This protocol can exhibit anomalous behavior caused by improper provisioning, malicious attacks, traffic or equipment failure, and network operator error. Identify the security aspects of the hierarchy and structure of system information. The Local Preference values are set according to the policies between the two autonomous systems.