Scheduling a security configuration deployment – Brocade Network Advisor SAN + IP User Manual v12.1.0 User Manual

Page 878

Advertising
background image

822

Brocade Network Advisor SAN + IP User Manual

53-1002949-01

Security configuration deployment

22

5. Click the Snapshot Use check box and click the ellipsis button to select the product monitoring

template.

NOTE

The Snapshot Use check box is only available for IronWare products.

The Pre-Post Snapshot Properties dialog box displays.

6. Select the product monitoring template you want to use from the CLI Template list.

7. Select one or more of the following to capture snapshots:

Select the Pre-deployment check box to capture a snapshot of the product’s configuration
prior to deployment of the security configuration.

Select the Post-deployment check box to capture a snapshot of the product’s configuration
after deployment of the security configuration.

If you select the Post-deployment check box, enter the amount of time (between 1 and
300 seconds) you want the application to wait before capturing the snapshot in the Delay
field.

8. Select one or more ports or products to which you want to deploy the configuration in the

Available Targets list and click the right arrow button to move them to the Selected Targets list.

9. Click OK on the Deploy to Products - Layer 2 ACL dialog box.

Scheduling a security configuration deployment

To schedule a security configuration deployment, complete the following steps.

FIGURE 296

Deploy to Product/Ports dialog box

1. Select Configure > Security > Layer 2 ACL > Product.

The Device_Name - Layer 2 ACL Configuration dialog box displays.

Advertising