background image

99

Viewing Port Settings

The 

Port Administration Summary Page

 permits the network manager to 

view the current ports configuration. When configuring the port speed 
and port Duplex mode, please note the following: 

Setting the port speed to 10/100/1000 and the Duplex mode to 

Half

 = 

admin speed is = 10/100/1000 half and no advertisement.

Setting the port speed to 10/100/1000 and the Duplex mode to 

Full

 = 

admin speed is = 10/100/1000 full and no advertisement.

Setting the port speed to 10/100/1000 and the Duplex mode to 

Auto

 

= admin speed is = Admin Advertisement = 10/100/1000 

full

 and 

half

.

Setting the port speed to 

Auto 

and Duplex mode to 

Half 

= Admin 

Advertisement = 10+100+1000 half.

Setting the port speed to 

Auto

 and Duplex mode to 

Full

 = Auto - 

Admin Advertisement = 10+100+1000 and 

Full.

Setting the port speed to 10/100/1000 and the Duplex mode to 

Auto

 

= Admin Advertisement = 10/100/1000 

Full

+

Half.

Summary of Contents for 3CDSG10PWR - OfficeConnect Managed Gigabit PoE Switch

Page 1: ...3Com OfficeConnect Managed Gigabit PoE Switch User Guide 3CDSG10PWR www 3Com com Part Number 10016182 Rev AA Published July 2007 ...

Page 2: ...ot to remove or deface any portion of any legend provided on any licensed program or documentation contained in or delivered to you in conjunction with this User Guide Unless otherwise indicated 3Com registered trademarks are registered in the United States and may or may not be registered in other countries 3Com and the 3Com logo are registered trademarks of 3Com Corporation Intel and Pentium are...

Page 3: ...in your network It covers summaries of hardware and software features Using the 3Com Web Interface Provides information for using the Web interface including adding editing and deleting device configuration information Viewing Basic Settings provides information for viewing and configuring essential information required for setting up and maintaining device settings Managing Device Security Provid...

Page 4: ...ping Configuring Spanning Tree Provides information for configuring Classic and Rapid Spanning Tree Configuring SNMP Provides information for configuring the Simple Network Management Protocol SNMP which provides a method for managing network devices Configuring Quality of Service Provides information defining Quality of Service including DSCP and CoS mapping policies and configuring Trust mode Ma...

Page 5: ...om Conventions Table 1 lists conventions that are used throughout this guide Related Documentation In addition to this guide other documentation available for the 3Com OfficeConnect Managed Gigabit PoE Switch include the following Safety and Support Information Provides installation set up and regulatory compliance information Table 1 Notice Icons Icon Notice Type Description Information note Info...

Page 6: ...Setting Up for Management 19 Methods of Managing a Switch 19 Web Interface Management 19 SNMP Management 20 Switch Setup Overview 20 IP Configuration 22 Using the Command Line Interface CLI 23 Connecting to the Console Port 23 Manually set the IP Address using the Console Port 24 Viewing IP Information using the Console Port 25 Setting Up Web Interface Management 27 Web Management Over the Network...

Page 7: ...ETTINGS Viewing Device Settings 46 Viewing Color Keys 48 4 MANAGING DEVICE SECURITY Configuring System Access 50 Viewing System Access Settings 51 Defining System Access 52 Modifying System Access 53 Removing System Access 54 Defining RADIUS Clients 55 Defining Port Based Authentication 802 1X 57 Viewing 802 1X Authentication 58 Defining 802 1X Authentication 60 Defining Access Control Lists 62 Vi...

Page 8: ... 96 Resetting the Device 97 6 CONFIGURING PORTS Viewing Port Settings 99 Defining Port Settings 102 Viewing Port Details 104 7 AGGREGATING PORTS Viewing Link Aggregation 107 Configuring Link Aggregation 107 Modifying Link Aggregation 110 Removing Link Aggregation 112 Viewing LACP 113 Modifying LACP 114 8 CONFIGURING VLANS Viewing VLAN Details 117 Viewing VLAN Port Details 118 Creating VLANs 119 Mo...

Page 9: ...ving Address Table Ports 139 Removing MAC Addresses from the Address Table 141 10 CONFIGURING IGMP SNOOPING Defining IGMP Snooping 144 11 CONFIGURING SPANNING TREE Viewing Spanning Tree 147 Defining Spanning Tree 150 Modifying Spanning Tree 153 12 CONFIGURING SNMP Defining SNMP Communities 156 Removing SNMP Communities 158 Defining SNMP Traps 159 Removing SNMP Traps 160 13 CONFIGURING QUALITY OF S...

Page 10: ...AGING SYSTEM FILES Backing Up System Files 186 Restoring Files 187 Restore the Software Image 188 Activating Image Files 189 15 MANAGING POWER OVER ETHERNET DEVICES Viewing PoE Settings 191 Defining PoE Settings 193 16 MANAGING SYSTEM LOGS Viewing Logs 196 Configuring Logging 197 17 VIEWING STATISTICS Viewing Port Statistics 201 18 MANAGING DEVICE DIAGNOSTICS Configuring Port Mirroring 205 Definin...

Page 11: ...vironmental 215 Physical 215 Electrical 216 Switch Features 216 C PIN OUTS Null Modem Cable 221 PC AT Serial Cable 221 Modem Cable 222 Ethernet Port RJ 45 Pin Assignments 222 D TROUBLESHOOTING Problem Management 224 Troubleshooting Solutions 224 E 3COM CLI REFERENCE GUIDE Getting Started with the Command Line Interface 227 Console Port 227 Logging on to the CLI 227 Automatic Logout 228 Concurrent ...

Page 12: ...OBTAINING SUPPORT FOR YOUR 3COM PRODUCTS Register Your Product to Gain Service Benefits 244 Solve Problems Online 244 Purchase Extended Warranty and Professional Services 244 Access Software Downloads 245 Contact Us 245 Telephone Technical Support and Repair 245 REGULATORY NOTICES ...

Page 13: ...oftware features and also the following topics About the OfficeConnect Managed Gigabit PoE Switch Front Panel Detail LED Status Indicators System Specifications Installing the Switch Setting Up for Management Methods of Managing a Switch Switch Setup Overview Using the Command Line Interface CLI Setting Up Web Interface Management Setting Up SNMP Management V1 or V2 Default Users and Passwords Upg...

Page 14: ...ollowing advantages Full Gigabit speed access ports Jumbo frames support Port security Link aggregation control protocol LACP Up to 256 VLANs Access control lists ACLs Port based mirroring Summary of Hardware Features Table 1 summarizes the hardware features supported by the OfficeConnect Managed Gigabit PoE Switch Table 1 Hardware Features Feature OfficeConnect Managed Gigabit PoE Switch Addresse...

Page 15: ...ion Supported using the IEEE Std 802 ID 1998 Edition Eight traffic queues per port Ethernet Fast Ethernet and Gigabit Ethernet Ports Auto negotiating 10 100 1000BASE T ports SFP Ethernet Ports Supports fiber Gigabit Ethernet long wave LX and fiber Gigabit Ethernet short wave SX transceivers in any combination Mounting Standalone mounting Table 1 Hardware Features continued Feature OfficeConnect Ma...

Page 16: ...he POST OFF The switch is powered off 10 100 1000 BASE T Ethernet port status Link Activity Green The port works at the rate of 1000 Mbps the LED flashes quickly when the port is sending or receiving data Yellow The port works at the rate of 10 100 Mbps the LED flashes quickly when the port is sending or receiving data OFF The port is not connected Duplex mode Duplex Yellow The port is in full dup...

Page 17: ...Gigabit PoE series switch Specification Switch OfficeConnect Managed Gigabit PoE 3CDSG10PWR Physical dimensions H W D 44 330 203 2 mm 1 73 12 99 8 in Weight 2 23 kg 4 91 lb Console port One Console port Gigabit Ethernet ports on the front panel 10 10 100 1000 Mbps Ethernet ports One Gigabit SFP Combo port AC Input voltage Rated voltage range 100 240 VAC 50 60 Hz Power consumption full load 358 4 B...

Page 18: ...sarbeiten verrichten lesen Sie die 3Com Switch Family Safety and Regulatory Information ADVERTENCIA Informacion de seguridad Antes de instalar o extraer cualquier componente del Switch o de realizar tareas de mantenimiento debe leer la informacion de seguridad facilitada en el 3Com Switch Family Safety and Regulatory Information AVVERTENZA Informazioni di sicurezza Prima di installare o rimuovere ...

Page 19: ...ch Switch Setup Overview Manually set the IP Address using the Console Port Viewing IP Information using the Console Port Setting Up Web Interface Management Setting Up SNMP Management V1 or V2 Default Users and Passwords Methods of Managing a Switch To manage your switch you can use one of the following methods Web Interface Management SNMP Management In addition you can use the Command Line Inte...

Page 20: ...om the 3Com website Figure 3 SNMP Management over the Network Refer to Setting Up SNMP Management V1 or V2 on page 28 Switch Setup Overview This section gives an overview of what you need to do to get your switch set up and ready for management when it is in its default state The whole setup process is summarized in Figure 4 Detailed procedural steps are contained in the sections that follow In br...

Page 21: ...ually configure the IP information Connect to the console port and use the Command Line Interface See page 23 How do you want to manage your Switch See page 19 SNMP See page 28 Command Line Interface basic setup only Connect using the console port See page 23 Web Interface Connect over the network See page 28 How do you want to view the automatically configured IP information How do you want to co...

Page 22: ...e Most DHCP servers allow static IP addresses to be configured so that you know what IP address will be allocated to the switch Refer to the documentation that accompanies your DHCP server You should use the automatic IP configuration method if your network uses DHCP to allocate IP information or flexibility is needed If the switch is deployed onto a different subnet it will automatically reconfig...

Page 23: ... 24 Using the Command Line Interface CLI You can access the switch through the Console port to manually set the IP address or to view the IP address that was assigned automatically for example by a DHCP server For more information about the CLI refer to 3Com CLI Reference Guide on page 227 Connecting to the Console Port This section describes how to connect to your switch through the Console port ...

Page 24: ...ve connected the cable The settings must be set to match the default settings for the switch which are 38 400 baud bits per second 8 data bits no parity 1 stop bit no hardware flow control Refer to the documentation that accompanies the terminal emulation software for more information 3 Power up the switch The Power on Self Test POST will be performed The OfficeConnect Managed Gigabit PoE Switch t...

