. "The method of operation is that every combination of protocols, addresses, and ports is a key." . . .