
Designing Access Controls
Finalize Security Policies
Table 
In this example, profiles that will be associated with the same access policy group are also associated with the same VLAN 
Table 3-81.  Dynamic VLANs for PCU
| Access Profile | VLAN ID | 
| IT admin | 2 | 
| 
 | 
 | 
| President, vice president, and so on | 14 | 
| 
 | 
 | 
| Unencrypted | 14 | 
| 
 | 
 | 
| Accounting | 15 | 
| 
 | 
 | 
| Registrars | 16 | 
| 
 | 
 | 
| Staff | 17 | 
| 
 | 
 | 
| Student | 18 | 
| 
 | 
 | 
| Engineering students | 19 | 
| 
 | 
 | 
| Faculty | 20 | 
| 
 | 
 | 
| Engineering faculty | 21 | 
| 
 | 
 | 
| Guest | 22 | 
| 
 | 
 | 
| Guest_afterhours | 22 | 
| 
 | 
 | 
| IP telephones | 23 | 
| 
 | 
 | 
| Quarantine/Test | 24 | 
| 
 | 
 | 
■Allowed 
IDM allows you to define resources, which are essentially ACLs. For example, you can create a resource that allows traffic to an email server’s IP address on port 110 and call the resource “Email server.” And you can create a “Web traffic” resource that allows all traffic destined to TCP port 80. You could then assign both resources to an access profile.
