Implementation Guide
Page 11
... how to access the management software to begin managing the Switch. ■ Management Interface Reference Guide This guide contains information about the web interface operations and CLI (command line interface) commands that enable you . Supplied in PDF format, this guide contains: ■ A list of the features supported by the Switch ■ A summary of the web interface operations and CLI commands that enable you to manage the Switch. ■ Release Notes These notes provide information about this document to 3Com at: pddtechpubs_comments@3com.com It contains...
... how to access the management software to begin managing the Switch. ■ Management Interface Reference Guide This guide contains information about the web interface operations and CLI (command line interface) commands that enable you . Supplied in PDF format, this guide contains: ■ A list of the features supported by the Switch ■ A summary of the web interface operations and CLI commands that enable you to manage the Switch. ■ Release Notes These notes provide information about this document to 3Com at: pddtechpubs_comments@3com.com It contains...
Implementation Guide
Page 16
...; Dynamic Host Configuration Protocol (DHCP) ■ Auto-IP - Security Your Switch has the following industry standard methods to configure itself with its default IP address 169.254.100.100 if it . uses a device MAC address for authentication against unauthorized users connecting devices to your Switch, please refer to the Management Quick Reference Guide supplied in parallel. controls user access at the network edge by your network: ■ Network Login - disables a port if an unauthorized device transmits data on it...
...; Dynamic Host Configuration Protocol (DHCP) ■ Auto-IP - Security Your Switch has the following industry standard methods to configure itself with its default IP address 169.254.100.100 if it . uses a device MAC address for authentication against unauthorized users connecting devices to your Switch, please refer to the Management Quick Reference Guide supplied in parallel. controls user access at the network edge by your network: ■ Network Login - disables a port if an unauthorized device transmits data on it...
Implementation Guide
Page 19
... of Service (QoS) feature. Quality of Service Traffic prioritization can create other QoS policy profiles and apply them to ensure that high priority data is forwarded through the Switch without being delayed by the Switch to determine if a packet should be forwarded, and which port should transmit the packet if it is given preference over a network. By default, all traffic is an integral part of Service, see Chapter 6 "Using Traffic Prioritization...
... of Service (QoS) feature. Quality of Service Traffic prioritization can create other QoS policy profiles and apply them to ensure that high priority data is forwarded through the Switch without being delayed by the Switch to determine if a packet should be forwarded, and which port should transmit the packet if it is given preference over a network. By default, all traffic is an integral part of Service, see Chapter 6 "Using Traffic Prioritization...
Implementation Guide
Page 23
... users: ■ Increased bandwidth ■ Quicker connections ■ Faster transfer of data ■ Minimized data errors ■ Reduced network downtime For detailed descriptions of the web interface operations and the command line interface (CLI) commands that accompanies your network and improve network performance. If you utilize certain Switch features you can optimize the bandwidth on the CD-ROM that you require to manage the Switch please refer to the Management Interface Reference Guide supplied...
... users: ■ Increased bandwidth ■ Quicker connections ■ Faster transfer of data ■ Minimized data errors ■ Reduced network downtime For detailed descriptions of the web interface operations and the command line interface (CLI) commands that accompanies your network and improve network performance. If you utilize certain Switch features you can optimize the bandwidth on the CD-ROM that you require to manage the Switch please refer to the Management Interface Reference Guide supplied...
Implementation Guide
Page 35
... out the ports that wish to join a multicast group and then sets its filters accordingly Query Mode Query mode allows the Switch to function as the Querier if it belongs. You can enable or disable IGMP query mode for all Switch units in the stack using IGMP (Internet Group Management Protocol) Snooping. Snooping Mode Snooping Mode allows your Switch to forward multicast packets only to which it has the lowest IP address in a network that may...
... out the ports that wish to join a multicast group and then sets its filters accordingly Query Mode Query mode allows the Switch to function as the Querier if it belongs. You can enable or disable IGMP query mode for all Switch units in the stack using IGMP (Internet Group Management Protocol) Snooping. Snooping Mode Snooping Mode allows your Switch to forward multicast packets only to which it has the lowest IP address in a network that may...
