Implementation Guide
Page 1
SuperStack® 3 Switch 3812, Switch 3824 and Switch 3848 Implementation Guide 3C17401 3C17400 3CR17402-91 http://www.3com.com/ Part No. DUA1740-0BAA02 Published September 2004
SuperStack® 3 Switch 3812, Switch 3824 and Switch 3848 Implementation Guide 3C17401 3C17400 3CR17402-91 http://www.3com.com/ Part No. DUA1740-0BAA02 Published September 2004
Implementation Guide
Page 2
... in the United States and may or may require U.S. Environmental Statement about the Documentation The documentation for a particular purpose. 3Com may be recycled, reused and disposed of -life electronic components. and/or local government authorization prior to export or import ... encryption and may not be environmentally-friendly in the hard copy documentation, or on a continual basis. Unless otherwise indicated, 3Com registered trademarks are labelled according to another country. Solaris is the policy of the respective companies with national legislation and regulations...
... in the United States and may or may require U.S. Environmental Statement about the Documentation The documentation for a particular purpose. 3Com may be recycled, reused and disposed of -life electronic components. and/or local government authorization prior to export or import ... encryption and may not be environmentally-friendly in the hard copy documentation, or on a continual basis. Unless otherwise indicated, 3Com registered trademarks are labelled according to another country. Solaris is the policy of the respective companies with national legislation and regulations...
Implementation Guide
Page 3
CONTENTS ABOUT THIS GUIDE Conventions 11 Related Documentation 12 Documentation Comments 13 1 SWITCH FEATURES OVERVIEW What is Management Software? 15 Switch Features Explained 16 Aggregated Links 16 Auto-negotiation 16 Configuration Save and Restore 17 Multicast Filtering 18 Rapid Spanning Tree Protocol 18 Switch Database 19 Traffic Prioritization 19 Rate Limiting 19 RMON 20 Broadcast Storm Control 20 VLANs 20 Automatic IP Configuration 20 Port Security 21 2 OPTIMIZING BANDWIDTH Port Features 23 Duplex 23 Flow Control 24 Auto-negotiation 24 Aggregated Links 25 How 802.3ad Link Aggregation ...
CONTENTS ABOUT THIS GUIDE Conventions 11 Related Documentation 12 Documentation Comments 13 1 SWITCH FEATURES OVERVIEW What is Management Software? 15 Switch Features Explained 16 Aggregated Links 16 Auto-negotiation 16 Configuration Save and Restore 17 Multicast Filtering 18 Rapid Spanning Tree Protocol 18 Switch Database 19 Traffic Prioritization 19 Rate Limiting 19 RMON 20 Broadcast Storm Control 20 VLANs 20 Automatic IP Configuration 20 Port Security 21 2 OPTIMIZING BANDWIDTH Port Features 23 Duplex 23 Flow Control 24 Auto-negotiation 24 Aggregated Links 25 How 802.3ad Link Aggregation ...
Implementation Guide
Page 4
Aggregated Links and Your Switch 27 Aggregated Link - Manual Configuration Example 29 Jumbo Frames 30 Implementing Jumbo Frames 30 Jumbo Frames - Simple Network Example 30 3 USING MULTICAST FILTERING What is an IP Multicast? 33 Benefits of Multicast 34 Multicast Filtering 34 Multicast Filtering and Your Switch 35 IGMP Multicast Filtering 36 How IGMP Supports IP Multicast 37 Electing the Querier 37 Host Messages 37 Response to Queries 37 Role of IGMP in IP Multicast Filtering 38 4 USING RESILIENCE FEATURES Rapid Spanning Tree Protocol 40 Rapid Spanning Tree Protocol (RSTP) 40 What is STP? ...
Aggregated Links and Your Switch 27 Aggregated Link - Manual Configuration Example 29 Jumbo Frames 30 Implementing Jumbo Frames 30 Jumbo Frames - Simple Network Example 30 3 USING MULTICAST FILTERING What is an IP Multicast? 33 Benefits of Multicast 34 Multicast Filtering 34 Multicast Filtering and Your Switch 35 IGMP Multicast Filtering 36 How IGMP Supports IP Multicast 37 Electing the Querier 37 Host Messages 37 Response to Queries 37 Role of IGMP in IP Multicast Filtering 38 4 USING RESILIENCE FEATURES Rapid Spanning Tree Protocol 40 Rapid Spanning Tree Protocol (RSTP) 40 What is STP? ...
