15
Security configuration deployment
Security configuration deployment
Figure 146
FIGURE 146
Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following procedures:
•
•
•
•
•
•
•
Security Management enables you to configure, persist, and manage a security configuration as a
"deployment configuration object". A deployment configuration object is comprised of the following
parts:
•
•
•
•
•
•
To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to
page 745.
400
shows the standard interface used to deploy security configurations.
Deploy to Product/Ports dialog box
"Creating a standard L2 ACL configuration"
"Editing a standard L2 ACL configuration"
"Copying a standard L2 ACL configuration"
"Creating an extended L2 ACL configuration"
"Editing an extended L2 ACL configuration"
"Copying an extended L2 ACL configuration"
"Creating a L2 ACL from a saved configuration"
Security configuration (L2 ACL)
Target information
Deployment option
Persistence option
Scheduling option
Snapshot option
on page 388
on page 389
on page 390
on page 391
on page 393
on page 395
on page 398
"Deployment Manager"
Brocade Network Advisor SAN User Manual
on
53-1002167-01