User Guide
Page 7
...Overview 1-1 2 Configuration Through the Web Interface 2-1 Web-Based Network Management Operating Environment 2-1 Logging In to the Web Interface 2-1 Default Login Information 2-1 Example 2-2 Logging Out of the Web Interface 2-3 Introduction to the Web Interface 2-3 Web User Level 2-4 Introduction...the Configuration Environment 3-1 Setting Terminal Parameters 3-2 Logging In to the CLI 3-6 CLI Commands 3-6 initialize 3-6 ipsetup 3-7 password 3-8 ping 3-8 quit 3-9 reboot 3-9 summary 3-10 upgrade 3-11 Configuration Example for Upgrading the Host Software Through the CLI 3-12 i
...Overview 1-1 2 Configuration Through the Web Interface 2-1 Web-Based Network Management Operating Environment 2-1 Logging In to the Web Interface 2-1 Default Login Information 2-1 Example 2-2 Logging Out of the Web Interface 2-3 Introduction to the Web Interface 2-3 Web User Level 2-4 Introduction...the Configuration Environment 3-1 Setting Terminal Parameters 3-2 Logging In to the CLI 3-6 CLI Commands 3-6 initialize 3-6 ipsetup 3-7 password 3-8 ping 3-8 quit 3-9 reboot 3-9 summary 3-10 upgrade 3-11 Configuration Example for Upgrading the Host Software Through the CLI 3-12 i
User Guide
Page 9
...Web Interface Web-Based Network Management Operating Environment 3Com provides the Web-based network management function to the Web Interface Default Login Information The device is provided with the default Web login information. You can use the default information to log in to the network, ... network devices through the Web-based configuration interfaces. Table 2-1 The default Web login information Information needed at login Username Password IP address of the device (VLAN-interface 1) Default value admin None Default IP address of the device, depending on the right of the network...
...Web Interface Web-Based Network Management Operating Environment 3Com provides the Web-based network management function to the Web Interface Default Login Information The device is provided with the default Web login information. You can use the default information to log in to the network, ... network devices through the Web-based configuration interfaces. Table 2-1 The default Web login information Information needed at login Username Password IP address of the device (VLAN-interface 1) Default value admin None Default IP address of the device, depending on the right of the network...
User Guide
Page 10
... through the Web interface. You can communicate with each other properly. summary Select menu option: IP Method: IP address: Summary DHCP 10.153.96.86 Subnet mask: Default gateway: 255.255.255.0 0.0.0.0 Example Assuming that the PC and device can log in Figure 2-3. z Connect the device to a...belong to VLAN 1). z Configure an IP address for example, 169.254.147.1. Input the username admin and the verification code, leave the password blank, select the language (English and Chinese are supported at present), and click Login. 2-2 On the PC, open the browser (it is...
... through the Web interface. You can communicate with each other properly. summary Select menu option: IP Method: IP address: Summary DHCP 10.153.96.86 Subnet mask: Default gateway: 255.255.255.0 0.0.0.0 Example Assuming that the PC and device can log in Figure 2-3. z Connect the device to a...belong to VLAN 1). z Configure an IP address for example, 169.254.147.1. Input the username admin and the verification code, leave the password blank, select the language (English and Chinese are supported at present), and click Login. 2-2 On the PC, open the browser (it is...
User Guide
Page 14
... a specified time Monitor interval. Management Management Remove Remove an FTP or a Telnet user. Configure Initialize Restore the factory default settings. Configure Alarm View, create, modify, and clear alarm entries. Remove a port mirroring group. Configure Flow Interval ...the current access level to the management level. Display, create, modify, and remove the port traffic threshold. Monitor Super Password Configure a password for collecting traffic statistics on interfaces. Create, modify, delete, and enable/disable a port, and clear port statistics....
... a specified time Monitor interval. Management Management Remove Remove an FTP or a Telnet user. Configure Initialize Restore the factory default settings. Configure Alarm View, create, modify, and clear alarm entries. Remove a port mirroring group. Configure Flow Interval ...the current access level to the management level. Display, create, modify, and remove the port traffic threshold. Monitor Super Password Configure a password for collecting traffic statistics on interfaces. Create, modify, delete, and enable/disable a port, and clear port statistics....
User Guide
Page 28
... through DHCP or manual configuration ipsetup { dhcp | ip address ip-address { mask | mask-length } [ default-gateway ip-address ] } Modify the login password of a user password Download the Boot ROM program or boot file from the upgrade server-address source-filename TFTP server and specify it ...run the main configuration file reboot View the summary information of CLI commands on the device ? The default user name for first time configuration is admin, no password is invalid, the following commands: To do... CLI Commands This Command section contains the following message ...
... through DHCP or manual configuration ipsetup { dhcp | ip address ip-address { mask | mask-length } [ default-gateway ip-address ] } Modify the login password of a user password Download the Boot ROM program or boot file from the upgrade server-address source-filename TFTP server and specify it ...run the main configuration file reboot View the summary information of CLI commands on the device ? The default user name for first time configuration is admin, no password is invalid, the following commands: To do... CLI Commands This Command section contains the following message ...
User Guide
Page 44
...is configured for a stack and no stack is not a stack port. By default, a port is established. Displaying Device Summary of a Stack Before viewing the control panel of the master device that the username, password, and access right you must ensure that connects to configure an IRF stack.... Optional Log in Table 1-1 to the master device or another slave device as stack ports. By default, a port is not a stack port. Optional ...
