Plugin must operate with adequate abstractions like network groups, and not only existing IPs/prefixes, but with other masking types existing in software. It must represent real scenarios for most type of ACLs in different parts of infrastructure....