A network administrator noticed that wireless guests are able to access internal resources which should not be accessible. Looking at the settings on the Cisco ISE, the administrator notices that the correct ACL is applied in Authorization Profile Settings and…