Security configuration deployment, Security, Configuration deployment – Brocade Network Advisor IP User Manual v12.3.0 User Manual

Page 800

Advertising
background image

748

Brocade Network Advisor IP User Manual

53-1003153-01

Security configuration deployment

19

Security configuration deployment

Figure 294

shows the standard interface used to deploy security configurations.

FIGURE 294

Deploy to Product/Ports dialog box

Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following sections:

“Layer 2 access control list management”

on page 679

“Layer 3 access control list policy”

on page 699

“Media Access Control (MAC) filter management”

on page 739

Security Management enables you to configure, persist, and manage a security configuration as a
“deployment configuration object”. A deployment configuration object is comprised of the following
parts:

Security configuration (Layer 2 ACL, L3 ACL, or MAC filter)

Target information

Deployment option

Persistence option

Scheduling option

Snapshot option

To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to

“Deployment Manager”

on

page 1093.

Advertising