Sign In
Upload
Manuals
Brands
3Com Manuals
Switch
3CRWX120695A, 3CRWX440095A
3Com 3CRWX120695A, 3CRWX440095A Manuals
Manuals and User Guides for 3Com 3CRWX120695A, 3CRWX440095A. We have
1
3Com 3CRWX120695A, 3CRWX440095A manual available for free PDF download: Configuration Manual
3Com 3CRWX120695A, 3CRWX440095A Configuration Manual (496 pages)
Wireless LAN Switch and Controller
Brand:
3Com
| Category:
Switch
| Size: 4.44 MB
Table of Contents
Configuration Guide
1
Table of Contents
3
About
17
Bout this Guide
17
Conventions
17
Documentation
18
Documentation Comments
19
1 Using the Command -Line Interface
21
Overview
21
CLI Conventions
21
Command Prompts
22
Syntax Notation
22
Text Entry Conventions and Allowed Characters
22
User Globs, MAC Address Globs, and VLAN Globs
24
Port Lists
26
Virtual LAN Identification
26
Command-Line Editing
27
Keyboard Shortcuts
27
History Buffer
27
Tabs
27
Single-Asterisk (*) Wildcard Character
28
Double-Asterisk (**) Wildcard Characters
28
Using CLI Help
28
Understanding Command Descriptions
29
2 Configuring Aaa for Administrative and Local Access
31
Overview
31
Before You Start
34
About Administrative Access
35
Access Modes
35
Types of Administrative Access
35
First-Time Configuration Via the Console
36
Enabling an Administrator
36
Setting the WX Switch Enable Password
37
Authenticating at the Console
38
Customizing AAA with "Globs" and Groups
39
Setting User Passwords
39
Adding and Clearing Local Users for Administrative Access
40
Configuring Accounting for Administrative Users
40
Displaying the AAA Configuration
42
Saving the Configuration
42
Administrative AAA Configuration Scenarios
43
Local Authentication
43
Telnet Users
44
Local Override and Backup Local Authentication
44
Authentication When RADIUS Servers Do Not Respond
45
3 Configuring and Managing Ports and Vlans
47
Configuring and Managing Ports
47
Setting the Port Type
47
Configuring a Port Name
54
Configuring Interface Preference on a Dual-Interface Gigabit Ethernet Port (WX4400 Only)
54
Configuring Port Operating Parameters
55
Displaying Port Information
57
Configuring Load-Sharing Port Groups
60
Configuring and Managing Vlans
63
Understanding Vlans in 3Com MSS
63
Configuring a VLAN
66
Changing Tunneling Affinity
69
Displaying VLAN Information
69
Managing the Layer 2 Forwarding Database
70
Types of Forwarding Database Entries
70
How Entries Enter the Forwarding Database
70
Displaying Forwarding Database Information
71
Adding an Entry to the Forwarding Database
72
Removing Entries from the Forwarding Database
72
Configuring the Aging Timeout Period
73
Port and VLAN Configuration Scenario
73
4 Onfiguring and
77
MTU Support
77
Configuring and Managing IP Interfaces
78
Adding an IP Interface
78
Disabling or Reenabling an IP Interface
78
Removing an IP Interface
78
Displaying IP Interface Information
78
Configuring the System IP Address
79
Designating the System IP Address
79
Displaying the System IP Address
79
Clearing the System IP Address
79
Configuring and Managing IP Routes
79
Displaying IP Routes
80
Adding a Static Route
82
Removing a Static Route
83
Managing the Management Services
83
Managing SSH
83
Managing Telnet
87
Managing HTTPS
89
Configuring and Managing DNS
90
Enabling or Disabling the DNS Client
90
Configuring DNS Servers
90
Configuring a Default Domain Name
91
Displaying DNS Server Information
91
Configuring and Managing Aliases
92
Adding an Alias
92
Removing an Alias
92
Displaying Aliases
92
Configuring and Managing Time Parameters
93
Setting the Time Zone
93
Configuring the Summertime Period
94
Statically Configuring the System Time and Date
95
Displaying the Time and Date
96
Configuring and Managing NTP
96
Adding an NTP Server
97
Removing an NTP Server
97
Changing the NTP Update Interval
97
Resetting the Update Interval to the Default
97
Enabling the NTP Client
97
Displaying NTP Information
97
Managing the ARP Table
98
Displaying ARP Table Entries
98
Adding an ARP Entry
99
Changing the Aging Timeout
99
Pinging Another Device
100
Logging in to a Remote Device
100
Tracing a Route
101
IP Interfaces and Services Configuration Scenario
103
5 Configuring and Managing Mobility Domain Roaming
107
About the Mobility Domain Feature
107
Configuring a Mobility Domain
108
Configuring the Seed
108
Configuring Member WX Switches on the Seed
109
Configuring a Member
109
Displaying Mobility Domain Status
109
Displaying the Mobility Domain Configuration
110
Clearing a Mobility Domain from a WX Switch
