This can be accomplished using firewall software on the underlying system or through access controls in network hardware like firewalls and routers.