Bypassing a local firewall
When securing a corporate network, one naturally thinks of segmentation and organizing network zones by function, application sensitivity, or required level of access.
Most of the time, the approach involves isolating these zones by setting up firewalls, blocking traffic, and only opening access as specific requests arise.