Bypassing authentication

For deployments, where authentication is required, bypassing authentication for a subset of the devices is not recommended because it allows rogue devices to gain access into the internal network. However, in certain deployments where the chances of that happening are low and the potential security risk is acceptable, customers can use the following feature to bypass authentication for certain devices.