Deploy the Configuration

After you configure your deployment, and any time you change that configuration, you must deploy the changes to affected devices. You can view deployment status in the Message Center.

Deploying updates the following components:

  • Device and interface configurations

  • Device-related policies: NAT, VPN, QoS, platform settings

  • Access control and related policies: DNS, file, identity, intrusion, network analysis, prefilter, SSL

  • Network discovery policy

  • Intrusion rule updates

  • Configurations and objects associated with any of these elements

You can configure the system to deploy automatically by scheduling a deploy task or by setting the system to deploy when importing intrusion rule updates. Automating policy deployment is especially useful if you allow intrusion rule updates to modify system-provided base policies for intrusion and network analysis. Intrusion rule updates can also modify default values for the advanced preprocessing and performance options in your access control policies.