Installation guide

Management
Matrix DFE-Diamond Series Installation Guide 1-7
Management
Managementofthemodulecanbeeitherinbandoroutofband.Inbandremotemanagementis
possibleusingTelnet,Enterasys Networks’NetSight
®
managementapplication,orWebView
application.OutofbandmanagementisprovidedthroughtheRJ45COM(Communication)port
onthefrontpanelusingaVT100terminaloraVT100terminalemulator.
Switch Configuration Using WebView
Enterasys Networks’HTTPbasedWebmanagementapplication(WebView)isanintuitiveweb
toolforsimplemanagementtasks.
Switch Configuration Using CLI Commands
TheCLIcommandsenableyoutoperformmorecompleteswitchconfigurationmanagement
tasks.
ForCLIcommandsetinformationandhowtoconfigurethemodule,refertotheEnterasysMatrix
DFEDiamond/PlatinumSeriesConfigurationGuide.
Secure Networks Policy Support
AfundamentalconceptthatiskeytotheimplementationoftheEnterasysSecureNetworks
methodologyispolicyenablednetworking.Thisapproachprovidesusersofthenetworkwiththe
resourcestheyneed‐inasecurefashionwhileatthesametimedenyingaccesstoapplicationsor
protocolsthataredeemedinappropriate
basedontheusersfunctionwithintheorganization.By
adoptingsucha“userpersonalized”model,itispossibleforbusinesspoliciestobetheguidelines
inestablishingthetechnologyarchitectureoftheenterprise.Twomajorobjectivesareachievedin
thisway:ITservicesarematchedappropriatelywithindividualusers;and
thenetworkitself
becomesanactiveparticipantintheorganization’ssecuritystrategy.TheSecureNetworks
architectureconsistsofthreetiers:
Classificationrulesmakeupthefirstorbottomtier.TherulesapplytodevicesintheSecure
Networksenvironment,suchasswitchesandrouters.Therulesaredesignedtobe
implemented
atorneartheuserspointofentrytothenetwork.Rulesmaybewrittenbased
oncriteriadefinedintheLayer2,Layer3orLayer4informa tionofthedataframe.
•ThemiddletierisServices,whicharecollectionsofindividualclassificationrules,grouped
logicallytoeitherpermit
ordenyaccesstoprotocolsorapplicationsbasedontheusersrole
withintheorganization.Priorityandbandwidthratelimitingmayalsobedefinedinservices.
•Roles,orbehavioralprofiles,makeupthetoptier.Therolesassignservicestovarious
businessfunctionsordepartments,suchasexecutive,sales,andengineering.
Toenhancesecurityanddeliveratruepolicybasedinfrastructure,theEnterasysSecureNetworks
methodologycantakeadvantageofauthenticationmethods,suchas802.1X,usingEAPTLS,
EAPTTLS,orPEAP,aswellasothertypesofauthentication.Authorizationinformation,attached
totheauthenticationresponse,determinestheapplicationofpolicy.
Authorizationinformationis
communicatedviathepolicynameinaRADIUSFilterIDattribute.Anadministratorcanalso
definearoletobeimplementedintheabsenceofanauthenticationframework.Refertothe
releasenotesshippedwiththemodulefordetails.