Configuring ISA Policies for Regulating Network Access