Implementation Guide
Page 5
6 USING TRAFFIC MANAGEMENT What is Traffic Prioritization? 51 Traffic Prioritization and your Switch 52 How Traffic Prioritization Works 53 802.1D traffic classification 54 DiffServ traffic classification 55 IP Port traffic classification 56 Traffic Queues 56 Limiting the Rate of a Port 57 Traffic Prioritization and Rate Limiting 57 7 STATUS MONITORING AND STATISTICS RMON 59 What is RMON? 59 The RMON Groups 60 Benefits of RMON 61 RMON and the Switch 61 Alarm Events 62 8 SETTING UP VIRTUAL LANS What are VLANs? 63 Benefits of VLANs 64 VLANs and Your Switch 65 The Default VLAN 65 Communication ...
6 USING TRAFFIC MANAGEMENT What is Traffic Prioritization? 51 Traffic Prioritization and your Switch 52 How Traffic Prioritization Works 53 802.1D traffic classification 54 DiffServ traffic classification 55 IP Port traffic classification 56 Traffic Queues 56 Limiting the Rate of a Port 57 Traffic Prioritization and Rate Limiting 57 7 STATUS MONITORING AND STATISTICS RMON 59 What is RMON? 59 The RMON Groups 60 Benefits of RMON 61 RMON and the Switch 61 Alarm Events 62 8 SETTING UP VIRTUAL LANS What are VLANs? 63 Benefits of VLANs 64 VLANs and Your Switch 65 The Default VLAN 65 Communication ...
Implementation Guide
Page 6
Server Support 73 Event Log Entries and Traps 73 10 MAKING YOUR NETWORK SECURE Securing Access to the Web Interface 75 Getting a Digital Certificate 76 Securing Access to the Command Line Interface 76 Access Control Lists 77 How Access Control List Rules Work 77 Port Security 78 What is Network Login? 78 How Network Login Works 79 Important Considerations 80 What is Switch Management Login? 81 Benefits of RADIUS Authentication 82 How RADIUS Authentication Works 82 Important Considerations 83 What is RADIUS? 83 A CONFIGURATION RULES Configuration Rules for Gigabit Ethernet 85 Configuration ...
Server Support 73 Event Log Entries and Traps 73 10 MAKING YOUR NETWORK SECURE Securing Access to the Web Interface 75 Getting a Digital Certificate 76 Securing Access to the Command Line Interface 76 Access Control Lists 77 How Access Control List Rules Work 77 Port Security 78 What is Network Login? 78 How Network Login Works 79 Important Considerations 80 What is Switch Management Login? 81 Benefits of RADIUS Authentication 82 How RADIUS Authentication Works 82 Important Considerations 83 What is RADIUS? 83 A CONFIGURATION RULES Configuration Rules for Gigabit Ethernet 85 Configuration ...
Implementation Guide
Page 9
... site. ABOUT THIS GUIDE This guide describes the features of the following Switches: ■ 3Com® SuperStack® 3 Switch 3812 (3C17401) ■ 3Com® SuperStack® 3 Switch 3824 (3C17400) ■ 3Com® SuperStack® 3 Switch 3848 (3CR17402-91) It outlines how to use these features to optimize the performance of your Switch or on...
... site. ABOUT THIS GUIDE This guide describes the features of the following Switches: ■ 3Com® SuperStack® 3 Switch 3812 (3C17401) ■ 3Com® SuperStack® 3 Switch 3824 (3C17400) ■ 3Com® SuperStack® 3 Switch 3848 (3CR17402-91) It outlines how to use these features to optimize the performance of your Switch or on...
