Enterasys Networks 4H4283-49 Network Hardware User Manual


 
Management
Enterasys Matrix DFE-Gold Series Modules Hardware Installation Guide 1-7
Management
Managementofthemodulecanbeeitherinbandoroutofband.Inbandremote
managementispossibleusingTelnet,Enterasys Networks’NetSight
®
management
application,orWebView™application.Outofbandmanagementisprovidedthrough
theRJ45COM(Communication)portonthefrontpanelusingaVT100terminalora
VT100terminalemulator.
Switch Configuration Using WebView
Enterasys Networks’HTTPbasedWebmanagementapplication(WebView)isan
intuitivewebtoolforsimplemanagementtasks.
Switch Configuration Using CLI Commands
TheCLIcommandsenableyoutoperformmorecompleteswitchconfiguration
managementtasks.
ForCLIcommandsetinformationandhowtoconfigurethemodule,refertotheEnterasys
MatrixDFEGoldSeriesConfigurationGuide.
Standards Compatibility
TheDFEGoldmodulesarefullycompliantwiththeIEEE802.32002,802.3ae2002,
802.1D1998,and802.1Q1998standards.TheDFEGoldmoduleprovidesIEEE
802.1D1998SpanningTreeAlgorithm(STA)supporttoenhancetheoverallreliabilityof
thenetworkandprotectagainst“loop”conditions.
Secure Networks Policy Support
PolicyEnabledNetworkingmanagestheallocationofnetworkinginfrastructure
resourcesinasecureandeffectivemanner.UsingSecureNetworksPolicy,anIT
AdministratorcanpredictablyassignappropriateresourcestotheUsers,Applications,
andServicesthatusethenetwork;whileblockingorcontainingaccessforinappropriate
orpotentiallydangerousnetworktraffic.
Usingthistechnologyitispossible,forthefirst
time,toalignITserviceswiththeneedsofspecificusersandapplications,andtoleverage
thenetworkasakeycomponentoftheorganization’ssecuritystrategy.
TheSecureNetworksPolicyArchitectureconsistsof3components:ClassificationRules,
NetworkServices,andBehavioral
Profiles.Thesearedefinedasfollows:
ClassificationRulesdeterminehowspecifictrafficflows(identifiedbyLayer2,Layer
3,andLayer4informationinthedatapacket)aretreatedbyeachSwitchorRouter.In
general,ClassificationRulesareappliedtothenetworkinginfrastructureatthe
networkedge/ingresspoint.