In step 310 of method 300, the management environment applies network security and routing rules to guest device 181 based on the provided data. One example of step 308 is router 106, the use's service provider, or a DSDN cloud service generating instructions for guest device 181 within network 100 to limit access by guest device 181 to network 100 resources.
In step 312 of method 300, instructions are provided to DSDN controller based on the data provided and processed in the above steps. One example of step 308 is router 106, the use's service provider, or a DSDN cloud service providing the generated instructions to network 100 to implement the instructions.
In step 314 of method 300, a DSDN controller configures a flow table at a switch, e.g., in a gateway or a router. One example of step 312 is a DSDN controller within DSDN capable router 106 configures a flow table within router 106 to control data flow to and from guest device 181.
In step 316 of method 300, the device is authorized. One example of step 316 is guest device 181 being authorized by DSDN capable router 161, the user's service provider, or a DSDN cloud service.