Configuration should meet network requirements, using security best practices.