Enterasys Networks 4G4282-49, 6H303-48 Standards Compatibility, Secure Networks Policy Support

Page 27

Standards Compatibility

Switch Configuration Using CLI Commands

The CLI commands enable you to perform more complete switch configuration management tasks.

For CLI command set information and how to configure the module, refer to the Matrix DFE‐Gold Series Configuration Guide.

Standards Compatibility

The DFE‐Gold modules are fully compliant with the IEEE 802.3‐2002, 802.3ae‐2002, 802.1D‐1998, and 802.1Q‐1998 standards. The DFE‐Gold modules provide IEEE 802.1D‐ 1998 Spanning Tree Algorithm (STA) support to enhance the overall reliability of the network and protect against “loop” conditions.

Secure Networks Policy Support

A fundamental concept that is key to the implementation of the Enterasys Secure Networks methodology is policy‐enabled networking. This approach provides users of the network with the resources they need—in a secure fashion—while at the same time denying access to applications or protocols that are deemed inappropriate based on the user’s function within the organization. By adopting such a “user‐personalized” model, it is possible for business policies to be the guidelines in establishing the technology architecture of the enterprise. Two major objectives are achieved in this way: IT services are matched appropriately with individual users; and the network itself becomes an active participant in the organization’s security strategy. The Secure Networks architecture consists of three tiers:

Classification rules make up the first or bottom tier. The rules apply to devices in the Secure Networks environment, such as switches and routers. The rules are designed to be implemented at or near the user’s point of entry to the network. Rules may be written based on criteria defined in the Layer 2, Layer 3, or Layer 4 information of the data frame.

The middle tier is Services, which are collections of individual classification rules, grouped logically to either permit or deny access to protocols or applications based on the user’s role within the organization. Priority and bandwidth rate limiting may also be defined in services.

Roles, or behavioral profiles, make up the top tier. The roles assign services to various business functions or departments, such as executive, sales, and engineering.

To enhance security and deliver a true policy‐based infrastructure, the Enterasys Secure Networks methodology can take advantage of authentication methods, such as 802.1X, using EAP‐TLS, EAP‐TTLS, or PEAP, as well as other types of authentication.

Authorization information, attached to the authentication response, determines the application of policy. Authorization information is communicated by means of the policy

Matrix DFE-Gold Series Installation Guide 1-7

Image 27
Contents Enterasys Matrix Page Page Regulatory Compliance Information Electromagnetic Compatibility EMC Supplement to Product Instructions Vcci Notice Safety Information Class 1 Laser Transceivers Enterasys NETWORKS, INC. Firmware License Agreement Viii Page Page Contents Index TroubleshootingAppendix a Specifications Appendix B Mode Switch Bank Settings Optional InstallationsFigures Tables About This Guide Who Should Use This GuideImportant Notice How to Use This Guide Related DocumentsFor Refer to Following conventions are used in this guide Conventions Used in This GuideConventions Used in This Guide Xvi About This Guide For information about Refer to IntroductionDFE-Gold Modules and Interface Options Overview of DFE Series Capabilities4G4282-49 4G4202-724G4202-72 and 4G4282-49 DFE-Gold Modules 7G-6MGBIC and 7G-6MGBIC-A Gigabit Ethernet Interface Modules Switch Configuration Using WebView ConnectivityManagement Switch Configuration Using CLI Commands Standards CompatibilitySecure Networks Policy Support Getting Help Lanview Diagnostic LEDsLink Aggregation Network Requirements10BASE-T Network 100BASE-TX Network1000BASE-SX/LX/ELX Network 1000BASE-T Network 1000BASE-T Network Network Requirements Important Notice InstallationInstalling Optional Network Expansion Modules Contents of DFE-Gold Module Carton QuantityUnpacking the DFE-Gold Module Removing the Coverplate Installing the Network Expansion ModuleInstalling the Network Expansion Module Preparation Installing an Optional Mini-GBICMini-GBIC with MT-RJ Connector InstallationMini-GBIC with LC Connector Removing the Mini-GBIC N5 POE Module Placement and RulesExample 4 -6, D Example 1 -6, aExample 2 -6, B Example 3 -6, CInstalling the DFE Module into a Chassis To install the module, refer to ‐1 and proceed as follows Installing Module into Matrix E7 or N7 ChassisCard guides Installing Module into Matrix N1, N3, or N5 Chassis Installing Module into N1, N3, or N5 Chassis only N3 shown Connecting to the NetworkConnecting UTP Cables DFE RX+ TX+ TX1+ RX1 TX2+ TX3+ RX3 RX2 TX4+ RX4 Connecting Fiber-Optic Cables to Mini-GBICs 13 Cable Connection to MT-RJ Fiber-Optic Connectors 14 Cable Connection to LC Fiber-Optic Connectors What Is Needed Connecting to COM Port for Local ManagementParameter Setting Connecting to an IBM PC or Compatible Device15 Connecting an IBM PC or Compatible Device Connecting to a VT Series Terminal16 Connecting a VT Series Terminal Connecting to a Modem17 Connecting to a Modem RJ45 DB25 Adapter Wiring and Signal AssignmentsCOM Port Adapter Wiring and Signal Diagram RJ45 VT Series Port Adapter Wiring and Signal DiagramCompleting the Installation Completing the Installation of a New SystemModem Port Adapter Wiring and Signal Diagram First-Time Log-In Using a Console Port Connection 18 Matrix DFE Startup Screen Example N7 Chassis Logging in with an Administratively-Configured User Account Troubleshooting Using LanviewAbout the Management Mgmt LED 4G4282-49 Viewing the Receive and Transmit ActivityColor State Recommended Action LEDAmber Alternating 67% on, 33% and off off. Indicates that a Refer to the Matrix DFE-Gold Series Configuration Troubleshooting ChecklistMatrix DFE-Gold Series Configuration Guide for DFE-Gold Module Shutdown ProcedureOFFLINE/RESET Switch Recommended Shutdown Procedure Using OFFLINE/RESET SwitchLast Resort Shutdown Procedure Using OFFLINE/RESET Switch Specifications DFE-Gold Module SpecificationsTable A-1 Specifications Processors/Memory Ethernet Interface Module SpecificationsTable A-3 Mini-GBIC Input/Output Port Specifications Mini-GBIC Input/Output SpecificationsGigabit Ethernet Specifications MGBIC-LC01 / MGBIC-MT01 Specifications 1000BASE-SXMGBIC-LC03 Specifications 1000BASE-LX MGBIC-LC09 Specifications 1000BASE-LX MGBIC-08 Specifications 1000BASE-ELXTable A-10 MGBIC-08 Optical Specifications MGBIC-02 Specifications 1000BASE-T Table A-12 MGBIC-02 SpecificationsTable A-11 MGBIC-08 Operating Range 1550 nm COM Port Pinout Assignments Regulatory ComplianceTable A-14 Compliance Standards Regulatory Compliance Regulatory Compliance Specifications Mode Switch Bank Settings Optional Installations Setting the Mode SwitchesRequired Tools Figure B-1 Mode Switch Location on 4G4202-72 and 4G4282-49 Location of Dram Simm and Dimm Memory Modules Memory Locations and Replacement ProceduresRemoving the Dram Simm Dram Simm Replacement ProcedureFigure B-5 Removing the Existing Dram Simm from 4G4282-49 Figure B-6 Installing the Dram Simm on 4G4282-49 Installing the Dram Simm on 4G4282-49Removing the Dimm Dimm Replacement ProcedureFigure B-8 Installing the Dimm on 4G4202-72 or 4G4282-49 Installing the Dimm on 4G4202-72 or 4G4282-49Numerics IndexIndex-2