Security not
Red/black network communications was controlled by a secure router. Only a limited set of commands for configuration, only a limited number of protocols allowed through (and could be tightened by command) and even such things as 'data diodes'. The UI was as tight as tight and would explain at length why it would not allow you to do what you were trying to do, and if possible, how you might achieve it by another method.
Supplier of said router was taken over by a VC group and new manglement brought in.
The new router that would be supplied in place of the super secure one came from a different section of the company, located on the same physical site where manglement presided. i.e. they had the ear!
New router was Linux based, requiring root access to the command line to manually modify text configuration files.
Supplier wondered why the [security conscious] customers left for a competitor. Plus all the engineers responsible for supporting the super secure router would have nothing to do with the new system and left.