I agree that this was a bit unexpected move but if you look deeper you
may notice that they actually follow the zero-trust course, thus you
have to identify every single element on the network and no unknown
devices are allowed to lurk around :) You ...