Enterasys C5G124-24 Configuration Manual page 14

Fixed switch platforms
Hide thumbs Also See for C5G124-24:
Table of Contents

Advertisement

Setting a Port Priority...................................................................................................................... 15-21
Assigning Port Costs ...................................................................................................................... 15-22
Adjusting Bridge Protocol Data Unit (BPDU) Intervals ................................................................... 15-22
Enabling the Backup Root Function ..................................................................................................... 15-23
Adjusting RSTP Parameters ................................................................................................................ 15-23
Defining Edge Port Status .............................................................................................................. 15-24
Configuring MSTP ...................................................................................................................................... 15-24
Example 1: Configuring MSTP for Traffic Segregation ........................................................................ 15-25
Example 2: Configuring MSTP for Maximum Bandwidth Utilization ..................................................... 15-27
Adjusting MSTP Parameters ................................................................................................................ 15-28
Monitoring MSTP ................................................................................................................................. 15-29
Understanding and Configuring SpanGuard .............................................................................................. 15-29
What Is SpanGuard? ............................................................................................................................ 15-29
How Does It Operate? .......................................................................................................................... 15-30
Configuring SpanGuard ....................................................................................................................... 15-30
Reviewing and Setting Edge Port Status........................................................................................ 15-30
Enabling and Adjusting SpanGuard ...............................................................................................15-30
Monitoring SpanGuard Status and Settings ................................................................................... 15-31
Understanding and Configuring Loop Protect ............................................................................................ 15-31
What Is Loop Protect? .......................................................................................................................... 15-31
How Does It Operate? .......................................................................................................................... 15-31
Port Modes and Event Triggers...................................................................................................... 15-32
Example: Basic Loop Protect Configuration ................................................................................... 15-32
Enabling or Disabling Loop Protect ................................................................................................ 15-34
Specifying Loop Protect Partners ................................................................................................... 15-34
Setting the Loop Protect Event Threshold and Window ................................................................. 15-34
Enabling or Disabling Loop Protect Event Notifications ................................................................. 15-35
Setting the Disputed BPDU Threshold ........................................................................................... 15-35
Monitoring Loop Protect Status and Settings ................................................................................. 15-35
Terms and Definitions ................................................................................................................................. 15-36
Using Policy in Your Network ....................................................................................................................... 16-1
Standard and Enhanced Policy on Enterasys Platforms ........................................................................ 16-2
Implementing Policy ............................................................................................................................... 16-2
Policy Configuration Overview ...................................................................................................................... 16-2
Using the Enterasys NetSight Policy Manager ...................................................................................... 16-2
Understanding Roles in a Secure Network ............................................................................................ 16-3
The Policy Role ................................................................................................................................ 16-3
Defining Policy Roles ............................................................................................................................. 16-3
Setting a Default VLAN for a Role .................................................................................................... 16-4
Assigning a Class of Service to a Role............................................................................................. 16-4
Defining Policy Rules ............................................................................................................................. 16-5
Admin Rules ..................................................................................................................................... 16-5
Traffic Classification Rules ............................................................................................................... 16-5
Applying Policy ....................................................................................................................................... 16-7
Applying a Default Policy.................................................................................................................. 16-8
Applying Policies Dynamically .......................................................................................................... 16-8
Blocking Non-Edge Protocols at the Edge Network Layer ............................................................... 16-8
Configuring Policy ......................................................................................................................................... 16-9
Policy Configuration Example ..................................................................................................................... 16-12
Roles .................................................................................................................................................... 16-13
Policy Domains .................................................................................................................................... 16-13
xii

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents