fryedchikin
Regular Contributor
I truly don't see such a feature offering any security benefit. There are simple steps we can take to prevent a casual unauthorized user from connecting to our networks. Anyone smart enough to know how to bypass those measures will know how to clone a MAC address and bypass this method anyway. Anyone allowing non trusted users physical access to their network has much bigger issues to address IMO.