A.Attack Protection B.Reconnaissance C.Traffic Normalizations D.Network Equipment Protection E.Security Policy F.Informational