Page 25: ...minate the CLI session The initial setup of your switch is now complete and the switch is ready for you to set up your chosen management method See Methods of Managing a Switch on page 19 Viewing IP Information using the Console Port This section describes how to view the automatically allocated IP information using the command line interface The automatic IP configuration process usually complete...

Page 26: ...9 Bootcode version 1 0 0 12 date 01 Apr 2007 time 17 44 52 Select menu option The initial set up of your switch is now complete and the switch is ready for you to set up your chosen management method See Methods of Managing a Switch on page 19 For more information about the CLI refer to 3Com CLI Reference Guide on page 227 If you do not intend to use the command line interface using the console po...

Page 27: ...y the web interface correctly use one of the following Web browser and platform combinations For the browser to operate the web interface correctly JavaScript and Cascading Style Sheets must be enabled on your browser These features are enabled on a browser by default You will only need to enable them if you have changed your browser settings The switch s Web interface supports both secure HTTPS a...

Page 28: ... IP address of the switch that you wish to manage in the URL locator for example in the following format http xxx xxx xxx xxx 5 At the login and password prompts enter admin as your user name and press Return at the password prompt or the password of your choice if you have already modified the default passwords The main Web interface page is displayed Setting Up SNMP Management V1 or V2 You can u...

Page 29: ...untime application file enter upgrade aaa aaa aaa aaa rrr runtime where aaa aaa aaa aaa is the IP address of the TFTP server and rrr is the source runtime filename 2 To download the bootcode file enter upgrade aaa aaa aaa aaa bbb bootcode where aaa aaa aaa aaa is the IP address of the TFTP server and bbb is the source bootcode filename The bootcode firmware may not require upgrading for every soft...

Page 30: ...provides an introduction to the user interface and includes the following topics Starting the 3Com Web Interface Understanding the 3Com Web Interface Saving the Configuration Resetting the Device Restoring Factory Defaults Logging Off the Device ...

Page 31: ...ead or read write permissions to users for configuring the switch Users and access levels are described in Configuring System Access Login information is always handled in the local database A unique password is required of each user Two access levels exist on the 3Com Web Interface Management access level Provides the user with read write access There is always one management level user configure...

Page 32: ...en an Internet browser 2 Enter the device IP address in the address bar and press Enter The Enter Network Password Page opens Figure 6 Enter Network Password Page 3 Enter your user name and password The device default factory settings is configured with a User Name that is admin and a password that is blank Passwords are case sensitive 4 Click The 3Com Web Interface Home Page opens ...

Page 33: ...ws Tab View Provides the device summary configuration located at the top of the home page Tree View Provides easy navigation through the configurable device features The main branches expand to display the sub features Port Indicators Located under the Device View at the top of the home page the port indicators provide a visual representation of the ports on the front panel ...

Page 34: ...om Web Interface Management Buttons Provides instructions for adding modifying and deleting configuration parameters Table 6 Interface Components View Description 1 Tree View Tree View provides easy navigation through the configurable device features The main branches expand to display the sub features 2 Tab View The Tab Area enables navigation through the different device features Click the tabs ...

Page 35: ...ring ports please refer to Configuring Ports Using the 3Com Web Interface Management Buttons Configuration Management buttons and icons provide an easy method of configuring device information and include the following Table 7 3Com Web Interface Configuration Buttons Button Button Name Description Clear Logs Clears system logs Create Creates configuration entries Apply Applies configuration change...

Page 36: ...contains the following topics Viewing Configuration Information Adding Configuration Information Modifying Configuration Information Removing Configuration Information Viewing Configuration Information To view configuration information 1 Click Port Administration Summary The Port Settings Summary Page opens Figure 10 Port Settings Summary Page ...

Page 37: ...an be added to specific 3Com Web Interface pages by opening the IP Setup Page To configure IP Setup 1 Click Administration IP Setup The IP Setup Page opens Figure 11 IP Setup Page 2 Enter requisite information in the text field 3 Click The IP information is configured and the device is updated ...

Page 38: ...OM WEB INTERFACE Modifying Configuration Information 1 Click Administration System Access Modify The System Access Modify Page opens Figure 12 System Access Modify Page 2 Modify the fields 3 Click The access fields are modified ...

Page 39: ... Configuration Information 1 Click Administration System Access Remove The System Access Remove Page opens Figure 13 System Access Remove Page 2 Select the user account to be deleted 3 Click The user account is deleted and the device is updated ...

Page 40: ...n tab allows the latest configuration to be saved to the flash memory To save the device configuration 1 Click Save Configuration The Save Configuration Page opens Figure 14 Save Configuration Page A message appears The operation will save your configuration Do you wish to continue 2 Click A Configuration is saved to flash memory successful message appears 3 Click The configuration is saved ...

Page 41: ...cation To prevent the current configuration from being lost use the Save Configuration Page to save all user defined changes to the flash memory before resetting the device To reset the device 1 Click Administration Reset The Reset Page opens Figure 15 Reset Page 2 Click A confirmation message is displayed ...

Page 42: ...SING THE 3COM WEB INTERFACE 3 Click The device is reset and a prompt for a user name and password is displayed Figure 16 User Name and Password Page 4 Enter a user name and password to reconnect to the web interface ...

Page 43: ...nistration Reset The Reset Page opens Figure 17 Reset Page The Reset Page contains the following fields Initialize with Current IP Address Resets the device with the factory default settings but maintains the current IP Address Initialize with Default IP Address Resets the device with the factory default settings including the IP Address 2 Click The system is restored to factory defaults ...

Page 44: ...44 CHAPTER 2 USING THE 3COM WEB INTERFACE Logging Off the Device To log off the device 1 Click The Logout Page opens 2 The following message appears 3 Click The 3Com Web Interface Home Page closes ...

Page 45: ...Web Interface Home Page presents a device summary section that provides the system administrator with the option to view essential information required for setting up and maintaining device settings The Device Summary Section contains the following views Viewing Device Settings Viewing Color Keys ...

Page 46: ...y The Device Summary Page opens Figure 18 Device Summary Page The Device Summary Page contains the following fields Product Description Displays the device model number and name System Name Defines the user defined device name The field length is 0 160 characters System Location Defines the location where the system is currently running The field range is 0 160 characters System Contact Defines th...

Page 47: ...e reset The system time is displayed in the following format Days Hours Minutes and Seconds For example 41 days 2 hours 22 minutes and 15 seconds Software Version Displays the installed software version number Boot Version Displays the current boot version running on the device Hardware Version Displays the current hardware version of the device Poll Now Enables polling the ports for port informat...

Page 48: ...ns which are the physical interface used for terminating twisted pair type cable SFP Displays the port status of the Small Form Factor SFP optical transmitter modules that combine transmitter and receiver functions The table includes the color and the port status White Unconnected No link detected Yellow Lower speed on 10 100 1000M port Green Maximum speed 10 100 1000M RJ45 or RJ45 SFP Indicates t...

Page 49: ...g system access defining RADIUS authentication port based authentication and defining access control lists This section includes the following topics Configuring System Access Defining RADIUS Clients Defining Port Based Authentication 802 1X Defining Access Control Lists Enabling Broadcast Storm ...

Page 50: ...nfiguring the switch Login information is managed in the local database A unique password is required of each user Two access levels exist on the 3Com Web Interface Management access level Provides the user with read write access There is always one management level user configured for the switch The factory default user name is admin with no password Monitor access level Provides the user with re...

Page 51: ...Page opens Figure 20 System Access Summary Page The System Access Summary Page contains the following fields User Name Displays the user name The possible predefined field value is Admin Displays the predefined administrative user name Access Level Displays the user access level The lowest user access level is Monitor and the highest is Management Management Provides the user with read and write a...

Page 52: ... opens Figure 21 System Access Setup Page The System Access Setup Page contains the following fields User Name Defines the user name Access Level Defines the user access level The lowest user access level is Monitor and the highest is Management Management Provides users with read and write access rights Monitor Provides users with read access rights Password Defines the user password User passwor...

Page 53: ...ns the following fields User Name Displays the user name Access Level Specifies the user access level The lowest user access level is Monitoring and the highest is Management Management Provides users with read and write access rights Monitor Provides users with read access rights Password Modify Enables modifying a password for an existing user Password Defines the local user password Local user ...

Page 54: ... Page The System Access Remove Page contains the following fields Remove User s Users to be removed can be selected from the list below User Name Displays the user name Access Level Displays the user access level The lowest user access level is Monitoring and the highest is Management Management Provides users with read and write access rights Monitoring Provides users with read access rights 2 Se...

Page 55: ...rameters are not defined the system default values are applied to newly defined RADIUS servers Monitor users have no access to this page To configure the RADIUS client 1 Click Security RADIUS Client Setup The Radius Client Setup Page opens Figure 24 Radius Client Setup Page The Radius Client Setup Page contains the following fields Primary Server Defines the RADIUS Primary Server authentication fi...

Page 56: ...f time in seconds the device waits for an answer from the RADIUS server before retrying the query or switching to the next server Possible field values are 1 30 The default value is 3 Dead Time Defines the default amount of time in minutes that a RADIUS server is bypassed for service requests The range is 0 2000 The default value is 0 Key String Defines the default key string used for authenticati...

Page 57: ...ing system access Supplicants Specifies the host connected to the authenticated port requesting to access the system services Authentication Server Specifies the server that performs the authentication on behalf of the authenticator and indicates whether the supplicant is authorized to access system services Port based authentication creates two access states Controlled Access Permits communicatio...

Page 58: ...erfaces User Name Displays the supplicant user name Admin Port Control Displays the admin port authorization state ForceUnauthorized Indicates that no client has access to the port even if it has 802 1X credentials and supports 802 1X authorization or the port control is Auto but a client has not been authenticated via the port ForceAuthorized Indicates that any client has full access to the port ...

Page 59: ...join the Guest VLAN Periodic Reauthentication Indicates if periodic reauthentication is enabled on the port Enable Periodic reauthentication is enabled on the port Disable Periodic reauthentication is disabled on the port This is the default Reauthentication Period Displays the time span in seconds in which the selected port is reauthenticated The field default is 3600 seconds Authenticator State ...

Page 60: ... Authentication State Specifies if Port Authentication is enabled on the device The possible field values are Enable Enables port based authentication on the device Disable Disables port based authentication on the device This is the default value Authentication Method Specifies the authentication method used for port authentication The possible field values are RADIUS Provides port authentication...

