This is, for example, a case such as configuring an inter-organization network within the same enterprise group, connecting a division requiring particularly the security to another division within the same enterprise, connecting associated companies within the same enterprise, and so on. [0018] Prior Art [0019] As described above, even when the networks has hitherto been operated based on the sam