3Com 3CBLSG48 User Manual

3Com 3CBLSG48 User Manual

Baseline switch
Table of Contents

Advertisement

®
3Com
Baseline Switch 2948-SFP Plus
User Guide
3CBLSG48
www.3Com.com
Part Number 10016089 Rev. AA
Published July 2007

Advertisement

Table of Contents
loading

Summary of Contents for 3Com 3CBLSG48

  • Page 1 ® 3Com Baseline Switch 2948-SFP Plus User Guide 3CBLSG48 www.3Com.com Part Number 10016089 Rev. AA Published July 2007...
  • Page 2 All other company and product names may be trademarks of the respective companies with which they are associated. ENVIRONMENTAL STATEMENT It is the policy of 3Com Corporation to be environmentally friendly in all operations. To uphold our policy, we are committed to: Establishing environmental performance standards that comply with national legislation and regulations.
  • Page 3 BOUT This guide provides information about the Web user interface for the 3Com® Baseline Switch 2948-SFP Plus. The Web interface is a network management system that allows you to configure, monitor, and troubleshoot your switch from a remote web browser. The Web interface web pages are easy-to-use and easy-to-navigate.
  • Page 4 Aggregating Ports — Provides information for configuring Link Aggregation which optimizes port usage by linking a group of ports together to form a single LAG. Configuring VLANs — Provides information for configuring VLANs. VLANs are logical subgroups with a Local Area Network (LAN) which combine user stations and network devices into a single virtual LAN segment, regardless of the physical LAN segment to which they are attached.
  • Page 5 Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format (PDF) or HTML on the 3Com Web site: http://www.3Com.com Table 1 lists conventions that are used throughout this guide.
  • Page 6: Table Of Contents

    Setting Up SNMP Management V1 or V2 ... 19 Default Users and Passwords ... 20 Upgrading Software using theCLI ... 20 sInG Starting the 3Com Web Interface ... 21 Understanding the 3Com Web Interface ... 23 Saving the Configuration ... 31 Resetting the Device ... 32 Restoring Factory Defaults ...
  • Page 7 IeWInG AsIC Viewing Device Settings ... 36 Viewing Color Keys ... 38 AnAGInG Configuring System Access ... 41 Defining RADIUS Clients ... 46 Defining Port-Based Authentication (802.1X) ... 48 Defining Access Control Lists ... 53 Viewing Broadcast Storm ... 80 eneRAL YsteM Viewing System Description ...
  • Page 8 Viewing LACP ... 103 Defining LACP Priority ... 104 Defining LACP Port ... 105 8 ConFIGURInG VLAns VLAN Overview ... 106 Viewing VLAN Details ... 108 Viewing VLAN Port Details ... 109 Creating VLANs ... 110 Rename the VLANS ... 111 Modifying VLAN Settings ...
  • Page 9 10 C onFIGURInG Introduction ... 132 Defining IGMP Snooping & Query ... 132 11 C onFIGURInG Viewing Spanning Tree ... 136 Defining Spanning Tree ... 138 Modifying Spanning Tree ... 139 12 C onFIGURInG SNMP v1 and v2c ... 142 Defining SNMP Communities ...
  • Page 10 Viewing Cable Diagnostics ... 181 etWoRK 3Com Network Supervisor ... 184 3Com Network Director ... 185 3Com Network Access Manager ... 185 3Com Enterprise Management Suite ... 186 Integration Kit with HP OpenView Network Node Manager ... 186 eVICe PeCIFICAtIons AnD Related Standard ...
  • Page 11 Console Cable ... 193 Null Modem Cable ... 194 PC-AT Serial Cable ... 194 Modem Cable ... 194 Ethernet Port RJ-45Pin Assignments ... 195 RoUBLesHootInG Problem Management ... 196 Troubleshooting Solutions ... 196 CLI R Getting Started with the Command Line Interface ... 199 CLI Commands ...
  • Page 12: Etting S Tarted

    This chapter contains introductory information about the 3Com® Baseline Switch 2948-SFP Plus and how they can be used in your net- work. It covers summaries of the hardware and software features, and the following topics: ETTING TARTED About the Switch 2948...
  • Page 13: About The Switch 2948

    HAPTER ETTING TARTED About the Switch The Switch 2948 is a Gigabit Ethernet switching product that delivers flexible three-speed performance (10/100/1000) and advanced voice- 948 optimized features such as auto-QoS and auto-voice VLAN. This makes the switch ideal for medium businesses and small enterprises seeking to build a secure converged network.
  • Page 14: Front Panel Detail

