Security Configuration Deployment - Brocade Communications Systems WFT-2D User Manual

San user manual
Table of Contents

Advertisement

17

Security configuration deployment

Security configuration deployment
Figure 256
FIGURE 256
Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following sections:
Security Management enables you to configure, persist, and manage a security configuration as a
"deployment configuration object". A deployment configuration object is comprised of the following
parts:
To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to
page 1047.
662
shows the standard interface used to deploy security configurations.
Deploy to Product/Ports dialog box
Security configuration (Layer 2 ACL)
Target information
Deployment option
Persistence option
Scheduling option
Snapshot option
"Deployment Manager"
Brocade Network Advisor SAN User Manual
53-1003154-01
on

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network advisor 12.3.0

Table of Contents