Brocade Communications Systems IP250 user manual Scheduling a security configuration deployment

Models: IP250

1 1753
Download 1753 pages 4.1 Kb
Page 684
Image 684

18 Security configuration deployment

5.Click the Snapshot Use check box and click the ellipsis button to select the product monitoring template.

NOTE

The Snapshot Use check box is only available for IronWare products. The Pre-Post Snapshot Properties dialog box displays.

6.Select the product monitoring template you want to use from the CLI Template list.

7.Select one or more of the following to capture snapshots:

Select the Pre-deploymentcheck box to capture a snapshot of the product’s configuration prior to deployment of the security configuration.

Select the Post-deploymentcheck box to capture a snapshot of the product’s configuration after deployment of the security configuration.

If you select the Post-deploymentcheck box, enter the amount of time (between 1 and 300 seconds) you want the application to wait before capturing the snapshot in the Delay field.

8.Select one or more ports or products to which you want to deploy the configuration in the Available Targets list and click the right arrow button to move them to the Selected Targets list.

9.Click OK on the Deploy to Products - Layer 2 ACL dialog box.

Scheduling a security configuration deployment

To schedule a security configuration deployment, complete the following steps.

FIGURE 238 Deploy to Product/Ports dialog box

1.Select Configure > Security > Layer 2 ACL > Product.

The Device_Name - Layer 2 ACL Configuration dialog box displays.

632

Brocade Network Advisor IP User Manual

 

53-1003056-01

Page 684
Image 684
Brocade Communications Systems IP250 Scheduling a security configuration deployment, Deploy to Product/Ports dialog box