A method and apparatus for deploying configuration instructions to
security devices in order to implement a security policy on a network are
disclosed. An address translation alteration performed on packets
communicated between a management source and a plurality of security
devices, resulting from implementation of a proposed new network security
policy, is detected. One or more sets of security devices are identified
that would each have one or more configuration dependencies as a result
of the address translation alteration. Configuration instructions are
sent from the management source to each of the one or more sets of
security devices using an order determined by the identified
configuration dependencies. The configuration instructions are used to
implement the security policy on the network. As a result, firewalls and
similar devices are properly configured for a new policy without
inadvertently causing traffic blockages arising from configuration
dependencies.