Enterasys Matrix N7 7C107 Guia de Instalação Página 25

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
Vista de página 24
Secure Networks Policy Support
Matrix DFE-Platinum Series Installation Guide 1-7
Management
Managementofthemoduleorsystemcanbedoneusingeitherinbandoroutofband
typeofaccess.InbandremotemanagementispossibleusingTelnet,Enterasys Networks’
NetSight
®
managementapplication,orWebViewapplication.Outofbandlocal
managementisprovidedthroughthe RJ45COM(Communication)portonthefrontpanel
usingaVT100terminaloraVT100terminalemulator.
Switch Configuration Using WebView
Enterasys Networks’HTTPbasedWebmanagementapplication(WebView)isan
intuitivewebtoolforsimplemanagementtasks.
Switch Configuration Using CLI Commands
TheCLIcommandsenableyoutoperformmorecompleteswitchconfiguration
managementtasks.
ForCLIcommandsetinformationandhowtoconfigurethemodule,refertotheMatrix
DFEPlatinumSeriesConfigurationGuide.
Secure Networks Policy Support
AfundamentalconceptthatiskeytotheimplementationoftheEnterasysSecure
Networksmethodologyispolicyenablednetworking.Thisapproachprovidesusersof
thenetworkwiththeresourcestheyneed‐inasecurefashionwhileatthesametime
denyingaccesstoapplicationsorprotocolsthataredeemedinappropriate
basedonthe
usersfunctionwithintheorganization.Byadoptingsucha“userpersonalized”model,it
ispossibleforbusinesspoliciestobetheguidelinesinestablishingthetechnology
architectureoftheenterprise.Twomajorobjectivesareachievedinthisway:ITservices
arematchedappropriatelywithindividualusers;and
thenetworkitselfbecomesan
activeparticipantintheorganization’ssecuritystrategy.TheSecureNetworks
architectureconsistsofthreetiers:
Classificationrulesmakeupthefirstorbottomtier.Therulesapplytodevicesin
theSecureNetworksenvironment,suchasswitchesandrouters.Therulesare
designedtobeimplemented
atorneartheuserspointofentrytothenetwork.
RulesmaybewrittenbasedoncriteriadefinedintheLayer2,Layer3orLayer4
informationofthedataframe.
•ThemiddletierisServices,whicharecollectionsofindividualclassificationrules,
groupedlogicallytoeitherpermit
ordenyaccesstoprotocolsorapplications
basedontheusersrolewithintheorganization.Priorityandbandwidthrate
limitingmayalsobedefinedinservices.
•Roles,orbehavioralprofiles,makeupthetoptier.Therolesassignservicesto
variousbusinessfunctionsordepartments,suchasexecutive,sales,and
engineering.
Vista de página 24
1 2 ... 20 21 22 23 24 25 26 27 28 29 30 ... 93 94

Comentários a estes Manuais

Sem comentários