Which term we use for a software/hardware device, which is used to block, unauthorized access while permitting authorized communications. This term is also used for a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.