beautypg.com

Replicating security configurations – Brocade Network Advisor SAN User Manual v12.1.0 User Manual

Page 427

background image

Brocade Network Advisor SAN User Manual

377

53-1002948-01

Configuration repository management

12

Replicating security configurations

NOTE

This feature requires a Trial or Licensed version.

You can replicate an AD/LDAP Server, DCC, IP, RADIUS Server, or SCC security policy.

Select Configure > Configuration > Replicate > Security.

A wizard is launched to guide you through the process. The first step of the wizard, Overview,
displays. There are seven steps in the Replicate Switch Security Policy Configuration wizard:

1. Overview, which describes the wizard.

2. Configuration Type, which allows you to select the type of configuration you wish to replicate.

For more information about the fields and components of this step, refer to

Table 42

on

page 377.

3. Select Source Switch, which allows you to select the source device of the security policy

configuration you wish to replicate. For more information about the fields and components of
this step, refer to

Table 43

on page 377.

4. Select Destination Switches, which allows you to select the destination devices. Only devices

that can accept the selected security policy configuration display. For more information about
the fields and components of this step, refer to

Table 44

on page 378.

5. Validation, which lists the configuration settings that you can validate before you replicate. For

more information about the fields and components of this step, refer to

Table 45

on page 379.

6. Summary, which lists the replication settings that successfully ran on all the selected

destination switches. For more information about the fields and components of this step, refer
to

Table 46

on page 379.

To proceed to the next step in the wizard, click Next. To return to the previous screen, click Previous.

TABLE 42

Step 2. Configuration Type

Field/Component

Description

AD/LDAP Server option

Select to replicate the Active Directory/Lightweight Directory Access
Protocol (AD/LDAP) Server security policy. If both the source and
destination devices are running Fabric OS 7.1 or later, also replicates the
LDAP Role mapping configuration.

DCC Policy option

Select to replicate the Device Connection Control (DCC) security policy.

IP Policy option

Select to replicate the Internet Protocol (IP) Filter security policy.

RADIUS Server option

Select to replicate the Remote Authentication Dial-In User Service
(RADIUS) Server security policy.

SCC Policy option

Select to replicate the Switch Connections Control (SCC) security policy.

TABLE 43

Step 3. Select Source Switch

Field/Component

Description

Available Switches table

Lists the devices from which you can select to replicate a security policy

Fabric Name

The name of the fabric that is associated with the selected available
switch.

Switch Name

The name of the source switch to be replicated.