By configuring the device, you specifiy a range of important parameters for data communication: This includes the security of your own network, cost controls, and the authorization of individual network users.
Obviously, the parameters you have set should not be changed by unauthorized persons. For this reason, the device offers various means of protecting the configuration.