> As such, the product should either be designed to work in those environments with reasonable effort and without violating common security practices.
And I'm claiming that the effort required is reasonable, and it's thus not that big of a deal, even if slightly annoying in that it requires effort and doesn't just work. In the few environments I've worked in a sysadmin role, it wouldn't have been a problem to provide a one-off network that doesn't touch the official network if requested by a user, and in one it'd been completely fine if the user just set up an isolated AP as long as it didn't interfere with the official ones (university network)
And I'm claiming that the effort required is reasonable, and it's thus not that big of a deal, even if slightly annoying in that it requires effort and doesn't just work. In the few environments I've worked in a sysadmin role, it wouldn't have been a problem to provide a one-off network that doesn't touch the official network if requested by a user, and in one it'd been completely fine if the user just set up an isolated AP as long as it didn't interfere with the official ones (university network)