We turn your unwanted hardware into cash or you can trade in your excess for credit towards a future project.
This article explains security mechanisms which may be implemented to prevent ethernet ports assigned to access points being used by other devices.