Enterasys Enterasys Gold Distributed Forwarding Engine 4G4282-49 Guía de instalación Pagina 27

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 90
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 26
Standards Compatibility
Matrix DFE-Gold Series Installation Guide 1-7
Switch Configuration Using CLI Commands
TheCLIcommandsenableyoutoperformmorecompleteswitchconfiguration
managementtasks.
ForCLIcommandsetinformationandhowtoconfigurethemodule,refertotheMatrix
DFEGoldSeriesConfigurationGuide.
Standards Compatibility
TheDFEGoldmodulesarefullycompliantwiththeIEEE802.32002,802.3ae2002,
802.1D1998,and802.1Q1998standards.TheDFEGoldmodulesprovideIEEE802.1D
1998SpanningTreeAlgorithm(STA)supporttoenhancetheoverallreliabilityofthe
networkandprotectagainst“loop”conditions.
Secure Networks Policy Support
AfundamentalconceptthatiskeytotheimplementationoftheEnterasysSecure
Networksmethodologyispolicyenablednetworking.Thisapproachprovidesusersof
thenetworkwiththeresourcestheyneed—inasecurefashion—whileatthesametime
denyingaccesstoapplicationsorprotocolsthataredeemedinappropriatebasedonthe
usersfunctionwithintheorganization.Byadoptingsucha“userpersonalized”model,it
ispossibleforbusinesspoliciestobetheguidelinesinestablishingthetechnology
architectureoftheenterprise.Twomajorobjectivesareachievedinthisway:ITservices
arematchedappropriatelywithindividualusers;andthenetworkitself
becomesan
activeparticipantintheorganization’ssecuritystrategy.TheSecureNetworks
architectureconsistsofthreetiers:
Classificationrulesmakeupthefirstorbottomtier.Therulesapplytodevicesinthe
SecureNetworksenvironment,suchasswitchesandrouters.Therulesaredesigned
tobeimplementedatornear
theuserspointofentrytothenetwork.Rulesmaybe
writtenbasedoncriteriadefinedintheLayer2,Layer3,orLayer4informationofthe
dataframe.
•ThemiddletierisServices,whicharecollectionsofindividualclassificationrules,
groupedlogicallytoeitherpermit ordenyaccess
toprotocolsorapplicationsbasedon
theusersrolewithintheorganization.Priorityandbandwidthratelimitingmayalso
bedefinedinservices.
•Roles,orbehavioralprofiles,makeupthetoptier.Therolesassign servicestovarious
businessfunctionsordepartments,suchasexecutive,sales,andengineering.
Toenhancesecurity
anddeliveratruepolicybasedinfrastructu re,theEnterasysSecure
Networksmethodologycantakeadvantageofauthenticationmethods,suchas802.1X,
usingEAPTLS,EAPTTLS,orPEAP,aswellasothertypesofauthentication.
Authorizationinformation,attachedtotheauthentication response,determinesthe
applicationofpolicy.Authorizationinformationis
communicatedbymeansofthepolicy
Vista de pagina 26
1 2 ... 22 23 24 25 26 27 28 29 30 31 32 ... 89 90

Comentarios a estos manuales

Sin comentarios