    Table 1 Hardware Features (continued) Feature Flow Control Traffic Prioritization Ethernet, Fast and Gigabit Ethernet Ports SFP Ethernet Ports Mounting Front Panel Detail Figure 1 shows the front panel of the Switch 2948-SFP Plus 48-Port unit. Figure 1 Switch 2948 SFP 48-Port—front panel HAPTER Switch 948 In full duplex operation, all ports are supported.
  • Page 15: Led Status Indicators

    HAPTER ETTING TARTED LED Status The 2948-SFP Plus 48-Port Ethernet switches provide LED indicators on Indicators the front panel for your convenience to monitor the switch. Table 2 Describes the meanings of the LED. Table  Description on the LEDs of the Switch 2948 Power 10/100/1000 Mbps;...
  • Page 16: System Specifications

    System Table 3 contains the system specifications of the Switch 2948. Specifications Table  System specifications of the Switch 2948 switch Specification Physical dimensions (H×W×D) Weight Console port Gigabit Ethernet ports 48 × 10/100/100 Mbps Ethernet ports; on the front panel AC Input voltage Power consumption (full load)
  • Page 17: Installing The Switch

    WARNING: Safety Information. Before you install or remove any components from the Switch or carry out any maintenance procedures, you must read the 3Com Switch Family Safety and Regula- tory Information document enclosed. AVERTISSEMENT: Consignes de securite. Avant d’installer ou d’enlever tout composant de Switch ou d’entamer une procedure de...
  • Page 18: Setting Up For Management

    Setting Up for To make full use of the features offered by your switch, and to change Management and monitor the way it works, you have to access the management software that resides on the switch. This is known as managing the switch.
  • Page 19: Methods Of Managing A Switch

    In addition, you can use the Command Line Interface through the Console port for basic operations of the switch including setting and viewing the IP address, configuring user accounts, upgrading switch firmware, and more. Refer to “3Com CLI Reference Guide” on page 195. Web Interface...
  • Page 20 You can manage a switch using any network management workstation running the Simple Network Management Protocol (SNMP) as shown in Figure 3. For example, you can use the 3Com Network Director software, available from the 3Com website. Figure  SNMP Management over the Network...
  • Page 21: Switch Setup Overview

    HAPTER ETTING TARTED Switch Setup This section gives an overview of what you need to do to get your switch set up and ready for management when it is in its default state. Overview The whole setup process is summarized in Figure 4. Detailed procedural steps are contained in the sections that follow.
  • Page 22 HAPTER ETTING TARTED Figure 4 Initial Switch Setup and Management Flow Diagram CAUTION: To protect your switch from unauthorized access, you must change the default password as soon as possible, even if you do not intend to actively manage your switch. For more information on default users and changing default passwords, see “Default Users and Passwords”...
  • Page 23 HAPTER ETTING TARTED IP Configuration The switch’s IP configuration is determined automatically using DHCP, or manually using values you assign. Automatic IP Configuration using DHCP By default the switch tries to configure its IP Information without requesting user intervention. It tries to obtain an IP address from a DHCP server on the network.
  • Page 24 Static IP addresses are necessary to ensure that the switch is always allocated the same IP information. For most installations, 3Com recommends that you configure the switch IP information manually. This makes management simpler and more reliable as it is not dependent on a DHCP server, and eliminates the risk of the IP address changing.
  • Page 25: Using The Command Line Interface (Cli)

    IP address, or to view the IP address that was assigned automati- cally (for example, by a DHCP server). For more information about the CLI, refer to “3Com CLI Reference Guide”. This section describes how to connect to your switch through the Console port.
  • Page 26 Connecting the Workstation to the Switch 1 Connect the workstation to the console port using the console cable as shown in Figure 5. Figure  Connecting a Workstation to the Switch using the Console Port Workstation To connect the cable: a Attach the cable’s RJ-45 connector to the Console port of the switch b Attach the other end of the cable to the workstation.
  • Page 27 HAPTER ETTING TARTED Manually set the IP You are now ready to manually set up the switch with IP information us- ing the command line interface. Address using the Console Port 1 Connect to the switch Console port as described in “Connecting to the Console Port”...
  • Page 28 See “Methods of Managing a Switch” on page 8. For more information about the CLI, refer to “3Com CLI Reference Guide”. If you do not intend to use the command line interface using the con- sole port to manage the switch, you can logout, disconnect the serial cable and close the terminal emulator software.
  • Page 29: Setting Up Web Interface Management

