Describe how you would design security of a corporate network,
incorporating firewalls, proxies, and vpns"