. . "For example, a user on the private network may use an application such as Telnet to log on to the host-based firewall system." . .