• Restricting Communications
    • Restricting external accesses using the IP address
    • Restricting Packet Transfer
    • Restricting E-mail recipients using the domain

Restricting external accesses using the IP address