Brocade Network Advisor SAN User Manual v11.1x (53-1002167-01, May 2011)
400 Brocade Network Advisor SAN User Manual
53-1002167-01
Security configuration deployment
15
Security configuration deployment
Figure 146 shows the standard interface used to deploy security configurations.
FIGURE 146 Deploy to Product/Ports dialog box
Before you can deploy a security configuration, you must create the security configuration. For
step-by-step instructions, refer to the following procedures:
• “Creating a standard L2 ACL configuration” on page 388
• “Editing a standard L2 ACL configuration” on page 389
• “Copying a standard L2 ACL configuration” on page 390
• “Creating an extended L2 ACL configuration” on page 391
• “Editing an extended L2 ACL configuration” on page 393
• “Copying an extended L2 ACL configuration” on page 395
• “Creating a L2 ACL from a saved configuration” on page 398
Security Management enables you to configure, persist, and manage a security configuration as a
“deployment configuration object”. A deployment configuration object is comprised of the following
parts:
• Security configuration (L2 ACL)
• Target information
• Deployment option
• Persistence option
• Scheduling option
• Snapshot option
To create a deployment configuration object, you must save the deployment. Once you create a
deployment configuration object, you can access the security configuration from the Deployment
manager. For more information about the Deployment manager, refer to “Deployment Manager” on
page 745.