. . . "Third the packet is interrogated to receive information such as the protocol type, port or the packet type to determine what type of authentication is required for a packet to be authorized for network access." . .