Cisco CiscoWork QoS Policy Manager 4.1.2 User Guide
Chapter 7 Deploying QoS Policies
Deploying Policies and QoS Configurations
7-6
User Guide for QoS Policy Manager 3.0
78-12542-01
Step 2: Validating the Historical Deployment Group
Note
This step of the wizard is only available if you selected to deploy a historical
version of a deployment group.
version of a deployment group.
Whenever a previous version of a deployment group is restored, validation checks
must be done on the deployment group. The validation process is automatically
activated after selecting a historical deployment group and clicking the Next
button in
must be done on the deployment group. The validation process is automatically
activated after selecting a historical deployment group and clicking the Next
button in
.
The system does the following checks and automatically provides a report of
violations, where relevant:
violations, where relevant:
•
Missing Network Elements—This validation procedure checks for the
coordination of policies and managed devices. If the validation procedure
detects network elements that are missing from the current device group, they
will be displayed in the report. The assignments of policies to these network
elements in the restored deployment group will be automatically removed.
coordination of policies and managed devices. If the validation procedure
detects network elements that are missing from the current device group, they
will be displayed in the report. The assignments of policies to these network
elements in the restored deployment group will be automatically removed.
•
Invalid Assignments—This validation procedure checks for assigned network
elements that no longer match the constraints of their policy groups. Any
invalid assignments will be displayed in the report. The network elements
will be removed from the assignment.
elements that no longer match the constraints of their policy groups. Any
invalid assignments will be displayed in the report. The network elements
will be removed from the assignment.
•
Reusable Components Violations—This validation procedure checks for the
coordination of policies and library components (IP aliases, application
aliases and policy group templates). If the validation process detects some
library components in the restored version that are different than the ones in
the current libraries, this will be displayed. The validation process overrides
the current library components with the original ones and adds them locally
to the deployment group. In this case, the dynamic link to the library
components will no longer exist.
coordination of policies and library components (IP aliases, application
aliases and policy group templates). If the validation process detects some
library components in the restored version that are different than the ones in
the current libraries, this will be displayed. The validation process overrides
the current library components with the original ones and adds them locally
to the deployment group. In this case, the dynamic link to the library
components will no longer exist.
•
Constraints Violations—This check validates the policy group device
constraints against the predefined constraints limitations. These limitations
might change from time to time causing some of the policy group constraints
to be invalid. Policy groups that are invalid will be displayed and removed
along with their assignments.
constraints against the predefined constraints limitations. These limitations
might change from time to time causing some of the policy group constraints
to be invalid. Policy groups that are invalid will be displayed and removed
along with their assignments.