Security configuration deployment, Security, Configuration deployment – Brocade Network Advisor SAN + IP User Manual v12.1.0 User Manual

Page 875

Advertising
background image

Brocade Network Advisor SAN + IP User Manual

819

53-1002949-01

Security configuration deployment

22

Security configuration deployment

Figure 293

shows the standard interface used to deploy security configurations.

FIGURE 293

Deploy to Product/Ports dialog box

Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following sections:

“Layer 2 access control list management”

on page 753

“Layer 3 access control list policy”

on page 772

“Media Access Control (MAC) filter management”

on page 810

Security Management enables you to configure, persist, and manage a security configuration as a
“deployment configuration object”. A deployment configuration object is comprised of the following
parts:

Security configuration (Layer 2 ACL, L3 ACL, or MAC filter)

Target information

Deployment option

Persistence option

Scheduling option

Snapshot option

To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to

“Deployment Manager”

on

page 1439.

Advertising