Page 61: ...ce re sends and receives normal traffic without client port based authentication Force Unauthorized Denies the selected interface system access by moving the interface into unauthorized state The device cannot provide authentication services to the client through the interface Guest VLAN Specifies whether the Guest VLAN is enabled on the port The possible field values are Enable Enables using a Gu...

Page 62: ...kets by the source port IP address and wildcard mask Destination Port IP Address and Wildcard Mask Filters the packets by the destination port IP address and wildcard mask ACE Priority Filters the packets by the ACE priority Protocol Filters the packets by the IP protocol DSCP Filters the packets by the DiffServ Code Point DSCP value IP Precedence Filters the packets by the IP Precedence Action In...

Page 63: ...ins the following fields ACL Name Contains a list of the MAC based ACLs Priority Indicates the rule priority which determines which rule is matched to a packet on a first match basis Source Address Indicates the source MAC address Source Mask Indicates the source MAC address Mask Destination Address Indicates the destination MAC address Destination Mask Indicates the destination MAC address Mask V...

Page 64: ...iteria Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meets the ACL criteria and disables the port to which the packet was addressed Ports are reactivated from the Port Administration Setup Page Configuring MAC Based ACLs The MAC Based ACL Setup Page allows the network administrator to create and define rules for MAC based ACLs Monitor users have no access to this page T...

Page 65: ...e is ignored For the source MAC address 00 AB 22 11 33 00 this wildcard mask matches all MAC addresses in the range 00 AB 22 11 33 00 to 00 AB 22 11 33 FF Destination MAC Address Matches the destination MAC address to which packets are addressed to the rule Destination Mask Defines the destination MAC Address wildcard mask Wildcards are used to mask all or part of a destination MAC address Wildcar...

Page 66: ...he ACL criteria Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meets the ACL criteria and disables the port to which the packet was addressed Ports are reactivated from the Port Administration Setup Page To create a new MAC based ACL 1 Select Create ACL 2 Enter the name of the new ACL 3 Click The new ACL is created and the device is updated To define a new MAC based ACL ...

Page 67: ... the ACL to be modified Select Rule Selects the rule to be modified for the selected ACL Modify Priority Defines the rule priority which determines which rule is matched to a packet on a firstmatch basis Source MAC Address Defines the source MAC address to which packets are addressed to the rule Source Mask Defines the source MAC Address wildcard mask Wildcards are used to mask all or part of a so...

Page 68: ...00 00 FF the first five bytes of the MAC are used while the last byte is ignored For the destination MAC address E0 3B 4A C2 CA E2 this wildcard mask matches all MAC addresses in the range E0 3B 4A C2 CA 00 to E0 3B 4A C2 CA FF VLAN ID Matches the packet s VLAN ID to the rule The possible field values are 1 to 4093 CoS Classifies traffic based on the CoS tag value CoS Mask Defines the CoS mask use...

Page 69: ...r removal Remove ACL Enables the ACL to be removed Checkbox unnamed When checked selects the rule for removal The top checkbox is used to select all rules for removal Priority Indicates the rule priority which determines which rule is matched to a packet on a firstmatch basis Source Address Matches the source MAC address to which packets are addressed to the rule Destination Address Matches the de...

Page 70: ...ia Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meets the ACL criteria and disables the port to which the packet was addressed Ports are reactivated from the Port Administration Setup Page To remove MAC based ACLs 1 Select the ACL Name to be deleted 2 Check Remove ACL 3 Click The selected ACL is deleted and the device is updated To remove MAC based ACL rules 1 Select t...

Page 71: ...priority which determines which rule is matched to a packet on a first match basis The possible field values are 1 2147483647 with 1 being the highest priority Protocol Indicates the protocol in the rule to which the packet is matched Destination Port Indicates the destination port that is matched packets Enabled only when TCP or UDP are selected in the Protocol list Source Port Indicates the sour...

Page 72: ...CL forwarding action In addition the port can be shut down a trap can be sent to the network administrator or packet is assigned rate limiting restrictions for forwarding The options are as follows Permit Forwards packets which meet the ACL criteria Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meets the ACL criteria and disables the port to which the packet was address...

Page 73: ...ACL Defines a new user defined IP based ACL Add Rules to ACL Priority Defines the ACL priority ACLs are checked on the first fit basis The ACL priority defines the ACL order in the ACL list Protocol Defines the protocol in the rule to which the packet is matched The possible fields are Select from List Selects a protocol from a list by which packets are matched to the rule Protocol ID Adds user de...

Page 74: ...owledgement field significant The acknowledgement field is the byte number of the next byte that the sender expects to receive from the receiver Psh Push send the data as soon as possible without buffering This is used for interactive traffic Rst Reset the connection This invalidates the sequence numbers and aborts the session between the sender and receiver Syn Synchronize Initial Sequence Number...

Page 75: ... the wildcard mask is 0 0 0 255 the first three bytes of the IP address are matched while the last eight bits are ignored For the source IP address 149 36 184 198 this wildcard mask matches all IP addresses in the range 149 36 184 0 to 149 36 184 255 A wildcard mask must not contain leading zeroes For example a wildcard mask of 010 010 011 010 is invalid but a wildcard mask of 10 10 11 10 is valid...

Page 76: ...on In addition the port can be shut down a trap can be sent to the network administrator or packet is assigned rate limiting restrictions for forwarding The options are as follows Permit Forwards packets which meet the ACL criteria Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meets the ACL criteria and disables the port to which the packet was addressed Ports are react...

Page 77: ... Page The IP Based ACL Modify Page contains the following fields Select ACL Selects the ACL to be modified Select Rule Displays a table of rules and their settings associated with the selected ACL Highlighting a rule allows the user to modify its settings in the Modify Rule section below Modify Rule Priority Defines the ACL priority ACLs are checked on the first fit basis The ACL priority defines ...

Page 78: ...ssible fields are Urg Urgent pointer field significant The urgent pointer points to the sequence number of the octet following the urgent data Ack Acknowledgement field significant The acknowledgement field is the byte number of the next byte that the sender expects to receive from the receiver Psh Push send the data as soon as possible without buffering This is used for interactive traffic Rst Re...

Page 79: ...and which bits are ignored A wildcard mask of 255 255 255 255 indicates that no bit is important A wildcard of 0 0 0 0 indicates that all the bits are important For example if the source IP address 149 36 184 198 and the wildcard mask is 0 0 0 255 the first three bytes of the IP address are matched while the last eight bits are ignored Destination IP Address Matches the destination IP address to w...

Page 80: ...eet the ACL criteria Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meets the ACL criteria and disables the port to which the packet was addressed Ports are reactivated from the Port Administration Setup Page 2 Select an ACL from the Select ACL list 3 Highlight the rule to be modified 4 Modify the fields in the Modify Rule section 5 Click The ACL rule is modified and the...

Page 81: ... to a packet on a first match basis The possible field values are 1 2147483647 Protocol Indicates the protocol in the rule to which the packet is matched Destination Port Displays the TCP UDP destination port Source Port Displays the TCP UDP source port to which the ACL is matched Flag Set Indicates the TCP flag matched to the packet ICMP Type Indicates the ICMP message type for filtering ICMP pac...

Page 82: ... administrator or packet is assigned rate limiting restrictions for forwarding The options are as follows Permit Forwards packets which meet the ACL criteria Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meets the ACL criteria and disables the port to which the packet was addressed Ports are reactivated from the Port Administration Setup Page To remove an IP based ACL 1...

Page 83: ...es To view ACL Binding 1 Click Device ACL ACL Binding Summary The ACL Binding Summary Page opens Figure 35 ACL Binding Summary Page The ACL Binding Summary Page contains the following fields Interface Displays the port or LAG number to which the ACL is bound ACL Name Displays the name of the ACL which is bound to a selected port or LAG ...

Page 84: ...age contains the following fields Select Port s Selects the ports to be configured Bind ACL Assigns an Access Control List to a port or LAG MAC based ACL Displays the MAC based ACL to which the interface is assigned IP based ACL Displays the IP based ACL to which the interface is assigned Select ACL Selects the ACL from a list of previously defined Access Control Lists to which the port or LAG can...

Page 85: ...ing Remove Page opens Figure 37 ACL Binding Remove Page The ACL Binding Remove Page contains the following fields Checkbox unnamed Marks the ACL for removal Interface Displays the port interface to which the ACL is bound ACL Name Displays the name of ACL to be removed from the selected port 2 For each ACL to be removed check the box to the left of the row in the table To remove all ACLs the topmos...

Page 86: ...of an excessive amount of broadcast messages simultaneously transmitted across a network by a single port Forwarded message responses are heaped onto the network straining network resources or causing the network to time out Broadcast Storm is enabled for all Gigabit ports by defining the packet type and the rate the packets are transmitted The system measures the incoming Broadcast and Multicast ...

Page 87: ...warding Broadcast packet types is enabled on the interface Disabled Disables broadcast control on the selected port Broadcast Enables broadcast control on the selected port Broadcast Multicast Enables broadcast and multicast control on the selected port Packet Rate Threshold 3500 1000000 Defines the maximum rate kilobits per second at which unknown packets are forwarded The range is 3 500 1 000 00...

Page 88: ...INFORMATION This section contains information for configuring general system information and includes the following Viewing System Description Defining System Settings Saving the Device Configuration Resetting the Device ...

Page 89: ...age contains the following fields Product Description Displays the device model number and name System Name Defines the user defined device name The field range is 0 160 characters System Location Defines the location where the system is currently running The field range is 0 160 characters System Contact Defines the name of the contact person The field range is 0 160 characters Serial Number Disp...

Page 90: ...ollowing format Days Hours Minutes and Seconds For example 41 days 2 hours 22 minutes and 15 seconds Software Version Displays the installed software version number Boot Version Displays the current boot version running on the device Hardware Version Displays the current hardware version of the device Poll Now Enables polling the ports for port information including speed utilization and port stat...

Page 91: ... Defining System Settings The following section allows system administrators to configure advanced system settings The section includes the following topics Configuring System Name Configuring System Time ...

Page 92: ...ration System Name System Name The System Name Page opens Figure 40 System Name Page The System Name Page includes the following fields System Name Defines the user defined device name The field length is 0 100 characters System Location Defines the location where the system is currently running The field length is 0 100 characters System Contact Defines the name of the contact person The field le...

