IBM Tivoli and Cisco manual Rules for trusted to untrusted

Models: Tivoli and Cisco

1 516
Download 516 pages 58.69 Kb
Page 348
Image 348

2.From the first drop-down menu, select the role you have created. In our example that is AllowAll. In the second drop-down menu, select Trusted Untrusted. Click Select (Figure 7-98).

Figure 7-98 Rules for trusted to untrusted

3.The action should be Allow and the protocol should be All.

4.Repeat step 2, this time selecting Untrusted Trusted from the second drop-down menu. Click Submit.

330Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 348
Image 348
IBM Tivoli and Cisco manual Rules for trusted to untrusted