Adversaries may bridge network boundaries by compromising perimeter network devices or internal devices responsible for network segmentation.

Tactics
TA0005

Sub-techniques
T1599.001


See: MITRE ATT&CK