In a TAN where Control Plane and Data Plane are inextricably intertwined an intruder
can attack the control plane from the data plane by flows of faked requests or by address
spoofing and many others ways. So, the control plane isolation enhances the robustness and provides for a reliable network behavior. At the same time this isolation will not help us avoid the typical threats in the data plane like malware, exploring software vulnerabilities, protocols vulnerabilities in data plane.