. . "Thus, as noted above, one of the entities (i.e. the client) may be located behind a firewall or other security mechanism." . .