Connectivity
Connectivity
7G4202-72
The 7G4202‐72 has 10BASE‐T/100BASE‐TX/1000BASE‐T compliant ports through 72, fixed RJ45
front panel connectors.
7G4282-49
The 7G4282‐49 (Figure
connected through 48, fixed RJ45 front panel connectors. If a NEM is installed, additional
connectors are also available, depending on the NEM model.
Management
Management of the module can be either in‐band or out‐of‐band. In‐band remote management is
possible using Telnet, Enterasys Networks' NetSight
application. Out‐of‐band management is provided through the RJ45 COM (Communication) port
on the front panel using a VT100 terminal or a VT100 terminal emulator.
Switch Configuration Using WebView
Enterasys Networks' HTTP‐based Web management application (WebView) is an intuitive web
tool for simple management tasks.
Switch Configuration Using CLI Commands
The CLI commands enable you to perform more complete switch configuration management
tasks.
For CLI command set information and how to configure the module, refer to the Enterasys Matrix
DFE‐Platinum Series Configuration Guide.
Secure Networks Policy Support
Policy Enabled Networking manages the allocation of networking infrastructure resources in a
secure and effective manner. Using Secure Networks Policy, an IT Administrator can predictably
assign appropriate resources to the Users, Applications, and Services that use the network; while
blocking or containing access for inappropriate or potentially dangerous network traffic. Using
this technology it is possible, for the first time, to align IT services with the needs of specific users
and applications, and to leverage the network as a key component of the organization's security
strategy.
The Secure Networks Policy Architecture consists of 3 components: Classification Rules, Network
Services, and Behavioral Profiles. These are defined as follows:
•
Classification Rules determine how specific traffic flows (identified by Layer 2, Layer 3, and
Layer 4 information in the data packet) are treated by each Switch or Router. In general,
Classification Rules are applied to the networking infrastructure at the network edge/ingress
point.
1-4 Introduction
1‐1) supports up to 48, 10BASE‐T/100BASE‐TX/1000BASE‐T switched ports
®
management application, or WebView™