    HAPTER ETTING TARTED Setting Up Web This section describes how you can set up the web interface manage- ment over the network. Interface Management Prerequisites Choosing a Browser To display the web interface correctly, use one of the following Web browser and platform combinations: Table 4 Supported Web Browsers and Platforms Platform...
  • Page 30: Setting Up Snmp Management V1 Or V2

    Management V1 or offers a range of network management applications to address net- works of all sizes and complexity. See “3Com Network Management”. Be sure the management workstation is connected to the switch using a port in VLAN 1 (the Default VLAN). By default, all ports on the switch are in VLAN 1.
  • Page 31: Default Users And Passwords

    HAPTER ETTING TARTED Default Users and If you intend to manage the switch or to change the default pass- words, you must log in with a valid user name and password. The Passwords switch has one default user name. The default user is listed in Table 5. Table  Default Users Default User Name...
  • Page 32: Sing T He 3 Com W Eb I Nterface

    Users and access levels are described in Configuring System Access Section. Login information is always handled in the local database. A unique password is required from each user. Two access levels exist on the 3Com Web Interface: ■...
  • Page 33 HAPTER SING Accessing the Com This section contains information on starting the 3Com Web interface. To access the 3Com user interface: Web Interface 1 Open an Internet browser.  Enter the device IP address in the address bar and press Enter. The...
  • Page 34: Understanding The 3Com Web Interface

    Figure  3Com Web Interface Home Page Understanding the The 3Com Web Interface Home Page contains the following views: Com Web Interface Tab View — Provides the device summary configuration located at the top of the home page. Tree View — Provides easy navigation through the configurable device features.
  • Page 35 HAPTER SING NTERFACE Figure 8 Web Interface Components The following table lists the user interface components with their corresponding numbers: Table  Interface Components View 1 Tree View 2 Tab View 3 Web Interface Description Tree View provides easy navigation through the configurable device features.
  • Page 36 This section provides the following additional information: Device The 3Com Web Interface Home Page contains a graphical panel repre- Representation sentation of the device that appears within the Device View Tab. To access the Device Representation: 1 Click Device Summary > Device View.
  • Page 37: Interface Management

    Using the Web Configuration Management buttons and icons provide an easy method of configuring device information: Interface Management Buttons Table  3Com Web Interface Configuration Buttons Button Table 8 3Com Web Interface Information Tabs NTERFACE Button Name Description Create Apply...
  • Page 38 3Com contains screens and tables for configuring devices. This section Using Screen and contains the following topics: Table Options Viewing Configuration Information To view configuration information: 1 Click Port > Administration > Summary. The Port Settings Sum- mary Page opens.
  • Page 39: Adding Configuration Information

    NTERFACE Adding Configuration Information The IP Setup Page enables you to add User-defined information to specific 3Com Web Interface pages. For example, to configure IP Setup: 1 Click Administration > IP Setup. The IP Setup Page opens. Figure 11 IP Setup Page  Enter the requisite information in the text field.
  • Page 40: Modifying Configuration Information

    HAPTER SING NTERFACE Modifying Configuration Information 1 Click Administration > System Access > Modify. The System Access Modify Page opens. Figure 1 System Access Modify Page  Modify the fields.  Click Apply. The access fields are modified.
  • Page 41 HAPTER SING NTERFACE Removing Configuration Information 1 Click Administration > System Access > Remove. The System Ac- cess Remove Page opens. Figure 1 System Access Remove Page  Select the user account to be deleted.  Click Remove. The user account is deleted, and the device is up- dated.
  • Page 42: Saving The Configuration

    Saving the Configuration changes are only saved to the device once the user saves the changes to the flash memory. The Save Configuration tab allows Configuration the latest configuration to be saved to the flash memory. To save the device configuration: 1 Click Save Configuration.
  • Page 43: Resetting The Device

    HAPTER SING Resetting the The Reset Page enables resetting the device from a remote location. To prevent the current configuration from being lost, use the Save Con- Device figuration Page to save all user-defined changes to the flash memory before resetting the device. To reset the device: 1 Click Administration >...
  • Page 44 HAPTER SING NTERFACE Figure 1 User Name and Password Page 4 Enter a user name and password to reconnect to the web interface.
  • Page 45: Restoring Factory Defaults

