Situation: We have got 2 different types of Identification profiles in place: 1. authenticate systems based on source IP address 2. authenticate all users based on AD membership Then when have access policies. 1. permit systems to only access certa...