Implementation Guide
Page 36
... packet, it sends a report packet back that identifies the multicast group that contain a multicast capable IP router and on the CLI or the web interface. The Switch can be used on all IP-supporting network devices use to the LAN or VLAN. It can enable or disable multicast learning and IGMP querying using the snoopMode command on other IGMP queriers connected to register endstations with the lowest IP address becomes the querier. The Switch 4200...
... packet, it sends a report packet back that identifies the multicast group that contain a multicast capable IP router and on the CLI or the web interface. The Switch can be used on all IP-supporting network devices use to the LAN or VLAN. It can enable or disable multicast learning and IGMP querying using the snoopMode command on other IGMP queriers connected to register endstations with the lowest IP address becomes the querier. The Switch 4200...
Implementation Guide
Page 39
... your network more about STP and the protocol features supported by the Switch that you require to manage the Switch please refer to link failure and also provides a protection from loops - The Spanning Tree Protocol (STP) makes your Switch. an enhanced version of the web interface operations and the command line interface (CLI) commands that provide resilience for your Switch. one of the major causes of broadcast storms. STP is STP? ■ How STP Works ■ Using STP...
... your network more about STP and the protocol features supported by the Switch that you require to manage the Switch please refer to link failure and also provides a protection from loops - The Spanning Tree Protocol (STP) makes your Switch. an enhanced version of the web interface operations and the command line interface (CLI) commands that provide resilience for your Switch. one of the major causes of broadcast storms. STP is STP? ■ How STP Works ■ Using STP...
Implementation Guide
Page 40
... in STP (802.1D) mode. ■ you set Fast Start to use the legacy 802.1D version of Spanning Tree, if required. Rapid Spanning Tree Protocol (RSTP) The Rapid Spanning Tree (RSTP) is default for front panel ports. If you have Fast Start disabled on a port, the Switch will default to sending 802.1D style BPDU's on a Switch to operate in RSTP (802.1w) mode, and other ports, for example those connected to a legacy Switch...
... in STP (802.1D) mode. ■ you set Fast Start to use the legacy 802.1D version of Spanning Tree, if required. Rapid Spanning Tree Protocol (RSTP) The Rapid Spanning Tree (RSTP) is default for front panel ports. If you have Fast Start disabled on a port, the Switch will default to sending 802.1D style BPDU's on a Switch to operate in RSTP (802.1w) mode, and other ports, for example those connected to a legacy Switch...
Implementation Guide
Page 51
... the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to be transferred smoothly and with minimal delay over a network. Traffic prioritization is Traffic Prioritization? For a list of stackable Switches. For more granular prioritization and an enhanced Quality of Service support, other products are available in the 3Com range of the features supported by your Switch, please refer to prioritize traffic. Used by...
... the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to be transferred smoothly and with minimal delay over a network. Traffic prioritization is Traffic Prioritization? For a list of stackable Switches. For more granular prioritization and an enhanced Quality of Service support, other products are available in the 3Com range of the features supported by your Switch, please refer to prioritize traffic. Used by...
Implementation Guide
Page 55
... classifier should receive. 802.1D packets are categorized into the six service levels as shown in the Switch 4200 Family. The Switch 4200 Family supports two types of packet attributes on your Switch using the 3Com Network Supervisor or via the command line interface (CLI). Traffic Prioritization and your Switch 55 How traffic is processed to provide Quality of Service A received packet at the ingress port is checked for its DSCP and IEEE 802...
... classifier should receive. 802.1D packets are categorized into the six service levels as shown in the Switch 4200 Family. The Switch 4200 Family supports two types of packet attributes on your Switch using the 3Com Network Supervisor or via the command line interface (CLI). Traffic Prioritization and your Switch 55 How traffic is processed to provide Quality of Service A received packet at the ingress port is checked for its DSCP and IEEE 802...
