What are teh techniques used by the firewalls to control access and enforce a security policy?
Advert.
What are teh techniques used by the firewalls to control access and enforce a security policy?
What kind of firewall you are talking about, your question looks like it came straight from a text book... ?