Hardware y/o software, cuya finalidad es mediar en
el tráfico de entrada y salida en los puntos de interconexión de los sistemas. [CCN-STIC-302:2012]
A device with appropriate
mechanisms that: (i) facilitates the adjudication of different interconnected
system security policies (e.g., controlling the flow of information into or out
of an interconnected system); and/or (ii) monitors and controls communications
at the external boundary of an information system to prevent and detect
malicious and other unauthorized communications. Boundary protection devices
include such components as proxies, gateways, routers, firewalls, guards, and
encrypted tunnels. [NIST-SP800-53:2013]