• Restricting Communications
    • Restricting external accesses using the IP address
    • Restricting Packet Transfer

Restricting external accesses using the IP address