110
Clearing a Mobility Domain Member from a Seed
110
Monitoring the Vlans and Tunnels in a Mobility Domain
111
Displaying Roaming Stations
111
Displaying Roaming Vlans and Their Affinities
112
Displaying Tunnel Information
112
Understanding the Sessions of Roaming Users
113
Requirements for Roaming to Succeed
113
Effects of Timers on Roaming
114
Monitoring Roaming Sessions
114
Mobility Domain Scenario
115
6 Configuring Map Access Points
117
MAP Overview
117
Country of Operation
119
Directly Connected Maps and Distributed Maps
119
Service Profiles
129
Radio Profiles
133
Configuring MAP Access Points
136
Specifying the Country of Operation
136
Configuring MAP Port Parameters
139
Configuring a Service Profile
145
Configuring a Radio Profile
147
Configuring Radio-Specific Parameters
154
Mapping the Radio Profile to Service Profiles
157
Assigning a Radio Profile and Enabling Radios
157
Disabling or Reenabling Radios
157
Enabling or Disabling Individual Radios
157
Disabling or Reenabling All Radios Using a Profile
158
Resetting a Radio to Its Factory Default Settings
158
Restarting a MAP
159
Displaying MAP Information
159
Displaying MAP Configuration Information
159
Displaying a List of Distributed Maps
160
Displaying a List of Distributed Maps that Are Not Configured
161
Displaying Connection Information for Distributed Maps
161
Displaying Service Profile Information
161
Displaying Radio Profile Information
162
Displaying MAP Status Information
162
Displaying MAP Statistics Counters
163
7 Configuring User Encryption
165
Overview
165
Configuring WPA
168
WPA Cipher Suites
168
TKIP Countermeasures
171
WPA Authentication Methods
172
WPA Information Element
172
Client Support
173
Configuring WPA
174
Configuring WPA2
179
Creating a Service Profile for RSN
179
Enabling RSN
179
Specifying the RSN Cipher Suites
180
Changing the TKIP Countermeasures Timer Value
181
Enabling PSK Authentication
181
Displaying RSN Settings
181
Assigning the Service Profile to Radios and Enabling the Radios
181
Configuring WEP
182
Setting Static WEP Key Values
183
Assigning Static WEP Keys
184
Encryption Configuration Scenarios
185
Enabling WPA with TKIP
185
Enabling Dynamic WEP in a WPA Network
187
Configuring Encryption for MAC Clients
189
8 Configuring Rf Auto -Tuning
193
Overview
193
Initial Channel and Power Assignment
193
Channel and Power Tuning
194
RF Auto-Tuning Parameters
197
Changing RF Auto-Tuning Settings
198
Changing Channel Tuning Settings
198
Changing Power Tuning Settings
199
Changing the Minimum Transmit Data Rate
201
Displaying RF Auto-Tuning Information
201
Displaying RF Auto-Tuning Settings
201
Displaying RF Neighbors
203
Displaying RF Attributes
203
9 Configuring and Managing Spanning Tree Protocol
205
Overview
205
Enabling the Spanning Tree Protocol
206
Changing Standard Spanning Tree Parameters
206
Bridge Priority
206
Port Cost
207
Port Priority
207
Changing the Bridge Priority
207
Changing STP Port Parameters
208
Changing Spanning Tree Timers
210
Configuring and Managing STP Fast Convergence Features
211
Configuring Port Fast Convergence
212
Displaying Port Fast Convergence Information
213
Configuring Backbone Fast Convergence
213
Displaying the Backbone Fast Convergence State
213
Configuring Uplink Fast Convergence
214
Displaying Uplink Fast Convergence Information
214
Displaying Spanning Tree Information
214
Displaying STP Bridge and Port Information
214
Displaying the STP Port Cost on a VLAN Basis
215
Displaying Blocked STP Ports
216
Displaying Spanning Tree Statistics
216
Clearing STP Statistics
218
Spanning Tree Configuration Scenario
219
10 Onfiguring and
223
Overview
223
Disabling or Reenabling IGMP Snooping
223
Disabling or Reenabling Proxy Reporting
223
Enabling the Pseudo-Querier
224
Changing IGMP Timers
224
Changing the Query Interval
225
Changing the Other-Querier-Present Interval
225
Changing the Query Response Interval
225
Changing the Last Member Query Interval
225
Changing Robustness
225
Enabling Router Solicitation
226
Changing the Router Solicitation Interval
226
Configuring Static Multicast Ports
226
Adding or Removing a Static Multicast Router Port
226
Adding or Removing a Static Multicast Receiver Port
227
Displaying Multicast Information
227
Displaying Multicast Configuration Information and Statistics
227
Displaying Multicast Queriers
229
Displaying Multicast Routers
229
Displaying Multicast Receivers
229
11 Configuring and
231
