"Split the network
I'm starting here by splitting the network into two parts, the
trusted half and the untrusted half. The trusted half has one
netblock, the untrusted a different netblock. We use the DHCP
server to identify mac addresses to give out the relevant
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.