Security configuration deployment, Security, Configuration deployment – Brocade Network Advisor IP User Manual v12.1.0 User Manual

Page 730

Advertising
background image

676

Brocade Network Advisor IP User Manual

53-1002947-01

Security configuration deployment

20

Security configuration deployment

Figure 240

shows the standard interface used to deploy security configurations.

FIGURE 240

Deploy to Product/Ports dialog box

Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following sections:

“Layer 2 access control list management”

on page 607

“Layer 3 access control list policy”

on page 627

“Media Access Control (MAC) filter management”

on page 667

Security Management enables you to configure, persist, and manage a security configuration as a
“deployment configuration object”. A deployment configuration object is comprised of the following
parts:

Security configuration (Layer 2 ACL, L3 ACL, or MAC filter)

Target information

Deployment option

Persistence option

Scheduling option

Snapshot option

To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to

“Deployment Manager”

on

page 1003.

Advertising