Restricting Communications
Restricting external accesses using the IP address
Restricting Packet Transfer
Restricting E-mail recipients using the domain
Restricting external accesses using the IP address