beautypg.com

IBM Tivoli and Cisco User Manual

Page 348

background image

330

Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

2. From the first drop-down menu, select the role you have created. In our

example that is

AllowAll

. In the second drop-down menu, select Trusted

Untrusted. Click Select (Figure 7-98).

Figure 7-98 Rules for trusted to untrusted

3. The action should be

Allow

and the protocol should be

All

.

4. Repeat step 2, this time selecting Untrusted

Trusted from the second

drop-down menu. Click Submit.