Page 93: ...m Time 1 Click Administration System Time Setup The System Time Setup Page opens Figure 41 System Time Setup Page The System Time Setup Page contains the following fields Local Settings Hours Sets the hour The field range is 0 23 Minutes Sets the minutes The field range is 0 59 Seconds Sets the seconds The field range is 0 59 Month Sets the month The field range is 1 12 Day Sets the day The field ...

Page 94: ...o EU members and other European countries using the EU standard Other The DST definitions are user defined based on the device locality If Other is selected the From and To fields must be defined Time Set Offset Sets the offset in minutes to be applied to the system time at the beginning and end of DST The default is 60 minutes The field range is 1 1440 From Configures the non recurring time and d...

Page 95: ...time of day at which DST begins every year The field format is HH MM where HH is the 2 digit hour and MM is the 2 digit minute To Configures the recurring time and date on which DST ends every year The fields to set are Day Selects the weekday on which DST ends every year Week Selects the week of the month at which DST ends every year Month Selects the month of the year in which DST ends every yea...

Page 96: ...he flash memory Monitor users have no access to this page To save the device configuration 1 Click Save Configuration The Save Configuration Page opens Figure 42 Save Configuration Page The following message appears The operation will save your configuration Do you wish to continue 2 Click The latest device configuration is saved and the device is updated ...

Page 97: ...opens Figure 43 Reset Page The Reset Page contains the following fields Reset the device by pressing the Reboot button Reboots the device Return the device to factory default by pressing the Initialize button Returns the device to factory defaults The possible values are Initialize with Current IP Address Returns the device to factory defaults but maintains the current IP address Initialize with D...

Page 98: ...6 CONFIGURING PORTS This section contains information for configuring Port Settings and includes the following sections Viewing Port Settings Defining Port Settings Viewing Port Details ...

Page 99: ...the port speed to 10 100 1000 and the Duplex mode to Full admin speed is 10 100 1000 full and no advertisement Setting the port speed to 10 100 1000 and the Duplex mode to Auto admin speed is Admin Advertisement 10 100 1000 full and half Setting the port speed to Auto and Duplex mode to Half Admin Advertisement 10 100 1000 half Setting the port speed to Auto and Duplex mode to Full Auto Admin Adve...

Page 100: ... Indicates whether the port is currently operational or non operational The possible field values are Up Indicates the port is currently operating Down Indicates the port is currently not operating Suspended Indicates the port has been shutdown through a device security option Port Speed Displays the configured rate for the port The port type determines what speed setting options are available Por...

Page 101: ...is set to 10M or 100M or 1000M per second The possible field values are Full The interface supports transmission between the device and its link partner in both directions simultaneously Half The interface supports transmission between the device and the client in only one direction at a time Flow Control Displays the flow control status on the port Operates when the port is in full duplex mode Th...

Page 102: ... Setup Page opens Figure 45 Port Administration Setup Page The Port Administration Setup Page contains the following fields Port State Specifies the port state The possible values are No Change Retains the current port status Enable Enables the port Disable Disables the port Speed Specifies the configured rate for the port The port speed determines what speed setting options are available Port spe...

Page 103: ...irections simultaneously Half The interface supports transmission between the device and the client in only one direction at a time No Change Retains the current port duplex mode Flow Control Specifies the flow control status on the port Operates when the port is in full duplex mode The possible field values are Enable Enables flow control on the port Disable Disables flow control on the port No C...

Page 104: ...46 Port Detail Page The Port Detail Page contains the following fields Select a port Selects a port to display its current settings Port State Indicates the port state The possible field values are Enable Enables the port Disable Disables the port Flow Control Displays the flow control status on the port Operates when the port is in full duplex mode The possible field values are Enable Enables flo...

Page 105: ... currently operating at 1000 Mbps Auto Use to automatically configure the port Duplex Displays the port duplex mode This field is configurable only when auto negotiation is disabled and the port speed is set to 10M or 100M This field cannot be configured on LAGs The possible field values are Auto Use to automatically configure the port Full The interface supports transmission between the device an...

Page 106: ...xisting VLAN tags Auto negotiation mode is not configured on the port The port is in full duplex mode All ports in the LAG have the same ingress filtering and tagged modes All ports in the LAG have the same back pressure and flow control modes All ports in the LAG have the same priority All ports in the LAG have the same transceiver type The device supports up to four LAGs and eight ports in each ...

Page 107: ...gregation Summary Page The Link Aggregation Summary Page includes the following fields Group ID Displays the Link Aggregated Group ID The field range is 1 4 Type Displays the type of link aggregation for the Group ID The possible field values are Static or LACP Ports Displays the member ports included in the specified LAG Configuring Link Aggregation The Link Aggregation Create Page optimizes port...

Page 108: ... ID Defines the group ID The field range is 1 4 Static Selects the link aggregation type to be static LACP Selects the link aggregation type to be LACP Select ports for the new aggregation Selects the ports for which the link aggregation parameters are to be defined The ports are color coded as follows Selected ports Blue Displays a member of the aggregation being created Deselected ports White Di...

Page 109: ...d range is 1 4 Type Displays the type of link aggregation The possible field values are Static or LACP Member Ports Displays the ports configured to the link aggregation 2 Define the fields 3 Click The link aggregation configuration is defined and the device is updated ...

Page 110: ...k Aggregation 1 Click Ports Link Aggregation Modify The Link Aggregation Modify Page opens Figure 49 Link Aggregation Modify Page The Link Aggregation Modify Page includes the following fields Select Aggregation to Modify Selects the Link Aggregation Group ID to modify Select ports to add to aggregation or De select ports to remove from aggregation Allows the network manager to select ports to be ...

Page 111: ...Summary Group ID Displays the Link Aggregated Group ID The field range is 1 4 Type Displays the link aggregation type The possible field values are Static or LACP Member Ports Displays the ports configured to the link aggregation 2 Define the fields 3 Click The link aggregation modified and the application is updated ...

Page 112: ...emove Page includes the following fields Select Aggregation s to Remove Displays the Link Aggregation table Allows selecting LAG IDs to be removed Each row corresponds to a Link Aggregated Group ID The fields in the table are Group ID Displays the Link Aggregated Group ID The field range is 1 4 Type Displays the Link Aggregation type The possible field values are Static or LACP Member Ports Displa...

Page 113: ...Group Protocol LACP LAGs To view LACP for LAGs 1 Click Port LACP Summary The LACP Summary Page opens Figure 51 LACP Summary Page The LACP Summary Page contains the following fields Port Displays the port number to which timeout and priority values are assigned Port Priority Displays the LACP priority value for the port The default is 1 The field range is 1 65535 LACP Timeout Displays the administr...

Page 114: ... Port LACP Modify The LACP Modify Page opens Figure 52 LACP Modify Page The LACP Modify Page contains the following fields LACP System Priority Specifies system priority value The default value is 1 The field range is 1 65535 Select Port Selects the port number to which timeout and priority values are assigned LACP Port Priority Specifies the LACP priority value for the port The default is 1 The f...

Page 115: ...115 2 Define the fields 3 Click The LACP Link Aggregation is modified and the application is updated ...

Page 116: ...er 3 router working at a protocol level is required to allow traffic flow between VLANs Layer 3 routers identify segments and coordinate with VLANs VLANs are Broadcast and Multicast domains Broadcast and Multicast traffic is transmitted only in the VLAN in which the traffic is generated VLAN tagging provides a method of transferring VLAN information between VLAN groups VLAN1is the default VLAN and...

Page 117: ... the following information Select a VLAN to Display Selects a VLAN to be display its settings Membership type Displays the membership type for each VLAN The possible field values are Untagged Indicates the interface is an untagged member of the VLAN Tagged Indicates the interface is a tagged member of a VLAN VLAN tagged frames are forwarded by the interface The frames contain VLAN information Not ...

Page 118: ... VLAN Port Detail Page opens Figure 54 VLAN Port Detail Page The VLAN Port Detail Page contains the following information Select Port Selects the ports to be displayed Untagged membership Indicates the port is an untagged member of the VLAN Tagged membership Indicates the port is a tagged member of a VLAN VLAN tagged frames are forwarded by the interface The frames contain VLAN information ...

Page 119: ...s have no access to this page To create VLANs 1 Click Device VLAN Setup The VLAN Setup Page opens Figure 55 VLAN Setup Page The VLAN Setup Page contains the following fields Create VLAN IDs Defines the VLAN ID s to create Create Creates the VLAN ID s ID Displays the VLAN ID Name Displays the user defined VLAN name ...

Page 120: ...ines the new VLAN name Rename Renames the user defined VLAN name 2 Enter the VLAN ID number s 3 Click The VLAN s are created and the device is updated To rename a VLAN 1 Highlight a VLAN to be renamed from the VLAN list 2 Enter the new name for the VLAN 3 Click The VLAN is renamed and the device is updated ...

Page 121: ...ge The Modify VLAN Page contains the following fields Select a VLAN to modify Selects a VLAN name to modify its settings Rename Renames the VLAN name Select membership type Selects the membership type for each port on the VLAN The possible field values are Untagged Indicates the interface is an untagged member of the VLAN Tagged Indicates the interface is a tagged member of a VLAN VLAN tagged fram...

Page 122: ...to be added to the VLAN Select None Removes the ports selected To rename VLANs 1 Select a VLAN from the list to be renamed 2 Click The VLAN is renamed and the device is updated To add ports to a VLAN 1 Select a VLAN to modify 2 Select the membership type for the selected ports 3 Select ports to be added to the selected VLAN 4 You may select different membership types on multiple ports by repeating...

Page 123: ...ollowing fields Select a Port Selects a port to be modified Select membership type Displays the membership type for each port on the VLAN The possible field values are Untagged Indicates the interface is an untagged member of the VLAN Tagged Indicates the interface is a tagged member of a VLAN VLAN tagged frames are forwarded by the interface The frames contain VLAN information Not available for s...

Page 124: ...istrator to remove VLANs The monitor users have no access to this page To delete VLANs 1 Click Device VLAN Remove The VLAN Remove Page opens Figure 58 VLAN Remove Page The VLAN Remove Page contains the following fields ID Displays the VLAN ID Name Displays the user defined VLAN name Select All Allows the user to select the entire table to be removed 2 Select the VLAN IDs to be deleted 3 Click The ...

Page 125: ...GURING IP AND MAC ADDRESS INFORMATION This section contains information for defining IP interfaces and includes the following sections Defining IP Addressing Configuring ARP Settings Configuring Address Tables ...

