Installation guide
Management
Matrix DFE-Diamond Series Installation Guide 1-7
Management
Managementofthemodulecanbeeitherin‐bandorout‐of‐band.In‐bandremotemanagementis
possibleusingTelnet,Enterasys Networks’NetSight
®
managementapplication,orWebView™
application.Out‐of‐bandmanagementisprovidedthroughtheRJ45COM(Communication)port
onthefrontpanelusingaVT100terminaloraVT100terminalemulator.
Switch Configuration Using WebView
Enterasys Networks’HTTP‐basedWebmanagementapplication(WebView)isanintuitiveweb
toolforsimplemanagementtasks.
Switch Configuration Using CLI Commands
TheCLIcommandsenableyoutoperformmorecompleteswitchconfigurationmanagement
tasks.
ForCLIcommandsetinformationandhowtoconfigurethemodule,refertotheEnterasysMatrix
DFE‐Diamond/PlatinumSeriesConfigurationGuide.
Secure Networks Policy Support
AfundamentalconceptthatiskeytotheimplementationoftheEnterasysSecureNetworks
methodologyispolicy‐enablednetworking.Thisapproachprovidesusersofthenetworkwiththe
resourcestheyneed‐inasecurefashion–whileatthesametimedenyingaccesstoapplicationsor
protocolsthataredeemedinappropriate
basedontheuser’sfunctionwithintheorganization.By
adoptingsucha“user‐personalized”model,itispossibleforbusinesspoliciestobetheguidelines
inestablishingthetechnologyarchitectureoftheenterprise.Twomajorobjectivesareachievedin
thisway:ITservicesarematchedappropriatelywithindividualusers;and
thenetworkitself
becomesanactiveparticipantintheorganization’ssecuritystrategy.TheSecureNetworks
architectureconsistsofthreetiers:
• Classificationrulesmakeupthefirstorbottomtier.TherulesapplytodevicesintheSecure
Networksenvironment,suchasswitchesandrouters.Therulesaredesignedtobe
implemented
atorneartheuser’spointofentrytothenetwork.Rulesmaybewrittenbased
oncriteriadefinedintheLayer2,Layer3orLayer4informa tionofthedataframe.
•ThemiddletierisServices,whicharecollectionsofindividualclassificationrules,grouped
logicallytoeitherpermit
ordenyaccesstoprotocolsorapplicationsbasedontheuser’srole
withintheorganization.Priorityandbandwidthratelimitingmayalsobedefinedinservices.
•Roles,orbehavioralprofiles,makeupthetoptier.Therolesassignservicestovarious
businessfunctionsordepartments,suchasexecutive,sales,andengineering.
Toenhancesecurityanddeliveratruepolicy‐basedinfrastructure,theEnterasysSecureNetworks
methodologycantakeadvantageofauthenticationmethods,suchas802.1X,usingEAP‐TLS,
EAP‐TTLS,orPEAP,aswellasothertypesofauthentication.Authorizationinformation,attached
totheauthenticationresponse,determinestheapplicationofpolicy.
Authorizationinformationis
communicatedviathepolicynameinaRADIUSFilter‐IDattribute.Anadministratorcanalso
definearoletobeimplementedintheabsenceofanauthenticationframework.Refertothe
releasenotesshippedwiththemodulefordetails.