This chapter contains
the following sections:
provides an access-control solution that builds upon an existing identity-aware
infrastructure to ensure data confidentiality between network devices and
integrate security access services on one platform. In the Cisco TrustSec
solution, enforcement devices utilize a combination of user attributes and
endpoint attributes to make role-based and identity-based access control
decisions. The availability and propagation of this information is used to
apply security solutions across networks at the access, distribution, and core
layers of the network.
Cisco UCS Director,
you can manage Cisco Trustsec on the following Cisco network devices:
- Cisco ASA 5500 Series
- Cisco Adaptive Security Virtual Appliance (ASAv)
|| On the menu
Network pane, expand the pod.
network device to be configured.
The summary of
the device is displayed.
Refresh dialog box, complete the following field:
Copy Running configuration to Startup configuration check
the check box to copy the running configuration to the startup configuration.