Onfiguring and Anaging Ecurity Acl
231
About Security Access Control Lists
231
Overview of Security ACL Commands
231
Security ACL Filters
232
Creating and Committing a Security ACL
233
Setting a Source IP ACL
233
Setting an ICMP ACL
236
Setting TCP and UDP Acls
238
Determining the ACE Order
239
Committing a Security ACL
240
Viewing Security ACL Information
240
Clearing Security Acls
242
Mapping Security Acls
242
Mapping User-Based Security Acls
242
Mapping Security Acls to Ports, Vlans, Virtual Ports, or Distributed Maps
244
Modifying a Security ACL
246
Adding Another ACE to a Security ACL
247
Placing One ACE before Another
247
Modifying an Existing Security ACL
248
Clearing Security Acls from the Edit Buffer
249
Enabling Prioritization for Voice over IP
250
Enabling Prioritization for Spectralink Phones
251
Security ACL Configuration Scenario
252
12 Managing Keys and Certificates
255
Why Use Keys and Certificates
255
Wireless Security through TLS
255
PEAP-MS-CHAP-V2 Security
256
About Keys and Certificates
256
Public Key Infrastructures
257
Public and Private Keys
258
Digital Certificates
258
PKCS #7, PKCS #10, and PKCS #12 Object Files
258
Creating Keys and Certificates
260
Choosing the Appropriate Certificate Installation Method for Your
260
Network
260
Creating Public-Private Key Pairs
262
Generating Self-Signed Certificates
262
Installing a Key Pair and Certificate from a PKCS #12 Object File
263
File
263
Creating a CSR and Installing a Certificate from a PKCS #7 Object File
264
Installing a Ca's Own Certificate
265
Displaying Certificate and Key Information
266
Key and Certificate Configuration Scenarios
267
Creating Self-Signed Certificates
267
Installing CA-Signed Certificates from PKCS #12 Object Files
270
PKCS #7 Object File
272
Installing CA-Signed Certificates Using a PKCS #10 Object File (CSR) and a PKCS #7 Object File
272
13 Configuring Aaa for Network Users
277
About AAA for Network Users
277
Authentication
277
Authorization
282
Accounting
284
Summary of AAA Features
284
AAA Tools for Network Users
285
Globs" and Groups for Network User Classification
285
AAA Methods for IEEE 802.1X and Web Network Access
286
IEEE 802.1X Extensible Authentication Protocol Types
289
Ways a WX Switch Can Use EAP
290
Effects of Authentication Type on Encryption Method
291
Configuring 802.1X Authentication
292
Configuring EAP Offload
293
Using Pass-Through
293
Authenticating Via a Local Database
293
Binding User Authentication to Machine Authentication
294
Configuring Authentication and Authorization by MAC Address
298
Adding and Clearing MAC Users and User Groups Locally
299
Configuring MAC Authentication and Authorization
300
Changing the MAC Authorization Password for RADIUS
301
Configuring Webaaa
302
Webaaa Process
303
Webaaa Requirements and Recommendations
304
Configuring Webaaa and Authorization
306
Using a Custom Login Page
307
Using Dynamic Fields in Webaaa Redirect Urls
310
Configuring Last-Resort Access
312
Assigning Authorization Attributes
313
Assigning Attributes to Users and Groups
318
Assigning a Security ACL to a User or a Group
319
Clearing a Security ACL from a User or Group
320
Assigning Encryption Types to Wireless Users
321
Overriding or Adding Attributes Locally with a Location Policy
323
About the Location Policy
323
How the Location Policy Differs from a Security ACL
324
Setting the Location Policy
324
Clearing Location Policy Rules and Disabling the Location Policy
326
Configuring Accounting for Wireless Network Users
327
Viewing Local Accounting Records
328
Viewing Roaming Accounting Records
328
Displaying the AAA Configuration
330
Avoiding AAA Problems in Configuration Order
331
Using Authentication and Accounting Rules Together
332
Configuring a Mobility Profile
333
Network User Configuration Scenarios
335
General Use of Network User Commands
336
Enabling RADIUS Pass-Through Authentication
337
Enabling PEAP-MS-CHAP-V2 Authentication
338
Enabling PEAP-MS-CHAP-V2 Offload
339
Combining EAP Offload with Pass-Through Authentication
340
Overriding AAA-Assigned Vlans
341
14 Configuring Communication with Radius
343
RADIUS Overview
343
Before You Begin
345
Configuring RADIUS Servers
345
Configuring Global RADIUS Defaults
346
Setting the System IP Address as the Source Address
347
Configuring Individual RADIUS Servers
347
Deleting RADIUS Servers
348
Configuring RADIUS Server Groups
348
Creating Server Groups
349
Deleting a Server Group
351
RADIUS and Server Group Configuration Scenario