Implementation Guide
Page 10
10 ABOUT THIS GUIDE Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format (PDF) or HTML on the 3Com World Wide Web site: http://www.3com.com/
10 ABOUT THIS GUIDE Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format (PDF) or HTML on the 3Com World Wide Web site: http://www.3com.com/
Implementation Guide
Page 11
Table 1 Notice Icons Icon Notice Type Description Information note Information that describes important features or instructions Caution Information that alerts you to potential loss of data or potential damage to an application, system, or device Warning Information that are used to potential personal injury Table 2 Text Conventions Convention Description Screen displays This typeface represents information as shown and then press Return or Enter. Example: To change your password, use the following command: The words "enter" and "type" Keyboard key names bridge port detail ...
Table 1 Notice Icons Icon Notice Type Description Information note Information that describes important features or instructions Caution Information that alerts you to potential loss of data or potential damage to an application, system, or device Warning Information that are used to potential personal injury Table 2 Text Conventions Convention Description Screen displays This typeface represents information as shown and then press Return or Enter. Example: To change your password, use the following command: The words "enter" and "type" Keyboard key names bridge port detail ...
Implementation Guide
Page 12
It is supplied on the CD-ROM that enable you may find useful, such as: ■ Documentation accompanying 3Com Network Supervisor. This is supplied in its default state ■ information on how to access the management software to begin managing your Switch. ■ SuperStack 3 ...
It is supplied on the CD-ROM that enable you may find useful, such as: ■ Documentation accompanying 3Com Network Supervisor. This is supplied in its default state ■ information on how to access the management software to begin managing your Switch. ■ SuperStack 3 ...
Implementation Guide
Page 13
... the first instance to you. They will help make our documentation more useful to your network supplier. Please e-mail comments about 3Com product documentation at this document to 3Com at: pddtechpubs_comments@3com.com Please include the following information when contacting us . Documentation Comments 13 Documentation Comments Your suggestions are very important to us...
... the first instance to you. They will help make our documentation more useful to your network supplier. Please e-mail comments about 3Com product documentation at this document to 3Com at: pddtechpubs_comments@3com.com Please include the following information when contacting us . Documentation Comments 13 Documentation Comments Your suggestions are very important to us...
Implementation Guide
Page 15
This is Management Software? However, to make full use of the features offered by the Switch, and to change and monitor the way it works, you have to manage the Switch. Managing the Switch can operate in Chapter 3 of accessing the management software to access the management software that accompanies your Switch. Your Switch can help you require to manage the Switch please refer to improve its default state. These methods are several different methods of the Getting Started Guide that accompanies your network. This chapter contains introductory information about the ...
This is Management Software? However, to make full use of the features offered by the Switch, and to change and monitor the way it works, you have to manage the Switch. Managing the Switch can operate in Chapter 3 of accessing the management software to access the management software that accompanies your Switch. Your Switch can help you require to manage the Switch please refer to improve its default state. These methods are several different methods of the Getting Started Guide that accompanies your network. This chapter contains introductory information about the ...
Implementation Guide
Page 16
SFP ports do not support auto-negotiation of a link. For details of the auto-negotiation features supported by your Switch, please refer to the Management Quick Reference Guide that minimizes packet loss during periods of congestion on the network. their applications are explained in this guide. Aggregated Links Aggregated links are by default the parameters that provide the highest performance supported by your Switch, please refer to the Management Quick Reference Guide that allow devices to communicate using up to two links in effect, doubles the potential throughput of port ...
SFP ports do not support auto-negotiation of a link. For details of the auto-negotiation features supported by your Switch, please refer to the Management Quick Reference Guide that minimizes packet loss during periods of congestion on the network. their applications are explained in this guide. Aggregated Links Aggregated links are by default the parameters that provide the highest performance supported by your Switch, please refer to the Management Quick Reference Guide that allow devices to communicate using up to two links in effect, doubles the potential throughput of port ...
Implementation Guide
Page 17
...The configuration information is reset to its factory default settings before you restore a configuration onto it. Important Considerations ■ 3Com recommends the Switch unit is stored in an readable ASCII text file. You can reset the Switch using the system control ... Explained 17 Flow control is supported on ports operating in half duplex mode, and is implemented using the Configuration Save and Restore feature, 3Com recommends that aggregated links are to be manually placed in the aggregated link. All configuration information that can only be restored onto a device...
