Hardware or software which uses a defined rule set to constrain network traffic to prevent unauthorised access to or from a network.