Protects servers in the IDC and applies security functions according to the service type.
May deploy servers of multiple enterprises in an IDC and are easily targets for hackers.
The IDC traffic is complex. The administrator cannot effectively adjust configurations if
the traffic is not clear.