EasyManua.ls Logo

Enterasys C5G124-24 - Page 14

Enterasys C5G124-24
452 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xii
Setting a Port Priority......................................................................................................................15-21
Assigning Port Costs ......................................................................................................................15-22
Adjusting Bridge Protocol Data Unit (BPDU) Intervals ...................................................................15-22
Enabling the Backup Root Function ..................................................................................................... 15-23
Adjusting RSTP Parameters ................................................................................................................ 15-23
Defining Edge Port Status ..............................................................................................................15-24
Configuring MSTP ...................................................................................................................................... 15-24
Example 1: Configuring MSTP for Traffic Segregation ........................................................................ 15-25
Example 2: Configuring MSTP for Maximum Bandwidth Utilization ..................................................... 15-27
Adjusting MSTP Parameters ................................................................................................................ 15-28
Monitoring MSTP ................................................................................................................................. 15-29
Understanding and Configuring SpanGuard .............................................................................................. 15-29
What Is SpanGuard? ............................................................................................................................ 15-29
How Does It Operate? .......................................................................................................................... 15-30
Configuring SpanGuard ....................................................................................................................... 15-30
Reviewing and Setting Edge Port Status........................................................................................15-30
Enabling and Adjusting SpanGuard ...............................................................................................15-30
Monitoring SpanGuard Status and Settings ...................................................................................15-31
Understanding and Configuring Loop Protect ............................................................................................ 15-31
What Is Loop Protect? .......................................................................................................................... 15-31
How Does It Operate? .......................................................................................................................... 15-31
Port Modes and Event Triggers......................................................................................................15-32
Example: Basic Loop Protect Configuration ...................................................................................15-32
..................................................................................................................... Configuring Loop Protect 15-33
Enabling or Disabling Loop Protect ................................................................................................15-34
Specifying Loop Protect Partners...................................................................................................15-34
Setting the Loop Protect Event Threshold and Window.................................................................15-34
Enabling or Disabling Loop Protect Event Notifications .................................................................15-35
Setting the Disputed BPDU Threshold ...........................................................................................15-35
Monitoring Loop Protect Status and Settings .................................................................................15-35
Terms and Definitions ................................................................................................................................. 15-36
Chapter 16: Configuring Policy
Using Policy in Your Network ....................................................................................................................... 16-1
Standard and Enhanced Policy on Enterasys Platforms ........................................................................ 16-2
Implementing Policy ............................................................................................................................... 16-2
Policy Configuration Overview ...................................................................................................................... 16-2
Using the Enterasys NetSight Policy Manager ...................................................................................... 16-2
Understanding Roles in a Secure Network ............................................................................................ 16-3
The Policy Role ................................................................................................................................16-3
Defining Policy Roles ............................................................................................................................. 16-3
Setting a Default VLAN for a Role....................................................................................................16-4
Adding Tagged, Untagged, and Forbidden Ports to the VLAN Egress Lists....................................16-4
Assigning a Class of Service to a Role.............................................................................................16-4
Defining Policy Rules ............................................................................................................................. 16-5
Admin Rules .....................................................................................................................................16-5
Traffic Classification Rules ...............................................................................................................16-5
Applying Policy ....................................................................................................................................... 16-7
Applying a Default Policy..................................................................................................................16-8
Applying Policies Dynamically..........................................................................................................16-8
Blocking Non-Edge Protocols at the Edge Network Layer ...............................................................16-8
Configuring Policy ......................................................................................................................................... 16-9
Policy Configuration Example ..................................................................................................................... 16-12
Roles .................................................................................................................................................... 16-13
Policy Domains .................................................................................................................................... 16-13

Table of Contents

Other manuals for Enterasys C5G124-24

Related product manuals