A SERVICE OF

logo

330 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems
2. From the first drop-down menu, select the role you have created. In our
example that is
AllowAll. In the second drop-down menu, select Trusted
Untrusted. Click Select (Figure 7-98).
Figure 7-98 Rules for trusted to untrusted
3. The action should be Allow and the protocol should be All.
4. Repeat step 2, this time selecting Untrusted Trusted from the second
drop-down menu. Click Submit.