- Proxy settings - MAC address cloning - Port forwarding - Strict security controls - Wifi bands, 2.4 vs 5GHz (I guess this is less important) - Logs