The following example policy demonstrates how these new tokens can be used to create “user profiles” where each user is identified by source MAC address:
twostage_example1.pol:
 # First stage rules:
 entry firststage_1 {
if{
    ethernet-source-address 00:00:00:00:00:01;
} then {
    class-id 7;
}}
entry firststage_2 {
if {
    ethernet-source-address 00:00:00:00:00:02;
} then {
    class-id 8;
}}entry firststage_3 {
if {
    ethernet-source-address 00:00:00:00:00:03;
} then {
    class-id 7;
}}
 # Second stage rules: 
entry secondstage_1 {
 if{ 
   class-id 7;
   destination-address 10.68.9.0/24;
} then {
    permit;
}}
entry secondstage_2 {
if {
    class-id 8;
    destination-address 10.68.0.0/16;
} then {
    permit;
}}entry secondstage_3 {
if {
} then 
{entry permit_arp {
if {
ethernet-type 0x0806;
} then {
permit;
}
}
   deny;
    }}