Enterasys Matrix 7H4385-49 Installation Guide Page 20

  • Download
  • Add to my manuals
  • Print
  • Page
    / 66
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 19
Connectivity
1-4 Introduction
Connectivity
7G4202-72
The7G420272has10BASET/100BASETX/1000BASETcompliantportsthrough72,fixedRJ45
frontpanelconnectors.
7G4282-49
The7G428249(Figure 11)supportsupto48,10BASET/100BASETX/1000BASETswitchedports
connectedthrough48,fixedRJ45frontpanelconnectors.IfaNEMisinstalled,additional
connectorsarealsoavailable,dependingontheNEMmodel.
Management
Managementofthemodulecanbeeitherinbandoroutofband.Inbandremotemanagementis
possibleusingTelnet,Enterasys Networks’NetSight
®
managementapplication,orWebView
application.OutofbandmanagementisprovidedthroughtheRJ45COM(Communication)port
onthefrontpanelusingaVT100terminaloraVT100terminalemulator.
Switch Configuration Using WebView
Enterasys Networks’HTTPbasedWebmanagementapplication(WebView)isanintuitiveweb
toolforsimplemanagementtasks.
Switch Configuration Using CLI Commands
TheCLIcommandsenableyoutoperformmorecompleteswitchconfigurationmanagement
tasks.
ForCLIcommandsetinformationandhowtoconfigurethemodule,refertotheEnterasysMatrix
DFEPlatinumSeriesConfigurationGuide.
Secure Networks Policy Support
PolicyEnabledNetworkingmanagestheallocationofnetworkinginfrastructureresourcesina
secureandeffectivemanner.UsingSecureNetworksPolicy,anITAdministratorcanpredictably
assignappropriateresourcestotheUsers,Applications,andServicesthatusethenetwork;while
blockingorcontainingaccessforinappropriateorpotentiallydangerousnetworktraffic.
Using
thistechnologyitispossible,forthefirsttime,toalignITserviceswiththeneedsofspecificusers
andapplications,andtoleveragethenetworkasakeycomponentoftheorganization’ssecurity
strategy.
TheSecureNetworksPolicyArchitectureconsistsof3components:ClassificationRules,Network
Services,andBehavioral
Profiles.Thesearedefinedasfollows:
ClassificationRulesdeterminehowspecifictrafficflows(identifiedbyLayer2,Layer3,and
Layer4informationinthedatapacket)aretreatedbyeachSwitch orRouter.Ingeneral,
ClassificationRulesareappliedtothenetworkinginfrastructureatthenetworkedge/ingress
point.
Page view 19
1 2 ... 15 16 17 18 19 20 21 22 23 24 25 ... 65 66

Comments to this Manuals

No comments