. . . . "Based on the source and/or destination address, these embodiments determine whether the traffic is trusted or suspect." .