While some access is possible from outside the firewall (e.g., electronic mail), resources such as network databases and application programs are only accessible by clientslocated behind the firewall 28.An authorized client may need to access files and other resources on network 22 from remote locations, such as when working at home or while on sales trips.