![Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication | Wireless Personal Communications Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication | Wireless Personal Communications](https://media.springernature.com/m685/springer-static/image/art%3A10.1007%2Fs11277-017-4010-0/MediaObjects/11277_2017_4010_Fig1_HTML.gif)
Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication | Wireless Personal Communications
![Choosing a Default Packet-Filtering Policy | Packet-Filtering Concepts in Linux Firewalls | InformIT Choosing a Default Packet-Filtering Policy | Packet-Filtering Concepts in Linux Firewalls | InformIT](https://www.informit.com/content/images/chap2_9780134000022/elementLinks/02fig03.jpg)
Choosing a Default Packet-Filtering Policy | Packet-Filtering Concepts in Linux Firewalls | InformIT
2.3.2 Firewall and communication basics : JP1/Automatic Job Management System 3 System Design (Configuration) Guide
![Filtering Settings Which Use Source IP Addresses (Direct Specification/ Range Specification/ Address Group) : Enterprise Cloud Knowledge CenterEnterprise Cloud 2.0 Tutorial 2.4.0 documentation Filtering Settings Which Use Source IP Addresses (Direct Specification/ Range Specification/ Address Group) : Enterprise Cloud Knowledge CenterEnterprise Cloud 2.0 Tutorial 2.4.0 documentation](https://ecl.ntt.com/en/documents/tutorials/_images/fw_packetfiltering_fig1.png)
Filtering Settings Which Use Source IP Addresses (Direct Specification/ Range Specification/ Address Group) : Enterprise Cloud Knowledge CenterEnterprise Cloud 2.0 Tutorial 2.4.0 documentation
![Section 2.5. The Firewall :: Chapter 2. Designing Perimeter Networks :: Secure Linux-based Servers :: Linux systems :: eTutorials.org Section 2.5. The Firewall :: Chapter 2. Designing Perimeter Networks :: Secure Linux-based Servers :: Linux systems :: eTutorials.org](https://etutorials.org/shared/images/tutorials/tutorial_102/bssl_0205.gif)