Physical security against network element access
Host authentication
Ciphered links
Personnel security with authorization