User Manual v12.3.0 Owner's manual
748 Brocade Network Advisor IP User Manual
53-1003153-01
Security configuration deployment
19
Security configuration deployment
Figure 294 shows the standard interface used to deploy security configurations.
FIGURE 294 Deploy to Product/Ports dialog box
Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following sections:
• “Layer 2 access control list management” on page 679
• “Layer 3 access control list policy” on page 699
• “Media Access Control (MAC) filter management” on page 739
Security Management enables you to configure, persist, and manage a security configuration as a
“deployment configuration object”. A deployment configuration object is comprised of the following
parts:
• Security configuration (Layer 2 ACL, L3 ACL, or MAC filter)
• Target information
• Deployment option
• Persistence option
• Scheduling option
• Snapshot option
To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to “Deployment Manager” on
page 1093.