
Secure Networks Policy Support
DFE-Platinum Series Hardware Installation Guide 1-5
Switch Configuration Using WebView
Enterasys Networks’
HTTP
‐
based
Web
management
application
(WebView)
is
an
intuitive
web
tool
for
simple
management
tasks.
Switch Configuration Using CLI Commands
The
CLI
commands
enable
you
to
perform
more
complete
switch
configuration
management
tasks.
For
CLI
command
set
information
and
how
to
configure
the
module,
refer
to
the
Enterasys
Matrix
DFE
‐
Platinum
Series
Configuration
Guide
.
Secure Networks Policy Support
Policy
Enabled
Networking
manages
the
allocation
of
networking
infrastructure
resources
in
a
secure
and
effective
manner.
Using
Secure
Networks
Policy
,
an
IT
Administrator
can
predictably
assign
appropriate
resources
to
the
Users,
Applications,
and
Services
that
use
the
network;
while
blocking
or
containing
access
for
inappropriate
or
potentially
dangerous
network
traffic.
Using
this
technology
it
is
possible,
for
the
first
time,
to
align
IT
services
with
the
needs
of
specific
users
and
applications,
and
to
leverage
the
network
as
a
key
component
of
the
organization’s
security
strategy.
The
Secure
Networks
Policy
Architecture
consists
of
3
components:
Classification
Rules,
Network
Services,
and
Behavioral
Profiles.
These
are
defined
as
follows:
•
Classification
Rules
determine
how
specific
traffic
flows
(identified
by
Layer
2,
Layer
3,
and
Layer
4
information
in
the
data
packet)
are
treated
by
each
Switch
or
Router.
In
general,
Classification
Rules
are
applied
to
the
networking
infrastructure
at
the
network
edge/ingress
point.
•
Network
Services
are
logical
groups
of
Classification
Rules
that
identify
specific
networked
applications
or
services.
Users
may
be
permitted
or
denied
access
to
these
services
based
on
their
role
within
the
organization.
Priority
and
bandwidth
rate
limiting
may
also
be
controlled
using
Network
Services.
•
Behavioral
Profiles
(or
roles)
are
used
to
assign
Network
Services
to
groups
of
users
who
share
common
needs–for
example
Executive
Managers,
Human
Resources
Personnel,
or
Guest
Users.
Access,
resources,
and
security
restrictions
are
applied
as
appropriate
to
each
Behavioral
Profile.
A
variety
of
authentication
methods
including
802.1X,
EAP
‐
TLS,
EAP
‐
TTLS,
and
PEAP
may
be
used
to
classify
and
authorize
each
individual
user;
and
the
IT
Administrator
may
also
define
a
Behavioral
Profile
to
apply
in
the
absence
of
an
authentication
framework.
Summary of Contents for Matrix 7G4280-19
Page 2: ......
Page 12: ...x...
Page 27: ...LANVIEW Diagnostic LEDs DFE Platinum Series Hardware Installation Guide 1 7...
Page 28: ...LANVIEW Diagnostic LEDs 1 8 Introduction...
Page 64: ...Completing the Installation 3 34 Installation...
Page 80: ...Regulatory Compliance A 8 Specifications...
Page 90: ...Memory Replacement Procedures B 10 Mode Switch Settings and Installing Options...