textarea=You must be aware of commonly known threats and vulnerabilities in order to properly configure the firewall. The firewall should be designed to mitigate penetration from intruders. Once the firewall is penetrated, the intruder has access to the organization's network. Unnecessary executables, compilers, and other dangerous files should be filtered from entering the firewall.