IP address based configurations.
The type of authorization.
The time stamp of the configuration.
The type of the operating system.