https://chuyencu.com/which-technique-is-used-by-firewalls-to-control-access-to-a-service-according-to-which-the-user-is-attempting-to-access-it
Which technique is used by firewalls to control access to a service according to which the user is attempting to access it?