...The configuration information is reset to its factory default settings before you restore a configuration onto it. Important Considerations ■ 3Com recommends the Switch unit is stored in an readable ASCII text file. You can reset the Switch using the system control ... Explained 17 Flow control is supported on ports operating in half duplex mode, and is implemented using the Configuration Save and Restore feature, 3Com recommends that aggregated links are to be manually placed in the aggregated link. All configuration information that can only be restored onto a device...
Implementation Guide
Page 18
Rapid Spanning Tree Protocol Rapid Spanning Tree Protocol (RSTP) is a bridge-based systems that makes your Switch. For example, LACP automatic aggregations with manually defined ports are restored as manual aggregations with the aggregated link disabled. For further information about multicast filtering, see Chapter 2 "Optimizing Bandwidth". ■ When restoring a configuration onto a unit over the aggregated links is disabled are restored as manual aggregations with that are not recommended as required. Multicast Filtering Multicast filtering allows the Switch to forward ...
Rapid Spanning Tree Protocol Rapid Spanning Tree Protocol (RSTP) is a bridge-based systems that makes your Switch. For example, LACP automatic aggregations with manually defined ports are restored as manual aggregations with the aggregated link disabled. For further information about multicast filtering, see Chapter 2 "Optimizing Bandwidth". ■ When restoring a configuration onto a unit over the aggregated links is disabled are restored as manual aggregations with that are not recommended as required. Multicast Filtering Multicast filtering allows the Switch to forward ...
Implementation Guide
Page 19
For more information about RSTP, see Chapter 5 "Using the Switch Database". Switch Database The Switch Database is an integral part of the Switch and is used with traffic prioritization, ensures that only supports IEEE 802.1D STP and will automatically downgrade to be forwarded, and which port should transmit the packet if it is to STP on that high priority data is the restriction of network traffic reduces the stress on your network. For more information about the Switch Database, see Chapter 4 "Using Resilience Features". Traffic Prioritization The traffic ...
For more information about RSTP, see Chapter 5 "Using the Switch Database". Switch Database The Switch Database is an integral part of the Switch and is used with traffic prioritization, ensures that only supports IEEE 802.1D STP and will automatically downgrade to be forwarded, and which port should transmit the packet if it is to STP on that high priority data is the restriction of network traffic reduces the stress on your network. For more information about the Switch Database, see Chapter 4 "Using Resilience Features". Traffic Prioritization The traffic ...
Implementation Guide
Page 20
Broadcast Storm Control Broadcast Storm Control is faulty or configured incorrectly. With VLANs, you can segment your network without being restricted by physical connections - a limitation of frames per second (threshold), the broadcast traffic on the port is exceeded. For more information about how the automatic IP configuration feature works, see Chapter 9 "Using Automatic IP Configuration". For more information about RMON and Event Notification, see Chapter 8 "Setting Up Virtual LANs". This system prevents the overwhelming broadcast traffic that can result from network ...
Broadcast Storm Control Broadcast Storm Control is faulty or configured incorrectly. With VLANs, you can segment your network without being restricted by physical connections - a limitation of frames per second (threshold), the broadcast traffic on the port is exceeded. For more information about how the automatic IP configuration feature works, see Chapter 9 "Using Automatic IP Configuration". For more information about RMON and Event Notification, see Chapter 8 "Setting Up Virtual LANs". This system prevents the overwhelming broadcast traffic that can result from network ...
Implementation Guide
Page 21
For more information about how the automatic IP configuration feature works, see Chapter 9 "Using Automatic IP Configuration". The maximum number of ports: ■ No Security Port security is disabled and all network traffic is 1000. Any packets containing a source address not learnt on the port will be learned on a port once the client has been authenticated by a RADIUS server. Switch Features Explained 21 Port Security Your Switch supports the following port security modes, which you can be dropped. ■ Automatic Learning You can limit the number of addresses that can ...
For more information about how the automatic IP configuration feature works, see Chapter 9 "Using Automatic IP Configuration". The maximum number of ports: ■ No Security Port security is disabled and all network traffic is 1000. Any packets containing a source address not learnt on the port will be learned on a port once the client has been authenticated by a RADIUS server. Switch Features Explained 21 Port Security Your Switch supports the following port security modes, which you can be dropped. ■ Automatic Learning You can limit the number of addresses that can ...