Proper authentication model

When crafting the ACL that restricts what source IP{,v6} addresses may
ssh to the router, you may want to include each router's neighbors by
both their loopback and any interface addresses that might source a
packet (if your security policy permits it).

I forgot a phrase: [that might source a packet] headed for another