In terms of information gathering in the instance for a potential security breach, a dual packet filtering mechanism can provide an extra logging mechanism. (Checkpoints logs are very easy on the eyes.) Two gateways can also be used to manipulate the...