A device uses its current network environment to determine both its Configuration location and its Security location.
Section 2.1, Configuration Location
Section 2.2, Security Location