Understand Security Connector Behavior with Virtual Appliances