Implementation Guide
Page 70
... set up your network. VLAN 1 is handled by the single Switch and therefore untagged connections can be used. All traffic is the default VLAN and already exists. This provides additional security for multiple VLANs across a link. 70 CHAPTER 8: SETTING UP VIRTUAL LANS VLAN Configuration Examples This section contains examples of the Switch belong to VLAN 1, ports 10, 11 and 12 belong to VLAN 2. The example shown in Figure 17: 1 Configure the VLANs Create VLAN 2 on the Switch. Ports...
... set up your network. VLAN 1 is handled by the single Switch and therefore untagged connections can be used. All traffic is the default VLAN and already exists. This provides additional security for multiple VLANs across a link. 70 CHAPTER 8: SETTING UP VIRTUAL LANS VLAN Configuration Examples This section contains examples of the Switch belong to VLAN 1, ports 10, 11 and 12 belong to VLAN 2. The example shown in Figure 17: 1 Configure the VLANs Create VLAN 2 on the Switch. Ports...
Implementation Guide
Page 74
If this default IP address is already in "Automatic Process" on the LAN. You can switch to manual IP configuration at any time using a serial port connection to set to automatic - 74 CHAPTER 9: USING AUTOMATIC IP CONFIGURATION How Your Switch Obtains IP Information You can use one of the following industry standard methods to automatically allocate the Switch IP information: ■ Dynamic Host Configuration Protocol (DHCP) ■ Auto-IP - If...
If this default IP address is already in "Automatic Process" on the LAN. You can switch to manual IP configuration at any time using a serial port connection to set to automatic - 74 CHAPTER 9: USING AUTOMATIC IP CONFIGURATION How Your Switch Obtains IP Information You can use one of the following industry standard methods to automatically allocate the Switch IP information: ■ Dynamic Host Configuration Protocol (DHCP) ■ Auto-IP - If...
Implementation Guide
Page 78
... YOUR NETWORK SECURE Port Security The Switch supports the following port security modes, which you can set for the port then it will transition to the "Learning Off" mode. ■ Network Login When a 802.1X client has been successfully authorized, all network traffic is forwarded through the port without any restrictions. For further information see "What is Disconnect Unauthorized Device (DUD)?" When a port in received packets is used...
... YOUR NETWORK SECURE Port Security The Switch supports the following port security modes, which you can set for the port then it will transition to the "Learning Off" mode. ■ Network Login When a 802.1X client has been successfully authorized, all network traffic is forwarded through the port without any restrictions. For further information see "What is Disconnect Unauthorized Device (DUD)?" When a port in received packets is used...
Implementation Guide
Page 87
... 3Com Web site. It covers the following topics: ■ Configuration Save and Restore ■ Upgrading Management Software For detailed descriptions of your network. You cannot restore the configuration of a single unit in the stack from a remote file. 11 USING SWITCH CONFIGURATION FEATURES This chapter explains the configuration features supported by the Switch that aid ease of use and configuration of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied...
... 3Com Web site. It covers the following topics: ■ Configuration Save and Restore ■ Upgrading Management Software For detailed descriptions of your network. You cannot restore the configuration of a single unit in the stack from a remote file. 11 USING SWITCH CONFIGURATION FEATURES This chapter explains the configuration features supported by the Switch that aid ease of use and configuration of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied...
Implementation Guide
Page 88
... factory default settings before you can restore a configuration onto it. The restore operation will be set up as manual aggregations with manual ports. A manager level user can only be manually placed in the aggregated link. You can reset the Switch using the system control initialize CLI command or the System > Control > Initialize Web interface operation. ■ The configuration can only save operations to all ports and the aggregated links created automatically. or ■ LACP automatic aggregations - Other combinations of the configuration. For example, LACP automatic...
... factory default settings before you can restore a configuration onto it. The restore operation will be set up as manual aggregations with manual ports. A manager level user can only be manually placed in the aggregated link. You can reset the Switch using the system control initialize CLI command or the System > Control > Initialize Web interface operation. ■ The configuration can only save operations to all ports and the aggregated links created automatically. or ■ LACP automatic aggregations - Other combinations of the configuration. For example, LACP automatic...
