Previous Index Next

ISCS version 0.1.1

Getting Started

Please do not attempt to get started before reading A Short Introduction to ISCS. If you approach ISCS like other network security configuration tools you have used, this Getting Started section will appear very confusing. When you understand the ISCS way, you will see how easy and how powerful network security management with ISCS is.

The first step after starting the SPM is to login:


There are five foundational activities to getting started with ISCS:

Define PEPs

Define Accessors and Access Groups

Define Resources and Resource Groups

Create Security Policies

Commit Changes

Previous Index Next