As a network administrator
I want to know whether it is possible to allow authentications for devices that aren't configured
So that I can place them on guest VLANs
Value / Purpose
Having full control over successful or failed authentications help support legacy networks
Useful Contacts
Emile Swarts
Additional Information
This may not be possible with configurations, looking at the C source code may be required.
Definition of Done (DoD)
Evidence gathered on whether this is possible or not.
User Story
As a network administrator I want to know whether it is possible to allow authentications for devices that aren't configured
So that I can place them on guest VLANs
Value / Purpose
Having full control over successful or failed authentications help support legacy networks
Useful Contacts
Emile Swarts
Additional Information
This may not be possible with configurations, looking at the C source code may be required.
Definition of Done (DoD)
Evidence gathered on whether this is possible or not.