Implementation Guide
Page 99
Advanced Network Configuration Examples 99 Advanced Network Configuration Examples This section shows some of four Switch 4200 Family units Endstations on 10/100 Mbps connections 1000 Mbps with aggregated links Stack of the features supported by using some network examples that illustrate how you can set up your Switch. this increases the bandwidth available for optimum performance using aggregated links; Figure 23 Network set up to provide resilience Switch 3870 Aggregated Link Server on 1000 Mbps connection with aggregated links Stack of...
Advanced Network Configuration Examples 99 Advanced Network Configuration Examples This section shows some of four Switch 4200 Family units Endstations on 10/100 Mbps connections 1000 Mbps with aggregated links Stack of the features supported by using some network examples that illustrate how you can set up your Switch. this increases the bandwidth available for optimum performance using aggregated links; Figure 23 Network set up to provide resilience Switch 3870 Aggregated Link Server on 1000 Mbps connection with aggregated links Stack of...
Implementation Guide
Page 109
... speed, duplex and flow control. The bandwidth of Ethernet is 10 Mbps, the bandwidth of dynamic entries from the Switch Database which have timed-out and are no longer valid. GLOSSARY 3Com Network The 3Com network management application used as a primary path for transporting traffic between the switches. aging The automatic removal of bandwidth The information capacity, measured in bits per second, that also supports auto-negotiation, the link...
... speed, duplex and flow control. The bandwidth of Ethernet is 10 Mbps, the bandwidth of dynamic entries from the Switch Database which have timed-out and are no longer valid. GLOSSARY 3Com Network The 3Com network management application used as a primary path for transporting traffic between the switches. aging The automatic removal of bandwidth The information capacity, measured in bits per second, that also supports auto-negotiation, the link...
Implementation Guide
Page 115
... feature uses a device MAC address for authentication against a RADIUS server. RPS Redundant Power System. A device that one takes over data transmission should the other fail. POST Power On Self Test. RMON IETF Remote Monitoring MIB. 115 Policy Comprises a set of rules for communication between a network device and a shared authentication server. The rules dictate format, timing, sequencing and error control. Rada Radius Authenticated Device Access. See also main port and standby port. router A router...
... feature uses a device MAC address for authentication against a RADIUS server. RPS Redundant Power System. A device that one takes over data transmission should the other fail. POST Power On Self Test. RMON IETF Remote Monitoring MIB. 115 Policy Comprises a set of rules for communication between a network device and a shared authentication server. The rules dictate format, timing, sequencing and error control. Rada Radius Authenticated Device Access. See also main port and standby port. router A router...
Implementation Guide
Page 116
... part identifies the device on networks. 116 GLOSSARY SAP Service Access Point. A well-defined location that identifies the user of services of network devices that is used for managing devices on . segment A section of a LAN that are similar to shared network services such as defined in the link fails. The Switch offers some predefined standard service levels, for providing fault tolerance on that takes over a serial line (console port) connection...
... part identifies the device on networks. 116 GLOSSARY SAP Service Access Point. A well-defined location that identifies the user of services of network devices that is used for managing devices on . segment A section of a LAN that are similar to shared network services such as defined in the link fails. The Switch offers some predefined standard service levels, for providing fault tolerance on that takes over a serial line (console port) connection...
Implementation Guide
Page 120
... in STP 43 priority levels 802.1D 52 Q QoS apply QoS profile 56 configuring traffic on a Switch 4200 55 creating profiles 56 How traffic is processed to provide QoS 55 service levels 55 traffic classification 55 Quality of network and host 102 example 104 obtaining 102 subnet mask 104 subnetwork portion 104 IP multicast addressing 33 IP routing address classes 103 L learned SDB entries 50 M MAC (Media Access Control) addresses IP address 102 manual configuration...
... in STP 43 priority levels 802.1D 52 Q QoS apply QoS profile 56 configuring traffic on a Switch 4200 55 creating profiles 56 How traffic is processed to provide QoS 55 service levels 55 traffic classification 55 Quality of network and host 102 example 104 obtaining 102 subnet mask 104 subnetwork portion 104 IP multicast addressing 33 IP routing address classes 103 L learned SDB entries 50 M MAC (Media Access Control) addresses IP address 102 manual configuration...