Security Configuration Deployment - Brocade Communications Systems Brocade 8/12c User Manual

Brocade network advisor san user manual v11.1x (53-1002167-01, may 2011)
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

15

Security configuration deployment

Security configuration deployment
Figure 146
FIGURE 146
Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following procedures:
Security Management enables you to configure, persist, and manage a security configuration as a
"deployment configuration object". A deployment configuration object is comprised of the following
parts:
To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to
page 745.
400
shows the standard interface used to deploy security configurations.
Deploy to Product/Ports dialog box
"Creating a standard L2 ACL configuration"
"Editing a standard L2 ACL configuration"
"Copying a standard L2 ACL configuration"
"Creating an extended L2 ACL configuration"
"Editing an extended L2 ACL configuration"
"Copying an extended L2 ACL configuration"
"Creating a L2 ACL from a saved configuration"
Security configuration (L2 ACL)
Target information
Deployment option
Persistence option
Scheduling option
Snapshot option
on page 388
on page 389
on page 390
on page 391
on page 393
on page 395
on page 398
"Deployment Manager"
Brocade Network Advisor SAN User Manual
on
53-1002167-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network advisor 11.1.xBrocade bladesystem 4/24

Table of Contents