Intermediary devices
This section covers:
Using an intermediary device
Security hosts
Writing scripts for intermediary devices