Page 126: ...s Figure 59 IP Setup Page The IP Setup Page contains the following fields Configuration Method Defines whether the IP address is configured statically or dynamically The possible field values are Static Specifies that the IP Interface is configured by the user DHCP Specifies that the IP Interface is dynamically created IP Address Defines the IP address Subnet Mask Defines the subnet mask Default G...

Page 127: ...nverts IP addresses into physical addresses and maps the IP address to a MAC address ARP allows a host to communicate with other hosts when only the IP address of its neighbors is known This section includes the following sections Viewing ARP Settings Defining ARP Settings Removing ARP Entries ...

Page 128: ...he ARP Settings Summary Page contains the following fields Interface Indicates the VLAN for which ARP parameters are defined IP Address Indicates the station IP address which is associated with the MAC Address MAC Address Displays the station MAC address which is associated in the ARP table with the IP address Status Displays the ARP table entry type Possible field values are Dynamic Indicates the...

Page 129: ...following fields VLAN Selects the VLAN for which ARP parameters are defined IP Address Defines the station IP address which is associated with the MAC address MAC Address Defines the station MAC address which is associated in the ARP table with the IP address ARP Entry Age Out Specifies the amount of time in seconds that passes between ARP Table entry requests Following the ARP Entry Age period th...

Page 130: ...62 ARP Settings Remove Page The ARP Settings Remove Page contains the following fields Clear ARP Table Entries Specifies the types of ARP entries that are cleared The possible values are None Maintains the ARP entries All Clears all ARP entries Dynamic Clears only dynamic ARP entries Static Clears only static ARP entries Checkbox unnamed Selects the ARP entry for removal Interface Indicates the VL...

Page 131: ...table entry type Possible field values are Dynamic Indicates the ARP entry is learned dynamically Static Indicates the ARP entry is a static entry 2 For each ARP entry to be removed check the box to the left of the row in the table To remove all ARP entries the topmost box may be checked 3 Click The ARP table entries are removed and the device is updated ...

Page 132: ...esses are associated with ports by learning the ports from the frames source address Frames addressed to a destination MAC address that is not associated with any port are flooded to all ports of the relevant VLAN Static addresses are manually configured In order to prevent the bridging table from overflowing dynamic MAC addresses from which no traffic is seen for a certain period are erased This ...

Page 133: ...e Summary Page contains the following fields State Filters the list of MAC addresses displayed according to the type of MAC address configuration Possible values are All Displays all MAC addresses Static Displays the statically configured MAC addresses Dynamic Displays the dynamically configured MAC addresses MAC Address Displays the current MAC addresses listed in the MAC address table filtered b...

Page 134: ...ime Indicates the amount of time the MAC address remains in the MAC address table before it is timed out if no traffic from the source is detected The default value is 300 seconds Viewing Port Summary Settings The Port Summary Page allows the user to view the MAC addresses assigned to specific ports To view Port Summary settings 1 Click Monitoring Address Table Port Summary The Port Summary Page o...

Page 135: ...ss table filtered by the selected value of the State field VLAN ID Displays the VLAN ID associated with the port and MAC address State Displays the MAC address configuration method Possible values are Config Static Indicates the MAC address is statically configured Config Dynamic Indicates the MAC address is dynamically configured Port Index Indicates the port through which the address was learned...

Page 136: ...age opens Figure 65 Address Table Add Page The Address Table Add Page contains the following fields VLAN ID Selects a VLAN ID MAC Address Defines a MAC address to be assigned to the specific port and VLAN ID No Aging Marks the aging status of the MAC address assigned by the user The possible values are Checked Indicates that the Address Table entry assigned by the user is not aged out Unchecked In...

Page 137: ...ossible values are Config Static Indicates the MAC address is statically configured Port Index Indicates the port through which the address was learned Aging Time Indicates the amount of time the MAC address remains in the Dynamic Address table before it is timed out if no traffic from the source is detected The default value is 300 seconds 2 Define the fields 3 Click The MAC address is added to t...

Page 138: ...s 300 seconds The monitor users have no access to this page To define the Aging Time 1 Click Monitoring Address Table Setup The Address Table Setup Page opens Figure 66 Address Table Setup Page The Address Table Setup Page contains the following field Aging Time Defines the amount of time the MAC address remains in the Dynamic Address table before it is timed out if no traffic from the source is d...

Page 139: ...his page To remove ports 1 Click Monitoring Address Table Port Remove The Port Remove Page opens Figure 67 Port Remove Page The Port Remove Page contains the following fields Select a Port Selects the port to remove MAC Address Displays the current MAC addresses listed in the MAC address table for the selected port VLAN ID Displays the VLAN ID associated with the port and MAC address ...

Page 140: ...ough which the address was learned Aging Time Indicates the amount of time the MAC address remains in the Dynamic Address table before it is timed out if no traffic from the source is detected The default value is 300 seconds Select All Selects all ports for removal Select None De selects all ports for removal 2 Select the ports to remove 3 Click The selected ports are removed from the address tab...

Page 141: ...ddress Table 1 Click Monitoring Address Table Remove The Address Table Remove Page opens Figure 68 Address Table Remove Page The Address Table Remove Page contains the following fields MAC Address Displays the current MAC addresses listed in the MAC address table VLAN ID Displays the VLAN ID associated with the port and MAC address State Displays the MAC address configuration method Possible value...

Page 142: ... Dynamic Address table before it is timed out if no traffic from the source is detected The default value is 300 seconds Select All Selects all current MAC addresses in the table for removal Select None De selects all current MAC addresses in the table for removal 2 Select the MAC addresses to remove 3 Click The selected MAC addresses are removed from the address table and the device is updated ...

Page 143: ...hich ports want to join which Multicast groups Which ports have Multicast routers generating IGMP queries Which routing protocols are forwarding packets and Multicast traffic Ports requesting to join a specific Multicast group issue an IGMP report specifying that Multicast group is accepting members This results in the creation of the Multicast filtering database This section contains the followin...

Page 144: ...ping Setup Page The IGMP Snooping Setup Page contains the following fields IGMP Snooping Status Defines whether IGMP Snooping is enabled on the device The possible field values are Disable Indicates that IGMP Snooping is disabled on the device This is the default value Enable Indicates that IGMP Snooping is enabled on the device Select VLAN ID Specifies the VLAN ID IGMP Status Defines whether IGMP...

Page 145: ... 1 Select Enable or Disable from the IGMP Snooping Status list 2 Click IGMP Snooping is enabled or disabled on the device and the device is updated To enable or disable IGMP Snooping on a selected VLAN 1 Enable IGMP Snooping on the device 2 Select the VLAN ID from the Select VLAN ID list 3 Select Enable or Disable from the IGMP Status list 4 Click IGMP Snooping is enabled or disabled on the VLAN a...

Page 146: ...id Spanning Tree Protocol RSTP detects and uses network topologies that allow a faster STP convergence without creating forwarding loops The device supports the following STP versions Classic STP Provides a single path between end stations avoiding and eliminating loops Rapid STP Detects and uses network topologies that provide faster convergence of the spanning tree without creating forwarding lo...

Page 147: ...terface for which the information is displayed STP Indicates if STP is enabled on the port The possible field values are Enable Indicates that STP is enabled on the port Disable Indicates that STP is disabled on the port Port Fast Indicates if Fast Link is enabled on the port If Fast Link mode is enabled for a port the port is automatically placed in the Forwarding state when the port link is up F...

Page 148: ...de The port cannot forward traffic however it can learn new MAC addresses Forwarding Indicates that the port is in Forwarding mode The port can forward traffic and learn new MAC addresses Discarding Indicates that the port is in Discarding mode The port is listening to BPDUs and discards any other frames it receives Port Role Displays the port role assigned by the STP algorithm to provide to STP p...

Page 149: ... The possible field values are Auto Enables the device to establish automatically point to point link Point to Point Indicates if a point to point link is currently established on the port Ports set to Full Duplex modes are considered Point to Point port links Shared Enables the device to establish a shared link Designated Bridge ID Indicates the bridge priority and the MAC Address of the designat...

Page 150: ...o configure Spanning Tree Setup 1 Click Device Spanning Tree Setup The Spanning Tree Setup Page opens Figure 71 Spanning Tree Setup Page The Spanning Tree Setup Page contains the following fields Global Settings Spanning Tree State Defines whether STP is enabled on the device The possible field values are Disable Disables STP and RSTP on the device Classic Enables STP on the device RSTP Enables RS...

Page 151: ... Age or Forward Delay Bridge Settings Priority Specifies the bridge priority value When switches or bridges are running STP each is assigned a priority After exchanging BPDUs the device with the lowest priority value becomes the Root Bridge The field range is 0 61440 The default value is 32768 The port priority value is provided in increments of 4096 Hello Time Specifies the device Hello Time The ...

Page 152: ...e Root Bridge The default is zero Root Path Cost Indicates the cost of the path from this bridge to the Root Bridge Topology Changes Counts Indicates the total amount of STP state changes that have occurred Last Topology Change Indicates the amount of time that has elapsed since the bridge was initialized or reset and the last topographic change that occurred The time is displayed in a day hour mi...

Page 153: ...lowing fields STP Specifies if STP is enabled on the port The possible field values are Enable Indicates that STP is enabled on the port Disable Indicates that STP is disabled on the port Port Fast Specifies if Fast Link is enabled on the port If Fast Link mode is enabled for a port the port is automatically placed in the Forwarding state when the port link is up Fast Link optimizes the STP protoc...

Page 154: ... used to forward traffic when a path is re routed The field range is 1 200 000 000 Priority Defines the priority value of the port The priority value influences the port choice when a bridge has two ports connected in a loop The priority value is between 0 240 The priority value is determined in increments of 16 RSTP Link Type Specifies whether a Point to Point link is established or if the device...

Page 155: ...of variables which are used to manage the device The variables are defined in the Management Information Base MIB The SNMP agent defines the MIB specification format as well as the format used to access the information over the network Access rights to the SNMP agents are controlled by access strings This section contains the following topics Defining SNMP Communities Removing SNMP Communities Def...

Page 156: ...d only for SNMP v1 and SNMP v2c Monitor users have no access to this page To define SNMP communities 1 Click Administration SNMP Communities Setup The SNMP Communities Setup Page opens Figure 73 SNMP Communities Setup Page The SNMP Communities Setup Page contains the following fields SNMP Status Specifies if SNMP is enabled on the device The possible field values are Enable Enables SNMP on the dev...

