This chapter contains
the following sections:
provides an access-control solution that builds upon an existing identity-aware
infrastructure to ensure data confidentiality between network devices and
integrate security access services on one platform. In the Cisco TrustSec
solution, enforcement devices utilize a combination of user attributes and
end-point attributes to make role-based and identity-based access control
decisions. The availability and propagation of this information enables
security solutions across networks at the access, distribution, and core layers
of the network.
Cisco UCS Director, you can manage
Cisco Trustsec on the following Cisco network devices:
- Cisco ASA 5500 Series
- Cisco Adaptive Security Virtual Appliance (ASAv)
|| On the menu
Network pane, expand the pod.
network device that needs to be configured.
The summary of
the device is displayed.
Refresh dialog box, complete the following field:
Copy Running configuration to Startup configuration check
the check box to copy the running configuration to the startup configuration.