Replicating security configurations, Table 45, Table 46 – Brocade Network Advisor IP User Manual v12.1.0 User Manual
Page 475

Brocade Network Advisor IP User Manual
421
53-1002947-01
Configuration repository management
14
Replicating security configurations
NOTE
Only available for Fabric OS products.
NOTE
This feature requires a Trial or Licensed version.
You can replicate an AD/LDAP Server, DCC, IP, RADIUS Server, or SCC security policy.
Select Configure > Configuration > Replicate > Security.
A wizard is launched to guide you through the process. The first step of the wizard, Overview,
displays. There are seven steps in the Replicate Switch Security Policy Configuration wizard:
1. Overview, which describes the wizard.
2. Configuration Type, which allows you to select the type of configuration you wish to replicate.
For more information about the fields and components of this step, refer to
3. Select Source Switch, which allows you to select the source device of the security policy
configuration you wish to replicate. For more information about the fields and components of
this step, refer to
4. Select Destination Switches, which allows you to select the destination devices. Only devices
that can accept the selected security policy configuration display. For more information about
the fields and components of this step, refer to
5. Validation, which lists the configuration settings that you can validate before you replicate. For
more information about the fields and components of this step, refer to
Current Firmware
The current firmware.
Status
The status of the switch .
TABLE 45
Step 6. Validation
Field/Component
Description
Validation Settings table
The replication settings that have been configured in previous steps; for
example, the configuration type, source configuration, and destination
settings. Click Finish to approve the settings.
Disable Destination Switch check box
Select to disable the destination switch during replication.
TABLE 46
Step 7. Summary
Field/Component
Description
Summary table
The replication settings that have been successfully applied to the
selected destination switches; for example, the configuration type,
source configuration, and destination settings. Click Close to close the
dialog box.
TABLE 44
Step 5. Destination Switches (Continued)
Field/Component
Description