Page 157: ...e defined public community string name private Displays the pre defined private community string name User Defined Defines a user defined community string name Access Mode Defines the access rights of the community The possible field values are Read Only Management access is restricted to read only and changes cannot be made to the community Read Write Management access is read write and changes c...

Page 158: ...nities Remove Page opens Figure 74 SNMP Communities Remove Page The SNMP Communities Remove Page contains the following fields Checkbox unnamed When checked selects an SNMP community for removal The top checkbox is used to select all SNMP communities for removal Management Station Displays the management station IP address for which the SNMP community is defined Community String Displays the user ...

Page 159: ...mmunity to be removed check the box to the left of the row in the table To remove all SNMP Communities the topmost box may be checked 3 Click The SNMP Communities are removed and the device is updated Defining SNMP Traps The SNMP Traps Setup Page contains information for defining filters that determine whether traps are sent to specific users and the trap type sent Monitor users have no access to ...

Page 160: ...field values are SNMP V1 Indicates that SNMP Version 1 traps are sent SNMP V2c Indicates that SNMP Version 2 traps are sent 2 Define the relevant fields 3 Click The SNMP Traps are defined and the device is updated Removing SNMP Traps The SNMP Traps Remove Page allows the network manager to remove SNMP Traps Monitor users have no access to this page To remove SNMP traps 1 Click Administration SNMP ...

Page 161: ... are sent Trap Displays the trap type The possible field values are SNMP V1 Indicates that SNMP Version 1 traps are sent SNMP V2c Indicates that SNMP Version 2 traps are sent Community String Displays the community string of the trap manager 2 For each SNMP trap to be removed check the box to the left of the row in the table To remove all SNMP traps the topmost box may be checked 3 Click The SNMP ...

Page 162: ...ic management where packets are forwarded are based on packet information and packet field values such as VLAN Priority Tag VPT and DiffServ Code Point DSCP VPT Classification Information VLAN Priority Tags VPT are used to classify packets by mapping packets to one of the egress queues VPT to Queue assignments are user definable Packets arriving untagged are assigned a default VPT value which is s...

Page 163: ...CoS Summary The CoS Summary Page opens Figure 77 CoS Summary Page The CoS Summary Page contains the following fields Interface Displays the interface for which the CoS default value is defined Default CoS Displays the default CoS value for incoming packets for which a VLAN priority tag is not defined The possible field values are 0 7 ...

Page 164: ...ns the following fields QoS Mode Specifies if QoS is enabled on the device The possible values are Disable Disables QoS on the device Enable Enables QoS on the device Select Port s Selects the ports to be configured Set Default Sets the default user priority The possible field values are 0 7 where 0 is the lowest and 7 is the highest priority Restore Default Restores the device factory defaults fo...

Page 165: ...the traffic forwarding queue to which the CoS priority is mapped Four traffic priority queues are supported Defining CoS to Queue The CoS to Queue Setup Page contains fields for mapping CoS values to traffic queues Four traffic priority queues are supported on the device with 1 representing the lowest queue and four as the highest The highest priority queue functions with strict priority while que...

Page 166: ...owing fields Restore Defaults Restores the device factory defaults for mapping CoS values to a forwarding queue Class of Service Specifies the CoS priority tag values where 0 is the lowest and 7 is the highest Queue Defines the traffic forwarding queue to which the CoS priority is mapped 2 Define the queue number in the Queue field next to the required CoS value 3 Click The CoS value is mapped to ...

Page 167: ... to queue 4 To view the DSCP Queue 1 Click Device QoS DSCP to Queue Summary The DSCP to Queue Summary Page opens Figure 81 DSCP to Queue Summary Page The DSCP to Queue Summary Page contains the following fields DSCP Displays the incoming packet s DSCP value Queue Indicates the traffic forwarding queue to which the DSCP priority is mapped Four traffic priority queues are supported ...

Page 168: ...to Queue Setup Page opens Figure 82 DSCP to Queue Setup Page The DSCP to Queue Setup Page contains the following fields Restore Defaults Restores the device factory defaults for mapping DSCP values to a traffic forwarding queue DSCP Displays the incoming packet s DSCP value Queue Specifies the traffic forwarding queue to which the DSCP priority is mapped Four traffic priority queues are supported ...

Page 169: ...ket fields to use for classifying packets entering the device When no rules are defined the traffic containing the predefined packet CoS field is mapped according to the relevant trust modes table Traffic not containing a predefined packet field is mapped to best effort The possible Trust Mode field values are CoS Classifies traffic based on the CoS tag value DSCP Classifies traffic based on the D...

Page 170: ...h Summary Page contains the following fields Interface Displays the interface for which rate limit and shaping parameters are defined Ingress Rate Limit Status Indicates the ingress rate limiting status on the interface The possible field values are Enable Ingress rate limiting is enabled on the interface Disable Ingress rate limiting is disabled on the interface This is the default Rate Limit Ind...

Page 171: ...haping is enabled for the interface Disable Egress traffic shaping is disabled for the interface This is the default CIR Indicates the Committed Information Rate CIR for the interface The field range is 64 1 000 000 000 kbits per second CbS Indicates the Committed Burst Size CbS for the interface The field range is 4096 16 769 020 bytes per second ...

Page 172: ...erface shaping type is selected in the Bandwidth Setup Page The monitor user has no access to this page To configure Bandwidth Settings 1 Click Device QoS Bandwidth Setup The Bandwidth Setup Page opens Figure 85 Bandwidth Setup Page The Bandwidth Setup Page contains the following fields Ingress Rate Limit Enable Ingress Rate Limit Enables setting an Ingress Rate Limit Ingress Rate Limit Defines th...

Page 173: ...ce The field range is 64 1 000 000 000 kbits per second Committed Burst Size CbS Defines the CbS for the interface The field range is 4096 16 769 020 bytes per second Select ports Selects the ports to be configured 2 Select the ports to be configured 3 Define the fields 4 Click The bandwidth is defined for the selected ports and the device is updated ...

Page 174: ...ality of voice does not deteriorate if the IP traffic is received unevenly The system supports one Voice VLAN There are two operational modes for IP Phones IP phones are configured with VLAN mode as enabled ensuring that tagged packets are used for all communications If the IP phone s VLAN mode is disabled the phone uses untagged packets The phone uses untagged packets while retrieving the initial...

Page 175: ...e possible field values are Enable Voice VLAN is enabled on the device Disable Voice VLAN is disabled on the device This is the default value Voice VLAN ID Indicates the Voice VLAN ID number Voice VLAN Aging Time Indicates the amount of time after the last IP phone s OUI is aged out for a specific port The Voice VLAN aging time starts after the MAC Address is aged out from the Dynamic MAC Address ...

Page 176: ...up Page provides information for enabling and defining Voice VLAN globally on the device To configure Voice VLAN Settings 1 Click Device QoS VoIP Traffic Setting Setup The Voice VLAN Setup Page opens Figure 87 Voice VLAN Setup Page The Voice VLAN Setup Page contains the following fields Voice VLAN Status Enables or disables Voice VLAN is enabled on the device The possible field values are Enable E...

Page 177: ...is 1 day The possible fields are Day The field range is 0 30 Hour The field range is 0 23 Minute The field range is 0 59 2 Select Enable in the Voice VLAN State field 3 Define the Voice VLAN and Voice VLAN Aging Time fields 4 Click The Voice VLAN is defined and the device is updated Defining Voice VLAN Port Settings The Voice VLAN Port Setup Page contains information for defining Voice VLAN port L...

Page 178: ...e only in Manual mode Voice VLAN Port Security Specifies if port security is enabled on the Voice VLAN Port security ensures that packets arriving with an unrecognized MAC address are dropped No Changes Maintains the current Voice VLAN port security settings Enable Enables port security on the Voice VLAN Disable Disables port security on the Voice VLAN This is the default value Select Port Enables...

Page 179: ... an unrecognized MAC address are dropped No Changes Maintains the current Voice VLAN port security settings Enable Enables port security on the Voice VLAN Disable Disables port security on the Voice VLAN This is the default value Voice VLAN Port Mode Displays the Voice VLAN mode The possible field values are No Changes Maintains the current Voice VLAN port settings This is the default value None I...

Page 180: ...ed in the text box Viewing the OUI Summaries The Voice VLAN OUI Summary Page lists the Organizationally Unique Identifiers OUIs associated with the Voice VLAN The first three bytes of the MAC Address contain a manufacturer identifier While the last three bytes contain a unique station ID Using the OUI network managers can add specific manufacturer s MAC addresses to the OUI table Once the OUIs are...

Page 181: ... List Telephony OUI s Lists the OUIs currently enabled on the Voice VLAN The following OUIs are enabled by default 00 E0 BB Assigned to 3Com IP Phones 00 03 6B Assigned to Cisco IP Phones 00 E0 75 Assigned to Polycom Veritel IP Phones 00 D0 1E Assigned to Pingtel IP Phones 00 01 E3 Assigned to Siemens IP Phones 00 60 B9 Assigned to NEC Philips IP Phones 00 0F E2 Assigned to H3C IP Phones Descripti...

Page 182: ...can add a specific manufacturer s MAC addresses to the OUI table Once the OUIs are added all traffic received on the Voice VLAN ports from the specific IP phone with a listed OUI is forwarded on the voice VLAN To modify Voice VLAN OUI Settings 1 Click Device QoS VoIP Traffic Setting OUI Modify The Voice VLAN OUI Modify Page opens Figure 91 Voice VLAN OUI Modify Page The Voice VLAN OUI Modify Page ...

Page 183: ... 183 2 Enter an OUI in the Telephony OUI field 3 Enter an OUI description in the Description field 4 Click to define a new OUI or click to delete an existing OUI The Voice VLAN table is modified and the device is updated ...

Page 184: ...ands in the Startup file are copied to the Running Configuration File and applied to the device During the session all new commands entered are added to the commands existing in the Running Configuration file Commands are not overwritten To update the Startup file before powering down the device the Running Configuration file must be copied to the Startup Configuration file by clicking on the Save...

Page 185: ...n for defining File maintenance and includes both configuration file management as well as device access This section contains the following topics Backing Up System Files Restoring Files Restore the Software Image Activating Image Files ...

