Installation guide

Management
1-8 Introduction
Management
Management of the module can be either in-band or out-of-band. In-band remote
management is possible using Telnet, Enterasys Networks’ NetSight
®
management
application, or WebView™ application. Out-of-band management is provided through
the RJ45 COM (Communication) port on the front panel using a VT100 terminal or a
VT100 terminal emulator.
Switch Configuration Using WebView
Enterasys Networks’ HTTP-based Web management application (WebView) is an
intuitive web tool for simple management tasks.
Switch Configuration Using CLI Commands
The CLI commands enable you to perform more complete switch configuration
management tasks.
For CLI command set information and how to configure the module, refer to the Matrix
DFE-Gold Series Configuration Guide.
UPN Support
User Personalized Networks (UPN) is an architecture that allows network administrators
to map network services to identified users, machines, peripherals and other network
entities. UPN consists of three tiers:
Classification rules make up the first or bottom tier. The rules apply to devices in the
UPN environment, such as switches and routers. The rules are designed to be
implemented at or near the users point of entry to the network. The rules are
typically at Layer 2, 3, or 4 of the OSI network model.
The middle tier is Services, which allows multiple classification rules to be
aggregated. Services can include e-mail and Internet access.
Roles, or Behavioral Profiles make up the top tier. The roles assign services to various
business functions or departments, such as executive, sales, and engineering.
To implement most roles, UPN requires authentication such as 802.1X using EAP-TLS,
EAP-TTLS, or EAP-PEAP. Authorization information, attached to the authentication
response, determines the application of the UPN policy. One way to communicate the
authorization information is to include the Policy Name in a RADIUS Filter-ID attribute.
A UPN administrator can also define a role to be implemented in the absence of an
authentication and authorization.
Refer to the release notes shipped with the module for details.
The rules can only be implemented on the Matrix system by the Enterasys NetSight Policy
Manager, which is described on the web site at www.enterasys.com/netsight
.