Management, Switch configuration using webview, Switch configuration using cli commands – Enterasys Networks Enterasys Gold Distributed Forwarding Engine 4H4284-49 User Manual
Page 27: Standards compatibility, Secure networks policy support, Management -7
Management
Enterasys Matrix DFE-Gold Series Modules Hardware Installation Guide 1-7
Management
Management of the module can be either in‐band or out‐of‐band. In‐band remote
management is possible using Telnet, Enterasys Networks’ NetSight
®
management
application, or WebView™ application. Out‐of‐band management is provided through
the RJ45 COM (Communication) port on the front panel using a VT100 terminal or a
VT100 terminal emulator.
Switch Configuration Using WebView
Enterasys Networks’ HTTP‐based Web management application (WebView) is an
intuitive web tool for simple management tasks.
Switch Configuration Using CLI Commands
The CLI commands enable you to perform more complete switch configuration
management tasks.
For CLI command set information and how to configure the module, refer to the Enterasys
Matrix DFE‐Gold Series Configuration Guide.
Standards Compatibility
The DFE‐Gold modules are fully compliant with the IEEE 802.3‐2002, 802.3ae‐2002,
802.1D‐1998, and 802.1Q‐1998 standards. The DFE‐Gold module provides IEEE
802.1D‐1998 Spanning Tree Algorithm (STA) support to enhance the overall reliability of
the network and protect against “loop” conditions.
Secure Networks Policy Support
Policy Enabled Networking manages the allocation of networking infrastructure
resources in a secure and effective manner. Using Secure Networks Policy, an IT
Administrator can predictably assign appropriate resources to the Users, Applications,
and Services that use the network; while blocking or containing access for inappropriate
or potentially dangerous network traffic. Using this technology it is possible, for the first
time, to align IT services with the needs of specific users and applications, and to leverage
the network as a key component of the organization’s security strategy.
The Secure Networks Policy Architecture consists of 3 components: Classification Rules,
Network Services, and Behavioral Profiles. These are defined as follows:
•
Classification Rules determine how specific traffic flows (identified by Layer 2, Layer
3, and Layer 4 information in the data packet) are treated by each Switch or Router. In
general, Classification Rules are applied to the networking infrastructure at the
network edge/ingress point.