Page 186: ...kup Page The Backup Page contains the following fields Upload via TFTP Enables initiating an upload to the TFTP server Upload via HTTP Enables initiating an upload to the HTTP server or HTTPS server Configuration Upload TFTP Server IP Address Specifies the TFTP Server IP Address to which the configuration files are uploaded Destination File Name Specifies the destination file to which the configur...

Page 187: ...wing fields Download via TFTP Enables initiating a download from the TFTP server Download via HTTP Enables initiating a download from the HTTP server or HTTPS server Configuration Download TFTP Server IP Address Specifies the TFTP Server IP Address from which the configuration files are downloaded Source File Name Specifies the source file from which the configuration file is downloaded 2 Define t...

Page 188: ... Figure 94 Restore Image Page The Restore Image Page contains the following fields Download via TFTP Enables initiating a download via the TFTP server Download via HTTP Enables initiating a download via the HTTP server or HTTPS server Software Download TFTP Server IP Address Specifies the TFTP Server IP Address from which the image files are downloaded Source File Name Specifies the image files to...

Page 189: ... opens Figure 95 Active Image Page The Active Image Page contains the following fields Active Image After Reset Selects the image file which is active on the unit after the device is reset The possible field values are Current Image Activates the current image after the device is reset Backup Image Activates backup image after the device is reset 2 Select the active image to be activated after res...

Page 190: ...ext to power sources Power over Ethernet can be used with IP Phones Wireless Access Points IP Gateways PDAs Audio and video remote monitoring Powered Devices are devices which receive power from the device power supplies for example IP phones Powered Devices are connected to the device via Ethernet ports This section contains information for configuring PoE Settings and includes the following topi...

Page 191: ...ary Page displays the following information Device Power Display State Indicates the inline power source status The possible field values are On Indicates that the power supply unit is functioning Off Indicates that the power supply unit is not functioning Faulty Indicates that the power supply unit is functioning but an error has occurred For example a power overload or a short circuit Power Max ...

Page 192: ...the port number State Indicates if the port is enabled to deliver power to powered devices The possible field values are Enabled Indicates the device is delivering power This is the default Disabled Indicates the device is not delivering power Mode Indicates the port power mode The possible field values are Auto Power is automatically allocated to the port according to port number Lower numbered p...

Page 193: ... port PoE state The possible values are Enabled Enables the port for PoE Disabled Disables the port for PoE PoE Mode for selected enabled ports Defines the PoE mode for the selected port The possible values are Auto Power is automatically allocated to the port according to port number Lower numbered ports are assigned a higher priority for power delivery Guarantee Power is guaranteed to the select...

Page 194: ...e field values are Enabled or Disabled Mode Indicates the port power mode The possible field values are Auto or Guarantee Power Max watts Indicates the maximum amount of power available to the interface The field value is displayed in Watts Power Used watts Indicates the actual amount of power currently used by the interface The field value is displayed in Watts 2 Define the fields 3 Click The set...

Page 195: ...es to be filtered based on their urgency or relevancy Each message severity determines the set of event logging devices that are sent per each event message The following table lists the log severity levels This section includes the following topics Viewing Logs Configuring Logging System Log Severity Levels Severity Level Message Emergency Highest 0 The system is not functioning Alert 1 The syste...

Page 196: ...ging Display The Logging Display Page opens Figure 98 Logging Display Page The Logging Display Page contains the following fields and buttons Save Preview Saves the displayed Log table to a web html page Clear Logs Deletes all logs from the Log table Log Time Displays the time at which the log was generated Severity Displays the log severity Description Displays the log message text 2 Click The se...

Page 197: ...contains fields for enabling logs globally and parameters for defining logs Log messages are listed from the highest severity to the lowest severity level The monitor users have no access to this page To define Log Parameters 1 Click Administration Logging Setup The Logging Setup Page opens Figure 99 Logging Setup Page ...

Page 198: ...rgency log message is saved to the specified logging location Alert The second highest warning level An alert log is saved if there is a serious device malfunction for example all device features are down Critical The third highest warning level A critical log is saved if a critical device malfunction occurs for example two device ports are not functioning while the rest of the device ports remain...

Page 199: ...or example all device features are down Critical The third highest warning level A critical log is saved if a critical device malfunction occurs for example two device ports are not functioning while the rest of the device ports remain functional Error A device error has occurred for example if a single port is offline Warning The lowest level of a device warning The device is functioning but an o...

Page 200: ...17 VIEWING STATISTICS This section contains information for viewing port statistics and contains the following topics Viewing Port Statistics ...

Page 201: ...ary Page contains the following fields Select Port Selects the specific port for which RMON statistics are displayed Refresh Rate Defines the amount of time that passes before the interface statistics are refreshed The possible field values are No Refresh Indicates that the port statistics are not refreshed 15 Sec Indicates that the port statistics are refreshed every 15 seconds 30 Sec Indicates t...

Page 202: ... octets received on the interface since the device was last refreshed Oversize Packets Displays the number of oversized packets over 9216 octets received on the interface since the device was last refreshed Fragments Displays the number of fragments packets with less than 64 octets excluding framing bits but including FCS octets received on the interface since the device was last refreshed Jabbers...

Page 203: ...e the device was last refreshed Frames of 512 to 1023 Bytes Displays the number of 512 to 1023 byte frames received on the interface since the device was last refreshed Frames of 1024 to 9216 Bytes Displays the number of 1024 to 9216 byte frames received on the interface since the device was last refreshed 2 Select a port The port statistics are displayed 3 Click The port statistics counters are c...

Page 204: ... MANAGING DEVICE DIAGNOSTICS This section contains information for viewing and configuring port and cable diagnostics and includes the following topics Configuring Port Mirroring Viewing Cable Diagnostics ...

Page 205: ...ing port Port mirroring can be used as a diagnostic tool as well as a debugging feature Port mirroring also enables switch performance monitoring Network administrators can configure port mirroring by selecting a specific port from which to copy all packets and other ports to which the packets copied This section contains the following topics Defining Port Mirroring Removing Port Mirroring ...

Page 206: ... The Port Mirroring Setup Page contains the following fields Select port type Defines the port that will be the monitor port destination port and the port that will be mirrored source port The possible values are Monitor Defines the port as the monitor port the destination port Mirror Defines the port as the mirrored port source port to be monitored and indicates the traffic direction to be monito...

Page 207: ...d mirror ports The fields displayed are Monitor Displays the monitor port Mirror In Displays ports that are monitored on the RX Mirror Out Displays ports that are monitored on the TX 2 Select a port type 3 If the Mirror port type has been selected select Mirror In and or Mirror Out 4 Select the ports to be monitored 5 Click Port mirroring is enabled and the device is updated ...

Page 208: ...ort mirroring 1 Click Monitoring Port Mirroring Remove The Port Mirroring Remove Page opens Figure 102 Port Mirroring Remove Page The Port Mirroring Remove Page contains the following fields Monitor Displays the monitor port Mirror In Displays ports that are monitored on the RX Mirror Out Displays ports that are monitored on the TX 2 Select the ports to be removed 3 Click Port mirroring is removed...

Page 209: ...The monitor users have limited access to this page To view cables diagnostics 1 Click Monitoring Cable Diagnostics Summary The Cable Diagnostics Summary Page opens Figure 103 Cable Diagnostics Summary Page The Cable Diagnostics Summary Page contains the following fields Port Indicates the port to which the cable is connected Test Result Displays the cable test results Possible values are No Cable ...

Page 210: ...d in the cable the last time a cable test was performed and the type of cable error which occurred The tests use Time Domain Reflectometry TDR technology to test the quality and characteristics of a copper cable attached to a port When performing cable tests consider the following During the tests ports are in the down state The minimum cable length resolution is one meter so if the cable is short...

Page 211: ...connected to the port or the cable is connected on only one side or the cable is shorter than 1 meter Short Cable Indicates that a short has occurred in the cable OK Indicates that the cable passed the test Cable Fault Distance Indicates the distance in meters from the port where the cable error occurred A Cable Fault Distance of 0M can result from a short 1 meter cable an open cable or a 2 pair c...

Page 212: ...Com Network Supervisor 3Com Network Supervisor 3NS is an easy to use management application that graphically discovers maps and monitors the network and links It maps devices and connections so you can easily Monitor stress levels Set thresholds and alerts View network events Generate reports in user defined formats Launch embedded device configuration tools 3NS is configured with intelligent defa...

Page 213: ...ork Director can help you manage your 3Com network and to download a trial version go to www 3com com 3nd 3Com Network Access Manager 3Com Network Access Manager is installed seamlessly into Microsoft Active Directory and Internet Authentication Service IAS It simplifies the task of securing the network perimeter by allowing the administrator to easily control network access directly from the User...

Page 214: ...vely managed These include SNMP capable devices such as switches routers security switches the 3Com VCX IP Telephony server and wireless access points Up to 250 devices Up to 1 000 devices Up to 5 000 devices An unlimited number of devices To find out more about 3Com Enterprise Management Suite go to www 3com com ems Integration Kit with HP OpenView Network Node Manager 3Com Integration Kit for HP...

Page 215: ...idging Safety UL 60950 1 EN 60950 1 CSA 22 2 No 60950 1 IEC 60950 1 EMC Emissions EN55022 Class A CISPR 22 Class A FCC Part 15 Subpart B Class A ICES 003 Class A VCCI Class A EN61000 3 2 EN61000 3 3 EMC Immunity EN55024 Operating Temperature 0 to 40 C 32 to 104 F Storage Temperature 40 to 70 C 40 to 158 F Humidity 0 95 non condensing Standard EN 60068 IEC 68 Width 330 mm 12 99 in Depth 203 2 mm 8 ...

Page 216: ...rtise their abilities Acknowledge receipt and understanding of the common modes of operation that both devices share Reject the use of operational modes that are not shared by both devices Configure each port for the highest level operational mode that both ports can support Automatic MAC Addresses Aging MAC addresses from which no traffic is received for a given period are aged out This prevents ...

Page 217: ...anslated to 192 87 56 2 DNS servers maintain domain name databases and their corresponding IP addresses Fast Link STP can take up to 30 60 seconds to converge During this time STP detects possible loops allowing time for status changes to propagate and for relevant devices to respond 30 60 seconds is considered too long of a response time for many applications The Fast Link option bypasses this de...

Page 218: ...he relevant ports MDI MDIX Support The device automatically detects whether the cable connected to an RJ 45 port is crossed or straight through when auto negotiation is enabled Standard wiring for end stations is Media Dependent Interface MDI and the standard wiring for hubs and switches is known as Media Dependent Interface with Crossover MDIX Password Management Password management provides incr...

