xii
Setting a Port Priority......................................................................................................................15-21
Assigning Port Costs ......................................................................................................................15-22
Adjusting Bridge Protocol Data Unit (BPDU) Intervals ...................................................................15-22
Enabling the Backup Root Function ..................................................................................................... 15-23
Adjusting RSTP Parameters ................................................................................................................ 15-23
Defining Edge Port Status ..............................................................................................................15-24
Configuring MSTP ...................................................................................................................................... 15-24
Example 1: Configuring MSTP for Traffic Segregation ........................................................................ 15-25
Example 2: Configuring MSTP for Maximum Bandwidth Utilization ..................................................... 15-27
Adjusting MSTP Parameters ................................................................................................................ 15-28
Monitoring MSTP ................................................................................................................................. 15-29
Understanding and Configuring SpanGuard .............................................................................................. 15-29
What Is SpanGuard? ............................................................................................................................ 15-29
How Does It Operate? .......................................................................................................................... 15-30
Configuring SpanGuard ....................................................................................................................... 15-30
Reviewing and Setting Edge Port Status........................................................................................15-30
Enabling and Adjusting SpanGuard ...............................................................................................15-30
Monitoring SpanGuard Status and Settings ...................................................................................15-31
Understanding and Configuring Loop Protect ............................................................................................ 15-31
What Is Loop Protect? .......................................................................................................................... 15-31
How Does It Operate? .......................................................................................................................... 15-31
Port Modes and Event Triggers......................................................................................................15-32
Example: Basic Loop Protect Configuration ...................................................................................15-32
..................................................................................................................... Configuring Loop Protect 15-33
Enabling or Disabling Loop Protect ................................................................................................15-34
Specifying Loop Protect Partners...................................................................................................15-34
Setting the Loop Protect Event Threshold and Window.................................................................15-34
Enabling or Disabling Loop Protect Event Notifications .................................................................15-35
Setting the Disputed BPDU Threshold ...........................................................................................15-35
Monitoring Loop Protect Status and Settings .................................................................................15-35
Terms and Definitions ................................................................................................................................. 15-36
Chapter 16: Configuring Policy
Using Policy in Your Network ....................................................................................................................... 16-1
Standard and Enhanced Policy on Enterasys Platforms ........................................................................ 16-2
Implementing Policy ............................................................................................................................... 16-2
Policy Configuration Overview ...................................................................................................................... 16-2
Using the Enterasys NetSight Policy Manager ...................................................................................... 16-2
Understanding Roles in a Secure Network ............................................................................................ 16-3
The Policy Role ................................................................................................................................16-3
Defining Policy Roles ............................................................................................................................. 16-3
Setting a Default VLAN for a Role....................................................................................................16-4
Adding Tagged, Untagged, and Forbidden Ports to the VLAN Egress Lists....................................16-4
Assigning a Class of Service to a Role.............................................................................................16-4
Defining Policy Rules ............................................................................................................................. 16-5
Admin Rules .....................................................................................................................................16-5
Traffic Classification Rules ...............................................................................................................16-5
Applying Policy ....................................................................................................................................... 16-7
Applying a Default Policy..................................................................................................................16-8
Applying Policies Dynamically..........................................................................................................16-8
Blocking Non-Edge Protocols at the Edge Network Layer ...............................................................16-8
Configuring Policy ......................................................................................................................................... 16-9
Policy Configuration Example ..................................................................................................................... 16-12
Roles .................................................................................................................................................... 16-13
Policy Domains .................................................................................................................................... 16-13