IBM Tivoli and Cisco User Manual page 349

Building a network access control solution with ibm tivoli and cisco systems
Table of Contents

Advertisement

5. The action should be
Figure 7-99 Rules for untrusted to trusted
6. Select the group you created (
Select Untrusted → Trusted from the second drop-down menu. Click Add
Policy.
7. This rule will be to allow access from the Auth VLAN to the Security
Compliance Manager. Set the following parameters:
Action:
State:
Category:
Protocol:
Untrusted:
Trusted:
Description:
8. Click Add Policy.
9. Repeat step 7, changing
Access to TCM
.
10.Repeat step 7, changing
Security Compliance Manager and Tivoli Configuration Manager.
Chapter 7. Network enforcement subsystem implementation
Allow
and the protocol should be
AllowAll
) from the first drop-down menu.
Allow
Enabled
IP
TCP
192.168.20.0/255.255.255.0:*
192.168.9.220/255.255.255.255:*
Allow access to Security Compliance Manager
Trusted
192.168.104.10
to
Protocol
ICMP
to
All
(Figure 7-99).
Description
and
Type
Any
and
to
for both the
Allow
to
331

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network access control solution

Table of Contents