Page 219: ...s 1 and 2 Simple Network Management Protocol SNMP over the UDP IP protocol controls access to the system Spanning Tree Protocol 802 1d Spanning tree is a standard Layer 2 switch requirement that allows bridges to automatically prevent and resolve L2 forwarding loops Switches exchange configuration messages using specifically formatted frames and selectively enable and disable forwarding on ports S...

Page 220: ...sharing common attributes can be grouped in the same VLAN Web based Management With web based management the system can be managed from any web browser The system contains a Web Server which serves HTML pages through which the system can be monitored and configured The system internally converts web based input into configuration commands MIB variable settings and other management related settings...

Page 221: ... PC Terminal Cable connector 25 pin male female only required if screen always required required for handshake Screen DTR TxD RxD CTS Ground DSR RTS DCD Screen DCD RxD TxD DTR Ground DSR RTS CTS Shell 4 3 2 8 5 6 7 1 Shell 1 2 3 4 5 6 7 8 Switch 5500 Cable connector RJ 45 female PC AT Serial Port Cable connector 9 pin female only required if screen Always required always required required for hand...

Page 222: ... 7 8 6 5 1 4 1 2 3 4 5 6 7 8 20 Switch 5500 Cable connector RJ 45 female RS 232 Modem Port Cable connector 25 pin male Pin Number 10 100 1000 Ports configured as MDI 1 Transmit Data Bidirectional Data A 2 Transmit Data Bidirectional Data A 3 Receive Data Bidirectional Data B 4 Not assigned Bidirectional Data C 5 Not assigned Bidirectional Data C 6 Receive Data Bidirectional Data B 7 Not assigned B...

Page 223: ...ured as MDIX 1 Receive Data Bidirectional Data B 2 Receive Data Bidirectional Data B 3 Transmit Data Bidirectional Data A 4 Not assigned Bidirectional Data A 5 Not assigned Bidirectional Data D 6 Transmit Data Bidirectional Data D 7 Not assigned Bidirectional Data C 8 Not assigned Bidirectional Data C ...

Page 224: ...em is detected and what are the possible causes of the problem With the problem known the effect of the problem is recorded with all known results from the problem Once the problem is quantified the solution is applied Solutions are found either in this chapter or through customer support If no solution is found in this chapter contact Customer Support Troubleshooting Solutions Listed below are so...

Page 225: ...l cable Software settings Replace the serial cable Replace serial cable for a pin to pin straight flat cable Reconfigure the emulation software connection settings Response from the terminal emulations software is not readable Faulty serial cable Software settings Replace the serial cable Reconfigure the emulation software connection settings Self test exceeds 15 seconds The device may not be corr...

Page 226: ...r optical cable connection is reversed Bad cable Wrong cable type Check pinout and replace if necessary Change if necessary Check Rx and Tx on fiber optic cable Replace with a tested cable Verify that all 10 Mbps connections use a Cat 5 cable Check the port LED or zoom screen in the NMS application and change setting if necessary Lost Password Contact 3Com Problems Possible Cause Solution ...

Page 227: ...h to the serial port of the terminal or computer running the terminal emulation application 2 Set the baud rate to 38400 3 Set the data format to 8 data bits 1 stop bit and no parity 4 Set Flow Control to none 5 Under Properties select VT100 for Emulation mode 6 Select Terminal keys for Function Arrow and Ctrl keys Ensure that the setting is for Terminal keys not Windows keys Logging on to the CLI...

Page 228: ...c Logout The user session is automatically terminated after 30 minutes in which no device configuration activity has occurred The following message is displayed Concurrent CLI Sessions The command line interface supports one CLI session CLI Commands This Command section contains the following commands Ping Summary ipSetup Upgrade Initialize Reboot Logout Password Password Select menu option Incorr...

Page 229: ...user guidelines for this command Example The following displays the list presented for the command Select menu option initialize ipsetup logout ping reboot summary upgrade Reset the device to factory default and reboot Configures IP address Logout from this session Send echo messages Power cycles the device Summarizes IP setup and software versions Software upgrade over TFTP ...

Page 230: ...e no user guidelines for this command Example The following displays current IP configuration and software versions running on the device Select menu option ping 10 6 150 75 Pinging 10 6 150 75 with 32 bytes of data Reply from 10 6 150 75 bytes 32 time 1ms TTL 128 Reply from 10 6 150 75 bytes 32 time 1ms TTL 128 Reply from 10 6 150 75 bytes 32 time 1ms TTL 128 Reply from 10 6 150 75 bytes 32 time ...

Page 231: ...tax summary Default Configuration This command has no default configuration User Guidelines There are no user guidelines for this command Example The following displays current IP configuration and software versions running on the device Select menu option IP Method IP address Subnet mask Default gateway Runtime version Bootcode version Summary Manual 1 2 3 4 255 255 255 0 4 3 2 1 example1 ext exa...

Page 232: ...ault gateway are configured manually by the user Range 0 0 0 0 223 255 255 255 Default Configuration No default IP address is defined for interfaces User Guidelines IP Addresses configured beyond the range of 224 0 0 0 are defined as multicast experimental or broadcast addresses If a default gateway is configured manually the IP address and mask are required to be the same as the gateway address a...

Page 233: ... to be downloaded The possible values are runtime Downloads the runtime software application file bootcode Downloads the bootcode software file Default Configuration This command has no default configuration User Guidelines During the upgrade process a series of dots appear representing the upgrade process in the CLI interface When the upgrade process is completed the command prompt reappears The ...

Page 234: ...Configuration This command has no default configuration User Guidelines The system prompts for confirmation of the request If no response is entered within 15 seconds timeout occurs and the command is not executed Example Select menu option initialize WARNING This command initializes the system to factory defaults and causes a reset Do you wish to continue Y N N N Select menu option ...

Page 235: ...le of the device Syntax reboot Default Configuration This command has no default configuration User Guidelines There are no user guidelines for this command Example Select menu option reboot Are you sure you want to reboot the system yes no no no Select menu option ...

Page 236: ...t The Logout command terminates the CLI session Syntax logout Default Configuration This command has no default configuration User Guidelines There are no user guidelines for this command Example Select menu option logout exiting session Username ...

Page 237: ...mand has no default configuration User Guidelines The user needs to login to the session in order to change the password Example Select menu option password Change password for user username Old password Enter new password Retype password The command line interface password has been successfully changed Select menu option ...

Page 238: ...g them in the appropriate output queue Data is transmitted from the queues using weighted round robin service to enforce priority service and prevent blockage of lower level queues Priority may be set according to the port default the packet s priority bit in the VLAN tag TCP UDP port number IP Precedence bit or DSCP priority bit Differentiated Services Code Point Service DSCP DSCP uses a six bit ...

Page 239: ...s switched networks IEEE 802 1p An IEEE standard for providing quality of service QoS in Ethernet networks The standard uses packet tags that define up to eight traffic classes and allows switches to transmit packets based on the tagged priority value IEEE 802 1s An IEEE standard for the Multiple Spanning Tree Protocol MSTP which provides independent spanning trees for VLAN groups IEEE 802 1X Port...

Page 240: ... routine traffic The eight values are mapped one to one to the Class of Service categories by default but may be configured differently to suit the requirements for specific network applications Layer 2 Data Link layer in the ISO 7 Layer Data Communications Protocol This is related directly to the hardware interface for network devices and passes on traffic based on MAC addresses Layer 3 Network l...

Page 241: ...ANs Private VLANs provide port based security and isolation between ports within the assigned VLAN Data traffic on downlink ports can only be forwarded to and from uplink ports Protected Extensible Authentication Protocol PEAP A protocol proposed by Microsoft Cisco and RSA Security for securely transporting authentication data including passwords over 802 11 wireless networks Like the competing st...

Page 242: ...te of transmission cost RIP 2 is a compatible upgrade to RIP It adds useful capabilities for subnet routing authentication and multicast transmissions Simple Network Management Protocol SNMP The application protocol in the Internet suite of protocols which offers network management services Spanning Tree Protocol STP A technology that checks your network for any loops A loop can often occur in com...

Page 243: ... LAN VLAN A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network A VLAN serves as a logical workgroup with no physical barriers and allows users to share information and resources as though located on the same LAN XModem A protocol used to transfer files between devices Data is grouped in 128 byte...

Page 244: ... Helps you to troubleshoot 3Com products This query based interactive tool is located at http knowledgebase 3com com It contains thousands of technical solutions written by 3Com support engineers Purchase Extended Warranty and Professional Services To enhance response times or extend your warranty benefits you can purchase value added services such as 24x7 telephone technical support software upgr...

Page 245: ...es cover feature enhancements incremental functionality and bug fixes but they do not include software that is released by 3Com as a separately ordered product Separately orderable software releases and licenses are listed in the 3Com Price List and are available for purchase from your 3Com reseller Contact Us 3Com offers telephone internet and e mail access to technical support and repair service...

Page 246: ...0 or 029003078 800 810 0504 800 616 1463 080 698 0880 00801 444 318 001 800 441 2152 Pakistan Call the U S direct by dialing 00 800 01001 then dialing 800 763 6780 Sri Lanka Call the U S direct by dialing 02 430 430 then dialing 800 763 6780 Vietnam Call the U S direct by dialing 1 201 0288 then dialing 800 763 6780 You can also obtain non urgent support in this region at this email address apr_te...

Page 247: ...12 AT T 800 998 2112 AT T 800 998 2112 1 800 998 2112 AT T 800 998 2112 AT T 800 998 2112 Guatemala Haiti Honduras Jamaica Martinique Mexico Nicaragua Panama Paraguay Peru Puerto Rico Salvador Trinidad and Tobago Uruguay Venezuela Virgin Islands AT T 800 998 2112 57 1 657 0888 AT T 800 998 2112 1 800 998 2112 571 657 0888 01 800 849CARE AT T 800 998 2112 AT T 800 998 2112 54 11 4894 1888 AT T 800 ...

Page 248: ... circuits If necessary the user should consult the dealer or an experienced radio television technician for additional suggestions The user may find the following booklet prepared by the Federal Communications Commission helpful How to Identify and Resolve Radio TV Interference Problems This booklet is available from the U S Government Printing Office Washington DC 20402 Stock No 004 000 00345 4 I...

Reviews: