. . "For example, a host such as a workstation or a personal computer is typically not considered atrusted device, because a malicious or inexperienced user may cause invalid ICMP packets to be generated that may cause harmful effects to other hosts on the network." . . . . .