I generally understand what you are describing.Let me illustrate with another application scenario, suppose today we need to protect the connection management equipment from external to internal access at the bank. For this purpose, I have deployed a firewall at the front end of the device to manage the equipment and block suspicious external connections. By configuring IDS/IPS with packet analysis capabilities, we can allow packets with specific "tagged IDs" or "specific formats" to connect, while rejecting others. In this case, can DPI achieve our goal of using IDS/IPS to block packets that do not meet the specific tags or formats, while DPI checks if the packets comply with the required standards?