One or more trusted network devices within a data network infrastructure
determine a physical location of a client device requesting access to the
data network infrastructure. A trusted physical location is generated and
associated with the client device. The approach can include determining
whether a candidate network device is a trusted network device based on a
likelihood that the candidate network device can be modified to provide
false physical location data. The approach also can include determining a
response for an access request by the client and controlling network
resources provided to the client based on the trusted physical location.