Computers implement various network policies to control network traffic and to protect a computer or other network device from malicious attacks perpetrated by other network devices, such as theft of data, denial of service (DOS) attacks, and the like.