Replicating Security Configurations - Brocade Communications Systems WFT-2D User Manual

San user manual
Table of Contents

Advertisement

12
Configuration file management

Replicating security configurations

NOTE
This feature requires a Trial or Licensed version.
You can replicate an AD/LDAP Server, DCC, IP, RADIUS Server, or SCC security policy.
1. Select Configure > Configuration File > Replicate > Security.
2. To proceed to the next step in the wizard, click Next. To return to the previous screen, click
TABLE 46
Field/Component
AD/LDAP Server option
DCC Policy option
IP Policy option
RADIUS Server option
SCC Policy option
TABLE 47
Field/Component
Available Switches table
Fabric Name
496
A wizard is launched to guide you through the process. The first step of the wizard, Overview,
displays. There are seven steps in the Replicate Switch Security Policy Configuration wizard:
-
Overview, which describes the wizard.
-
Configuration Type, which allows you to select the type of configuration you wish to
replicate. For more information about the fields and components of this step, refer to
Table 46
on page 496.
-
Select Source Switch, which allows you to select the source device of the security policy
configuration you wish to replicate. For more information about the fields and components
of this step, refer to
Table 47
-
Select Destination Switches, which allows you to select the destination devices. Only
devices that can accept the selected security policy configuration display. For more
information about the fields and components of this step, refer to
-
Validation, which lists the configuration settings that you can validate before you replicate.
For more information about the fields and components of this step, refer to
page 498.
-
Summary, which lists the replication settings that successfully ran on all the selected
destination switches. For more information about the fields and components of this step,
refer to
Table 50
on page 498.
Previous.
Step 2. Configuration Type
Step 3. Select Source Switch
on page 496.
Description
Select to replicate the Active Directory/Lightweight Directory Access
Protocol (AD/LDAP) Server security policy. If both the source and
destination devices are running Fabric OS 7.1 or later, also replicates the
LDAP Role mapping configuration.
Select to replicate the Device Connection Control (DCC) security policy.
Select to replicate the Internet Protocol (IP) Filter security policy.
Select to replicate the Remote Authentication Dial-In User Service
(RADIUS) Server security policy.
Select to replicate the Switch Connections Control (SCC) security policy.
Description
Lists the devices from which you can select to replicate a security policy
The name of the fabric that is associated with the selected available
switch.
Brocade Network Advisor SAN User Manual
Table 48
on page 497.
Table 49
on
53-1003154-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network advisor 12.3.0

Table of Contents