User Manual v12.3.0 Owner's manual

Brocade Network Advisor IP User Manual 751
53-1003153-01
Security configuration deployment
19
5. Click the Snapshot Use check box and click the ellipsis button to select the product monitoring
template.
NOTE
The Snapshot Use check box is only available for IronWare products.
The Pre-Post Snapshot Properties dialog box displays.
6. Select the product monitoring template you want to use from the CLI Template list.
7. Select one or more of the following to capture snapshots:
Select the Pre-deployment check box to capture a snapshot of the product’s configuration
prior to deployment of the security configuration.
Select the Post-deployment check box to capture a snapshot of the product’s configuration
after deployment of the security configuration.
If you select the Post-deployment check box, enter the amount of time (between 1 and
300 seconds) you want the application to wait before capturing the snapshot in the Delay
field.
8. Select one or more ports or products to which you want to deploy the configuration in the
Available Targets list and click the right arrow button to move them to the Selected Targets list.
9. Click OK on the Deploy to Products - Layer 2 ACL dialog box.
Scheduling a security configuration deployment
To schedule a security configuration deployment, complete the following steps.
FIGURE 297 Deploy to Product/Ports dialog box
1. Select Configure > Security > Layer 2 ACL > Product.
The Device_Name - Layer 2 ACL Configuration dialog box displays.