. . . "is typically done with a firewall or other filtering device that is designed to enforce policy." .