...is configured for a stack and no stack is not a stack port. By default, a port is established. Displaying Device Summary of a Stack Before viewing the control panel of the master device that the username, password, and access right you must ensure that connects to configure an IRF stack.... Optional Log in Table 1-1 to the master device or another slave device as stack ports. By default, a port is not a stack port. Optional ...
User Guide
Page 362
...sends an EAP-Failure packet to grant the access request of the RADIUS server. By default, if two consecutive handshake attempts end up with failure, the device concludes that the ...the authentication server considers the user valid and sends to the device a RADIUS Access-Accept packet. 10) Upon receiving the RADIUS Access-Accept packet, the device opens the port to the client. ...9) When receiving the RADIUS Access-Request packet, the RADIUS server compares the password information encapsulated in the packet with CHAP authentication. 1-7 After the client gets online, the device...
...sends an EAP-Failure packet to grant the access request of the RADIUS server. By default, if two consecutive handshake attempts end up with failure, the device concludes that the ...the authentication server considers the user valid and sends to the device a RADIUS Access-Accept packet. 10) Upon receiving the RADIUS Access-Accept packet, the device opens the port to the client. ...9) When receiving the RADIUS Access-Request packet, the RADIUS server compares the password information encapsulated in the packet with CHAP authentication. 1-7 After the client gets online, the device...
User Guide
Page 365
...carry tags. Table 1-2 802.1X configuration procedure Task Configuring 802.1X Globally Configuring 802.1X on the device. Required Enable 802.1X authentication on a port. 1-10 z With a Hybrid port, you have configured the assigned VLAN to carry tags after the VLAN has been assigned. z With a Hybrid port, the VLAN ...and defining access rights. You can change the access rights of controlling access to the authorization ACLs. z For remote RADIUS authentication, the username and password information must be configured on the device. By default, 802.1X authentication is disabled globally.
...carry tags. Table 1-2 802.1X configuration procedure Task Configuring 802.1X Globally Configuring 802.1X on the device. Required Enable 802.1X authentication on a port. 1-10 z With a Hybrid port, you have configured the assigned VLAN to carry tags after the VLAN has been assigned. z With a Hybrid port, the VLAN ...and defining access rights. You can change the access rights of controlling access to the authorization ACLs. z For remote RADIUS authentication, the username and password information must be configured on the device. By default, 802.1X authentication is disabled globally.
User Guide
Page 386
... Configuration. In a networking scenario with multiple ISPs, an access device may have different user attributes (such as username and password structure, service type, and rights), you need to configure ISP domains to the default ISP domain. It is often used in Table 1-1 to an ISP domain. If a user does not provide the...
... Configuration. In a networking scenario with multiple ISPs, an access device may have different user attributes (such as username and password structure, service type, and rights), you need to configure ISP domains to the default ISP domain. It is often used in Table 1-1 to an ISP domain. If a user does not provide the...
User Guide
Page 408
On the RADIUS server (an iMC server, using the default port for authentication and accounting), the Telnet user's username and password and the shared key expert have been configured for packet exchange with the RADIUS server as expert, and configure the system to remove ...From the navigation tree, select Authentication > RADIUS. Table 1-6 Relationship between the real-time accounting interval and the number of users 1 to 99 100 to 499 500 to 999 ú1000 Number of users Real-time accounting interval (in Figure 1-7, it is required to configure the shared key for packet exchange with the...
On the RADIUS server (an iMC server, using the default port for authentication and accounting), the Telnet user's username and password and the shared key expert have been configured for packet exchange with the RADIUS server as expert, and configure the system to remove ...From the navigation tree, select Authentication > RADIUS. Table 1-6 Relationship between the real-time accounting interval and the number of users 1 to 99 100 to 499 500 to 999 ú1000 Number of users Real-time accounting interval (in Figure 1-7, it is required to configure the shared key for packet exchange with the...
User Guide
Page 415
...User group A user group consists of a group of local users and has a set of user attributes configured on a device (such as the user password, service type, and authorization attribute), and is automatically created by the username. Figure 1-1 Local user list 1-1 Local user A local user represents a set...in the local user database of the device. Click Add to a user group named system, which is uniquely identified by the system. By default, every newly added local user belongs to enter the local user configuration page. The Local User page appears, displaying all local users, as ...
...User group A user group consists of a group of local users and has a set of user attributes configured on a device (such as the user password, service type, and authorization attribute), and is automatically created by the username. Figure 1-1 Local user list 1-1 Local user A local user represents a set...in the local user database of the device. Click Add to a user group named system, which is uniquely identified by the system. By default, every newly added local user belongs to enter the local user configuration page. The Local User page appears, displaying all local users, as ...
User Guide
Page 428
...of the root certificate does not match the one configured for the PKI domain, the entity will submit the certificate request to display the password in the CRL file. 1-9 Select the online certificate request mode, which is Manual. This item is available only when the certificate ...to the server at which the PKI entity downloads the latest CRLs. By default, the CRL update period depends on the next update field in cipher text. LDAP IP Port Version Request Mode Password Encrypt Password Hash Fingerprint Polling Count Polling Interval Enable CRL Checking CRL Update Period Currently,...
...of the root certificate does not match the one configured for the PKI domain, the entity will submit the certificate request to display the password in the CRL file. 1-9 Select the online certificate request mode, which is Manual. This item is available only when the certificate ...to the server at which the PKI entity downloads the latest CRLs. By default, the CRL update period depends on the next update field in cipher text. LDAP IP Port Version Request Mode Password Encrypt Password Hash Fingerprint Polling Count Polling Interval Enable CRL Checking CRL Update Period Currently,...