Brocade Network Advisor SAN User Manual v11.1x (53-1002167-01, May 2011)

400 Brocade Network Advisor SAN User Manual
53-1002167-01
Security configuration deployment
15
Security configuration deployment
Figure 146 shows the standard interface used to deploy security configurations.
FIGURE 146 Deploy to Product/Ports dialog box
Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following procedures:
“Creating a standard L2 ACL configuration” on page 388
“Editing a standard L2 ACL configuration” on page 389
“Copying a standard L2 ACL configuration” on page 390
“Creating an extended L2 ACL configuration” on page 391
“Editing an extended L2 ACL configuration” on page 393
“Copying an extended L2 ACL configuration” on page 395
“Creating a L2 ACL from a saved configuration” on page 398
Security Management enables you to configure, persist, and manage a security configuration as a
“deployment configuration object”. A deployment configuration object is comprised of the following
parts:
Security configuration (L2 ACL)
Target information
Deployment option
Persistence option
Scheduling option
Snapshot option
To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to “Deployment Manager” on
page 745.