Heavy input validation and sensible defaults keep
novice users safe
Security Experts are afforded manageable yet
granular control
For example, note the ability to override the IP
packet Time To Live for packets leaving on a public interface.
If this internal server is compromised, any data maliciously sent to
the Internet will die after it reaches the ISP router.
Also note
the ability to define an entire network range as a logical server.