A technique for self-isolation of a network device that has been
identified as potentially harmful. The network device may be isolated
from the network except for an out-of-band communication channel that can
be used for management purposes to restore or repair the device prior to
the network connection being re-established.