7.7. Protecting a Network