Security configuration deployment, Security, Configuration deployment – Brocade Network Advisor IP User Manual v12.1.0 User Manual
Page 730
676
Brocade Network Advisor IP User Manual
53-1002947-01
Security configuration deployment
20
Security configuration deployment
shows the standard interface used to deploy security configurations.
FIGURE 240
Deploy to Product/Ports dialog box
Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following sections:
•
“Layer 2 access control list management”
•
“Layer 3 access control list policy”
•
“Media Access Control (MAC) filter management”
Security Management enables you to configure, persist, and manage a security configuration as a
“deployment configuration object”. A deployment configuration object is comprised of the following
parts:
•
Security configuration (Layer 2 ACL, L3 ACL, or MAC filter)
•
Target information
•
Deployment option
•
Persistence option
•
Scheduling option
•
Snapshot option
To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to