Enterasys Networks 9034096-02 Switch User Manual


 
Standards Compatibility
Matrix DFE-Gold Series Installation Guide 1-7
Switch Configuration Using CLI Commands
TheCLIcommandsenableyoutoperformmorecompleteswitchconfiguration
managementtasks.
ForCLIcommandsetinformationandhowtoconfigurethemodule,refertotheMatrix
DFEGoldSeriesConfigurationGuide.
Standards Compatibility
TheDFEGoldmodulesarefullycompliantwiththeIEEE802.32002,802.3ae2002,
802.1D1998,and802.1Q1998standards.TheDFEGoldmodulesprovideIEEE802.1D
1998SpanningTreeAlgorithm(STA)supporttoenhancetheoverallreliabilityofthe
networkandprotectagainst“loop”conditions.
Secure Networks Policy Support
AfundamentalconceptthatiskeytotheimplementationoftheEnterasysSecure
Networksmethodologyispolicyenablednetworking.Thisapproachprovidesusersof
thenetworkwiththeresourcestheyneed—inasecurefashion—whileatthesametime
denyingaccesstoapplicationsorprotocolsthataredeemedinappropriatebasedonthe
user’sfunctionwithintheorganization.Byadoptingsucha“userpersonalized”model,it
ispossibleforbusinesspoliciestobetheguidelinesinestablishingthetechnology
architectureoftheenterprise.Twomajorobjectivesareachievedinthisway:ITservices
arematchedappropriatelywithindividualusers;andthenetworkitself
becomesan
activeparticipantintheorganization’ssecuritystrategy.TheSecureNetworks
architectureconsistsofthreetiers:
Classificationrulesmakeupthefirstorbottomtier.Therulesapplytodevicesinthe
SecureNetworksenvironment,suchasswitchesandrouters.Therulesaredesigned
tobeimplementedatornear
theuser’spointofentrytothenetwork.Rulesmaybe
writtenbasedoncriteriadefinedintheLayer2,Layer3,orLayer4informationofthe
dataframe.
•ThemiddletierisServices,whicharecollectionsofindividualclassificationrules,
groupedlogicallytoeitherpermitordenyaccess
toprotocolsorapplicationsbasedon
theuser’srolewithintheorganization.Priorityandbandwidthratelimitingmayalso
bedefinedinservices.
•Roles,orbehavioralprofiles,makeupthetoptier.Therolesassignservicestovarious
businessfunctionsordepartments,suchasexecutive,sales,andengineering.
Toenhancesecurity
anddeliveratruepolicybasedinfrastructu re,theEnterasysSecure
Networksmethodologycantakeadvantageofauthenticationmethods,suchas802.1X,
usingEAPTLS,EAPTTLS,orPEAP,aswellasothertypesofauthentication.
Authorizationinformation,attachedtotheauthentication response,determinesthe
applicationofpolicy.Authorizationinformationis
communicatedbymeansofthepolicy