352
15 Managing
355
On the Wx Switch
355
Managing 802.1X on Wired Authentication Ports
355
Enabling and Disabling 802.1X Globally
355
Setting 802.1X Port Control
356
Managing 802.1X Encryption Keys
357
Enabling 802.1X Key Transmission
357
Configuring 802.1X Key Transmission Time Intervals
357
Managing WEP Keys
358
Setting EAP Retransmission Attempts
359
Managing 802.1X Client Reauthentication
360
Enabling and Disabling 802.1X Reauthentication
360
Setting the Maximum Number of 802.1X Reauthentication Attempts
360
Setting the 802.1X Reauthentication Period
361
Setting the Bonded Authentication Period
361
Managing Other Timers
362
Setting the 802.1X Quiet Period
362
Setting the 802.1X Timeout for an Authorization Server
362
Setting the 802.1X Timeout for a Client
363
Displaying 802.1X Information
363
Viewing 802.1X Clients
363
Viewing the 802.1X Configuration
364
Viewing 802.1X Statistics
365
16 Managing Sessions
367
About the Session Manager
367
Displaying and Clearing Administrative Sessions
367
Displaying and Clearing All Administrative Sessions
368
Displaying and Clearing an Administrative Console Session
368
Displaying and Clearing Administrative Telnet Sessions
369
Displaying and Clearing Client Telnet Sessions
369
Displaying and Clearing Network Sessions
370
Displaying Verbose Network Session Information
371
Displaying and Clearing Network Sessions by Username
371
Displaying and Clearing Network Sessions by MAC Address
372
Displaying and Clearing Network Sessions by VLAN Name
373
Displaying and Clearing Network Sessions by Session ID
374
17 Rogue Etection and
377
Overview
377
About Rogues and RF Detection
377
Mobility Domain Requirement
377
Rogue Access Points and Users
377
Ad Hoc Users
378
RF Detection Scans
378
Countermeasures
379
Enabling Countermeasures
379
Attacking Specific Rogues
379
Ignoring Friendly Third-Party Devices
381
Disabling or Reenabling Logging of Rogues
382
Enabling Rogue and Countermeasures Traps
382
Displaying RF Detection Information
383
Displaying Countermeasures Information
383
Displaying All Rogue Devices Detected in the Mobility Domain
383
Displaying All Devices Detected by an Individual Switch
384
Displaying the Devices by a Specific Radio
385
18 Managing System Files
387
About System Files
387
Displaying Software Version Information
387
Displaying Boot Information
389
Working with Files
389
Displaying a List of Files
389
Copying a File
391
Deleting a File
393
Creating a Subdirectory
393
Removing a Subdirectory
394
Managing Configuration Files
394
Displaying the Running Configuration
395
Saving Configuration Changes
396
Specifying the Configuration File to Use after the Next Reboot
396
Loading a Configuration File
397
Resetting to the Factory Default Configuration
397
Backing up and Restoring the System
398
Managing Configuration Changes
400
Backup and Restore Examples
400
Upgrading the System Image
401
Roubleshooting Awx Switch
403
Fixing Common WX Setup Problems
403
Recovering the System Password
406
Configuring and Managing the System Log
406
Log Message Components
407
Logging Destinations and Levels
407
Using Log Commands
408
Running Traces
413
Using the Trace Command
414
Displaying a Trace
415
Stopping a Trace
415
About Trace Results
415
Displaying Trace Results
416
Copying Trace Results to a Server
417
Clearing the Trace Log
417
List of Trace Areas
417
Using Display Commands
418
Viewing VLAN Interfaces
418
Viewing AAA Session Statistics
419
Viewing FDB Information
420
Viewing ARP Information
420
Capturing System Information for Technical Support
421
Displaying Technical Support Information
421
Sending Information to 3Com Technical Support
421
Supported Radius Attributes
423
Attributes
423
Supported Standard and Extended Attributes
424
3Com Vendor-Specific Attributes
431
100 C Mobility Domain Trafficports
433
Traffic Ports
433
Upport for Your
435
Purchase Value-Added Services
435
Register Your Product
435
Access Software Downloads
436
Telephone Technical Support and Repair
436
Troubleshoot Online
436
Contact Us
437
Advertisement
Advertisement
Related Products
3Com 3CRWX120695A
3Com WXR100 3CRWXR10095A
3Com 3CRWX440095A
3Com WX2200 3CRWX220095A
3Com 3CR17501-91 - SuperStack 3 Switch 3250
3Com 3CR17332-91
3Com 3CR17331-91
3Com OfficeConnect 3CRDSF9PWR
3Com 3CRS48G-24P-91
3Com 3CR17450-91
3Com Categories
Switch
Network Router
Wireless Access Point
Modem
Network Card
More 3Com Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL