This module describes how connection security rules can be used to provide addtional security to protect data transmitted across networks.