. . . "These policy components can include authorization of the hardware device by verifying the SID, application authorization by verifying the destination port identifier or any combination including all components." .