High bandwidth or privileged access ports and lines have
restricted access. Examples include protection of trunk telephone lines
from access by calls originating on outside lines, limiting access to
high-bandwidth infrastructure elements, and physically securing an Ethernet
within a building.
Complexity: This appears to be of minimal complexity but may involve
substantial cost or require special expertise.