Brocade Network Advisor SAN User Manual v12.0.0 (53-1002696-01, April 2013)

Brocade Network Advisor SAN User Manual 341
53-1002696-01
Configuration repository management
12
3. Select Source Switch, which allows you to select the source device of the security policy
configuration you wish to replicate. For more information about the fields and components of
this step, refer to Table 45 on page 341.
4. Select Destination Switches, which allows you to select the destination devices. Only devices
that can accept the selected security policy configuration display. For more information about
the fields and components of this step, refer to Table 46 on page 342.
5. Validation, which lists the configuration settings that you can validate before you replicate. For
more information about the fields and components of this step, refer to Table 47 on page 343.
6. Summary, which lists the replication settings that successfully ran on all the selected
destination switches. For more information about the fields and components of this step, refer
to Table 48 on page 343.
To proceed to the next step in the wizard, click Next. To return to the previous screen, click Previous.
TABLE 44 Step 2. Configuration Type
Field/Component Description
AD/LDAP Server option Select to replicate the Active Directory/Lightweight Directory Access
Protocol (AD/LDAP) Server security policy. If both the source and
destination devices are running Fabric OS 7.1 or later, also replicates the
LDAP Role mapping configuration.
DCC Policy option Select to replicate the Device Connection Control (DCC) security policy.
IP Policy option Select to replicate the Internet Protocol (IP) Filter security policy.
RADIUS Server option Select to replicate the Remote Authentication Dial-In User Service
(RADIUS) Server security policy.
SCC Policy option Select to replicate the Switch Connections Control (SCC) security policy.
TABLE 45 Step 3. Select Source Switch
Field/Component Description
Available Switches table Lists the devices from which you can select to replicate a security policy
Fabric Name The name of the fabric that is associated with the selected available
switch.
Switch Name The name of the source switch to be replicated.
Switch IP Address The IP address of the source switch to be replicated.
Switch WWN The world wide name of the source switch to be replicated.
Name The name of the selected switch.
Device Type The type of device port.
Tag The tag number of the port
Serial # The serial number of the switch.
WWN The switch port’s world wide name.
IP Address The switch port’s IP address.
Domain ID The switch port’s top-level addressing hierarchy of the domain.
Vendor The hardware vendor’s name.
Model The name and model number of the hardware.