This is a dedicated watch page for a single video.
A company has set up a firewall to protect its internal network. The firewall is configured to block all incoming traffic that is not destined for port 80 (HTTP) or port 443 (HTTPS). In this scenario, what roles do the firewall and its configuration rules play in the context of access control?