Switch Features Explained
17
9
Log in to the Command Line Interface (CLI) of the Switch 4400 SE unit
that you are upgrading.
10
At the Top-level menu, enter:
system license add
11
Enter the Activation Key for your Upgrade License. Enter
Yes
to confirm
the installation of the license. The Enhanced Software features are now
available on this unit.
If your Switch 4400 SE has additional features enabled by a License Key,
and that Switch fails, you do not need to purchase an additional License
Key. In order to re-use the License Key, when you raise a Return Materials
Authorization (RMA) with 3Com for the failed product, your License Key
will be released and you will be able to re-use it against the replacement
product.
To re-use your License Key, you must re-register it against the
replacement product at the following URL:
http://www.3com.com/register
Switch Features
Explained
The management software provides you with the capability to change the
default state of some of the Switch features. This section provides a brief
overview of these features — their applications are explained in more
detail later in this guide.
For a list of the features supported by your Switch, please refer to the
Management Quick Reference Guide that accompanies your Switch.
Automatic IP
Configuration
Your Switch can have its IP information automatically configured using a
DHCP server, Auto-IP, or BOOTP server. Alternatively, you can manually
configure the IP information.
For more information about how the automatic IP configuration feature
works, see
Chapter 10 “Using Automatic IP Configuration”
.
Port Security
Your Switch has the following port security features, which guard against
unauthorized users connecting devices to your network:
■
Network Login — controls user access at the network edge by
blocking or unblocking access on a per-port basis.
Summary of Contents for 3C17203 - SuperStack 3 Switch 4400
Page 8: ...GLOSSARY INDEX ...
Page 14: ...14 ...
Page 26: ...26 CHAPTER 1 SWITCH FEATURES OVERVIEW ...
Page 44: ...44 CHAPTER 3 USING MULTICAST FILTERING ...
Page 55: ...How STP Works 55 Figure 13 STP configurations ...
Page 58: ...58 CHAPTER 4 USING RESILIENCE FEATURES ...
Page 84: ...84 CHAPTER 7 STATUS MONITORING AND STATISTICS ...
Page 92: ...92 CHAPTER 8 SETTING UP VIRTUAL LANS ...
Page 98: ...98 CHAPTER 9 USING WEBCACHE SUPPORT ...
Page 120: ...120 CHAPTER 12 POWER MANAGEMENT AND CONTROL ...
Page 122: ...122 ...
Page 126: ...126 APPENDIX A CONFIGURATION RULES ...
Page 134: ...134 APPENDIX B NETWORK CONFIGURATION EXAMPLES ...
Page 150: ...150 GLOSSARY ...