How does Quarantine Model overcome the limitation of a firewall? for example, insider attack due to a virus infection checks the anti-virus software status periodically unexpected communication through wireless-LAN, mobile-phone... checks the running network interface periodically obstacle for the deployment of IPv6 per-node security management cooperatated with network infrastructure to summarize... firewall Inspection-Point and Enforcement-Point is supposed to be same Quarantine Model Inspection-Point and Enforcement-Point can be different