2.0 Understanding Configuration and Security Locations

A device uses its current network environment to determine both its Configuration location and its Security location.