<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Security in EXOS (G1 and G2 switches) in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/security-in-exos-g1-and-g2-switches/m-p/24773#M2856</link>
    <description>Hi Jonathan,&lt;BR /&gt;
&lt;BR /&gt;
A lot of the security is built into EXOS which most EXOS versions can run on both the G1s and the G2s. Can you please provide us with an example or a better idea of what you are trying to achieve?</description>
    <pubDate>Sat, 21 Nov 2015 02:04:00 GMT</pubDate>
    <dc:creator>Patrick_Voss</dc:creator>
    <dc:date>2015-11-21T02:04:00Z</dc:date>
    <item>
      <title>Security in EXOS (G1 and G2 switches)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/security-in-exos-g1-and-g2-switches/m-p/24772#M2855</link>
      <description>what kind of security, I can use with G1 and G2 switches?,or,  what can I do with Swith G2 that I can't with G1 switches? &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Sat, 21 Nov 2015 01:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/security-in-exos-g1-and-g2-switches/m-p/24772#M2855</guid>
      <dc:creator>Jonathan_Galdam</dc:creator>
      <dc:date>2015-11-21T01:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: Security in EXOS (G1 and G2 switches)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/security-in-exos-g1-and-g2-switches/m-p/24773#M2856</link>
      <description>Hi Jonathan,&lt;BR /&gt;
&lt;BR /&gt;
A lot of the security is built into EXOS which most EXOS versions can run on both the G1s and the G2s. Can you please provide us with an example or a better idea of what you are trying to achieve?</description>
      <pubDate>Sat, 21 Nov 2015 02:04:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/security-in-exos-g1-and-g2-switches/m-p/24773#M2856</guid>
      <dc:creator>Patrick_Voss</dc:creator>
      <dc:date>2015-11-21T02:04:00Z</dc:date>
    </item>
    <item>
      <title>RE: Security in EXOS (G1 and G2 switches)</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/security-in-exos-g1-and-g2-switches/m-p/24774#M2857</link>
      <description>I know that policy management is not compatible with G1 switches, and I want know what other kind of thing neither are compatible&lt;BR /&gt;
For example: limit the quantity MAC address by port that the switch can learn ( only on G2 switches?&lt;BR /&gt;
&lt;BR /&gt;
anyone have a list of security policy that I can enforce on the switch.?&lt;BR /&gt;
For example &lt;BR /&gt;
1.block mac, &lt;BR /&gt;
2. avoid threat man-in-the-middle&lt;BR /&gt;
3.etc.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Sat, 21 Nov 2015 02:19:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/security-in-exos-g1-and-g2-switches/m-p/24774#M2857</guid>
      <dc:creator>Jonathan_Galdam</dc:creator>
      <dc:date>2015-11-21T02:19:00Z</dc:date>
    </item>
  </channel>
</rss>

