Installation guide

Standards Compatibility
Matrix DFE-Gold Series Installation Guide 1-7
Switch Configuration Using CLI Commands
TheCLIcommandsenableyoutoperformmorecompleteswitchconfiguration
managementtasks.
ForCLIcommandsetinformationandhowtoconfigurethemodule,refertotheMatrix
DFEGoldSeriesConfigurationGuide.
Standards Compatibility
TheDFEGoldmodulesarefullycompliantwiththeIEEE802.32002,802.3ae2002,
802.1D1998,and802.1Q1998standards.TheDFEGoldmodulesprovideIEEE802.1D
1998SpanningTreeAlgorithm(STA)supporttoenhancetheoverallreliabilityofthe
networkandprotectagainst“loop”conditions.
Secure Networks Policy Support
AfundamentalconceptthatiskeytotheimplementationoftheEnterasysSecure
Networksmethodologyispolicyenablednetworking.Thisapproachprovidesusersof
thenetworkwiththeresourcestheyneed—inasecurefashion—whileatthesametime
denyingaccesstoapplicationsorprotocolsthataredeemedinappropriatebasedonthe
usersfunctionwithintheorganization.Byadoptingsucha“userpersonalized”model,it
ispossibleforbusinesspoliciestobetheguidelinesinestablishingthetechnology
architectureoftheenterprise.Twomajorobjectivesareachievedinthisway:ITservices
arematchedappropriatelywithindividualusers;andthenetworkitself
becomesan
activeparticipantintheorganization’ssecuritystrategy.TheSecureNetworks
architectureconsistsofthreetiers:
Classificationrulesmakeupthefirstorbottomtier.Therulesapplytodevicesinthe
SecureNetworksenvironment,suchasswitchesandrouters.Therulesaredesigned
tobeimplementedatornear
theuserspointofentrytothenetwork.Rulesmaybe
writtenbasedoncriteriadefinedintheLayer2,Layer3,orLayer4informationofthe
dataframe.
•ThemiddletierisServices,whicharecollectionsofindividualclassificationrules,
groupedlogicallytoeitherpermit ordenyaccess
toprotocolsorapplicationsbasedon
theusersrolewithintheorganization.Priorityandbandwidthratelimitingmayalso
bedefinedinservices.
•Roles,orbehavioralprofiles,makeupthetoptier.Therolesassign servicestovarious
businessfunctionsordepartments,suchasexecutive,sales,andengineering.
Toenhancesecurity
anddeliveratruepolicybasedinfrastructu re,theEnterasysSecure
Networksmethodologycantakeadvantageofauthenticationmethods,suchas802.1X,
usingEAPTLS,EAPTTLS,orPEAP,aswellasothertypesofauthentication.
Authorizationinformation,attachedtotheauthentication response,determinesthe
applicationofpolicy.Authorizationinformationis
communicatedbymeansofthepolicy