This section provides notes on using the connection security facility. The following items are explained: