Things to be considered a)Removal of Previous Connectivity when the security level of a node changes, the connectivity should also change b)Anti-spoofing to prevent a node from overriding administrators' policy c)Encrypted Communication Management encrypted communication can be managed d)Operation Cost initial and running costs