Replicating security configurations – Brocade Network Advisor SAN User Manual v12.3.0 User Manual

Page 548

Advertising
background image

496

Brocade Network Advisor SAN User Manual

53-1003154-01

Configuration file management

12

Replicating security configurations

NOTE

This feature requires a Trial or Licensed version.

You can replicate an AD/LDAP Server, DCC, IP, RADIUS Server, or SCC security policy.

1. Select Configure > Configuration File > Replicate > Security.

A wizard is launched to guide you through the process. The first step of the wizard, Overview,
displays. There are seven steps in the Replicate Switch Security Policy Configuration wizard:

-

Overview, which describes the wizard.

-

Configuration Type, which allows you to select the type of configuration you wish to
replicate. For more information about the fields and components of this step, refer to

Table 46

on page 496.

-

Select Source Switch, which allows you to select the source device of the security policy
configuration you wish to replicate. For more information about the fields and components
of this step, refer to

Table 47

on page 496.

-

Select Destination Switches, which allows you to select the destination devices. Only
devices that can accept the selected security policy configuration display. For more
information about the fields and components of this step, refer to

Table 48

on page 497.

-

Validation, which lists the configuration settings that you can validate before you replicate.
For more information about the fields and components of this step, refer to

Table 49

on

page 498.

-

Summary, which lists the replication settings that successfully ran on all the selected
destination switches. For more information about the fields and components of this step,
refer to

Table 50

on page 498.

2. To proceed to the next step in the wizard, click Next. To return to the previous screen, click

Previous.

TABLE 46

Step 2. Configuration Type

Field/Component

Description

AD/LDAP Server option

Select to replicate the Active Directory/Lightweight Directory Access
Protocol (AD/LDAP) Server security policy. If both the source and
destination devices are running Fabric OS 7.1 or later, also replicates the
LDAP Role mapping configuration.

DCC Policy option

Select to replicate the Device Connection Control (DCC) security policy.

IP Policy option

Select to replicate the Internet Protocol (IP) Filter security policy.

RADIUS Server option

Select to replicate the Remote Authentication Dial-In User Service
(RADIUS) Server security policy.

SCC Policy option

Select to replicate the Switch Connections Control (SCC) security policy.

TABLE 47

Step 3. Select Source Switch

Field/Component

Description

Available Switches table

Lists the devices from which you can select to replicate a security policy

Fabric Name

The name of the fabric that is associated with the selected available
switch.

Advertising