. . "The control information can include tables, counters, and other data used by the processors 304 in implementing the various security protocols." . .