Enterasys-networks Enterasys Gold Distributed Forwarding Engine 4H428 Manuel d'utilisateur Page 27

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 90
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 26
Management
Enterasys Matrix DFE-Gold Series Modules Hardware Installation Guide 1-7
Management
Managementofthemodulecanbeeitherinbandoroutofband.Inbandremote
managementispossibleusingTelnet,Enterasys Networks’NetSight
®
management
application,orWebViewapplication.Outofbandmanagementisprovidedthrough
theRJ45COM(Communication)portonthefrontpanelusingaVT100terminalora
VT100terminalemulator.
Switch Configuration Using WebView
Enterasys Networks’HTTPbasedWebmanagementapplication(WebView)isan
intuitivewebtoolforsimplemanagementtasks.
Switch Configuration Using CLI Commands
TheCLIcommandsenableyoutoperformmorecompleteswitchconfiguration
managementtasks.
ForCLIcommandsetinformationandhowtoconfigurethe module,refertotheEnterasys
MatrixDFEGoldSeriesConfigurationGuide.
Standards Compatibility
TheDFEGoldmodulesarefullycompliantwiththeIEEE802.32002,802.3ae2002,
802.1D1998,and802.1Q1998standards.TheDFEGoldmoduleprovidesIEEE
802.1D1998SpanningTreeAlgorithm(STA)supporttoenhancetheoverallreliabilityof
thenetworkandprotectagainst“loop”conditions.
Secure Networks Policy Support
PolicyEnabledNetworkingmanagestheallocationofnetworkinginfrastructure
resourcesinasecureandeffectivemanner.UsingSecureNetworksPolicy,anIT
AdministratorcanpredictablyassignappropriateresourcestotheUsers,Applications,
andServicesthatusethenetwork;whileblockingorcontainingaccessforinappropriate
orpotentiallydangerousnetworktraffic.
Usingthistechnologyitispossible,forthefirst
time,toalignITserviceswiththeneedsofspecificusersandapplications,andtoleverage
thenetworkasakeycomponentoftheorganization’ssecuritystrategy.
TheSecureNetworksPolicyArchitectureconsistsof3components:ClassificationRules,
NetworkServices,andBehavioral
Profiles.Thesearedefinedasfollows:
ClassificationRulesdeterminehowspecifictrafficflows(identifiedbyLayer2,Layer
3,andLayer4informationinthedatapacket)aretreatedbyeachSwitchorRouter.In
general,ClassificationRulesareappliedtothenetworkinginfrastructureatthe
networkedge/ingresspoint.
Vue de la page 26
1 2 ... 22 23 24 25 26 27 28 29 30 31 32 ... 89 90

Commentaires sur ces manuels

Pas de commentaire