![](/images/new-backgrounds/1308328/308328449x1.webp)
Designing Access Controls
Finalize Security Policies
Table
In this example, profiles that will be associated with the same access policy group are also associated with the same VLAN
Table 3-81. Dynamic VLANs for PCU
Access Profile | VLAN ID |
IT admin | 2 |
|
|
President, vice president, and so on | 14 |
|
|
Unencrypted | 14 |
|
|
Accounting | 15 |
|
|
Registrars | 16 |
|
|
Staff | 17 |
|
|
Student | 18 |
|
|
Engineering students | 19 |
|
|
Faculty | 20 |
|
|
Engineering faculty | 21 |
|
|
Guest | 22 |
|
|
Guest_afterhours | 22 |
|
|
IP telephones | 23 |
|
|
Quarantine/Test | 24 |
|
|
■Allowed
IDM allows you to define resources, which are essentially ACLs. For example, you can create a resource that allows traffic to an email server’s IP address on port 110 and call the resource “Email server.” And you can create a “Web traffic” resource that allows all traffic destined to TCP port 80. You could then assign both resources to an access profile.