User Manual v12.3.0 Owner's manual

748 Brocade Network Advisor IP User Manual
53-1003153-01
Security configuration deployment
19
Security configuration deployment
Figure 294 shows the standard interface used to deploy security configurations.
FIGURE 294 Deploy to Product/Ports dialog box
Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following sections:
“Layer 2 access control list management” on page 679
“Layer 3 access control list policy” on page 699
“Media Access Control (MAC) filter management” on page 739
Security Management enables you to configure, persist, and manage a security configuration as a
“deployment configuration object”. A deployment configuration object is comprised of the following
parts:
Security configuration (Layer 2 ACL, L3 ACL, or MAC filter)
Target information
Deployment option
Persistence option
Scheduling option
Snapshot option
To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to “Deployment Manager” on
page 1093.