• The relationship is that data is only limited to what firewalls allow via specific places called ports. There is the untrusted network on the outside, then the firewall which prevents unwanted or suspicious connections, and the trusted network is what lies within the bounds of the firewall.