Deployment Example 2 - With Complex Inline Security Design