Selective Policy Deployment
Caution | Do NOT push the management center deployments over a VPN tunnel that is terminating directly on the threat defense. Pushing the management center deployments can potentially inactivate the tunnel and disconnect the management center and the threat defense. Recovering the device from this situation can be very disruptive and require executing the disaster recovery procedure. This procedure resets the threat defense configuration to factory defaults by changing manager from management center to local and configuring the device from beginning. For more information, see Deploying the Management Center Policy Configuration over VPN Tunnel. |
The management center allows you to select a specific policy within the list of all the changes on the device that are due for deployment and deploy only the selected policy. Selectively deployment is available only for the following policies:
-
Access control policies
-
Intrusion policies
-
Malware and file policies
-
DNS policies
-
Identity policies
-
SSL policies
-
QoS policies
-
Prefilter policies
-
Network discovery
-
NAT policies
-
Routing policies
-
VPN policies
On the deployment page, after you click Expand Arrow () to view device-specific configuration changes, Policy selection () icon is visible. The policy selection icon allows you to select individual policies or configurations to deploy while withholding the remaining listed changes without deploying them. This option is available only for threat defenses and not for sensors. You can also view the interdependent changes for a certain policy or configuration using this option. The management center dynamically detects dependencies in-between policies (for example, between an access control policy and an intrusion policy), and between the shared objects and the policies. Interdependent changes are indicated using color-coded tags to identify a set of interdependent deployment changes. When one of the deployment changes is selected, the interdependent changes are automatically selected.
Note |
|
There are certain limitations to selectively deploying policies. Follow the contents in the table below to understand when selective policy deployment can be used.
Type |
Description |
Scenarios |
---|---|---|
Full deployment |
Full deployment is necessary for specific deploy scenarios, and the management center does not support selective deployment in such scenarios. If you encounter an error in such scenarios, you may choose to proceed by selecting all the changes for deployment on the device. |
Scenarios wherein a full deployment is required are:
|
Associated policy deployment |
The management center identifies interdependent policies which are interlinked. When one of the interlinked policies is selected, the remaining interlinked policies are automatically selected. |
Scenarios wherein an associated policy is automatically selected:
Scenarios wherein multiple policies are automatically selected:
|
Interdependent policy changes (shown using color-coded tags) |
The management center dynamically detects dependencies in-between policies, and between the shared objects and the policies. The interdependency of the objects or policies is shown using color-coded tags. |
Scenarios wherein color-coded interdependent policies or objects are automatically selected:
|
Access Policy Group specifications |
Access Policy Group policies are listed together in the preview window under Access Policy Group when you click Show or Hide Policy (). |
The scenarios and the expected behavior for Access Policy Group policies are:
|