    HAPTER SING Restoring Factory The Restore option appears on the Reset Page. The Restore option restores the device to its factory default settings. Defaults To restore the device: 1 Click Administration > Reset. The Reset Page opens. Figure 1 Reset Page The Reset Page contains the following fields:  Click the Initialize button.
  • Page 46: Logging Off The Device

    Logging Off the To log off the device: Device 1 Click Logout. The Logout Page opens.  The following message appears:  Click OK. The 3Com Web Interface Home Page closes. HAPTER SING NTERFACE...
  • Page 47: Iewing Asic Ettings

    Viewing Device Settings VIEWING BASIC SETTINGS This section contains information about viewing basic settings available from the Web interface home page, including the Device Summary page and the Color Keys page. The Device Summary Page displays general information, including the system name, location, and contact, the system MAC address, System Object ID, System Up Time, and software, boot, and hardware versions.
  • Page 48 System Contact — Defines the name of the contact person. The field range is 0-160 characters. Serial Number — Displays the device serial number. Product C Number — Displays the 3Com device 3C number. System Object ID — Displays the vendor’s authoritative identification of the network management subsystem contained in the entity.
  • Page 49: Viewing Color Keys

    HAPTER IEWING ASIC ETTINGS Viewing Color Keys The Color Key Page provides information about the RJ45 or SFP port status. To view color keys: 1 Click Device Summary > Color Key. The Color Key Page opens. Figure 19 Color Key Page The Color Key Page contains the following fields: RJ4 —...
  • Page 50 Table 9 describes the color and the port status: Table 9 Color Key Definitions Color Port Status White Unconnected. No link detected. Yellow Lower speed on 10/100/1000M port. Green Maximum speed 10/100/1000M RJ45 or RJ45 SFP. Indicates that a link was detected. Light Blue SX/LX SFP.
  • Page 51: Anaging D Evice S Ecurity

    MANAGING DEVICE SECURITY The Management Security section provides information for configuring system access, defining RADIUS authentication, port-based authentication and defining access control lists. This section includes the following topics: Configuring System Access Defining RADIUS Clients Defining Port-Based Authentication (802.1X) Defining Access Control Lists Viewing Broadcast Storm...
  • Page 52: Configuring System Access

    Access levels provide read or read/write permis- sions to users for configuring the switch. Login information is managed in the local database. A unique password is required from each user. Two access levels exist on the 3Com Web Interface: Password. This section contains the following topics: Management access level —...
  • Page 53 HAPTER ANAGING EVICE Viewing System The System Access Summary Page displays the current users and access Access Settings levels defined on the device. To view System Access settings: 1 Click Administration > System Access > Summary. The System Access Summary Page opens. Figure 0 System Access Summary Page The System Access Summary Page contains the following fields: ECURITY...
  • Page 54 Defining System The System Access Setup Page allows network administrators to define users, passwords, and access levels for users using the System Access Access Interface. Monitor users have no access to this page. 1 Click Administration > System Access > Setup. The System Access Setup Page opens.
  • Page 55 HAPTER ANAGING EVICE Modifying System The System Access Modify Page allows network administrators to modify users, passwords, and access levels using the System Access Access Interface. Monitor users have no access to this page. 1 Click Administration > System Access > Modify. The System Access Modify Page opens.
  • Page 56 Removing System The System Access Remove Page allows network administrators to Access remove users from the System Access Interface. Monitor users have no access to this page. To remove users: 1 Click Administration > System Access > Remove. The System Access Remove Page opens.
  • Page 57: Defining Radius Clients

    HAPTER ANAGING EVICE Defining RADIUS Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for networks. RADIUS servers provide a centralized Clients authentication method for 802.1X. The default parameters are user-defined, and are applied to newly defined RADIUS servers. If new default parameters are not defined, the system default values are applied to newly defined RADIUS servers.
  • Page 58 Authentication Port — Identifies the authentication port. The authentication port is used to verify the RADIUS server authentication. The authenticated port default is 1812. Number of Retries — Defines the number of transmitted requests sent to the RADIUS server before a failure occurs. Possible field values are 1-10.
  • Page 59: Defining Port-Based Authentication (802.1X)

    HAPTER ANAGING EVICE Defining Port-Based Port-based authentication authenticates users on a per-port basis via Authentication an external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the RADIUS (80.1X) server using the Extensible Authentication Protocol (EAP). Port-based authentication includes: Port-based authentication creates two access states: This section includes the following topics:...
  • Page 60 Viewing 80.1X The 802.1X Summary Page allows the network administrator to view Authentication port-based authentication settings. To view Port-based Authentication: 1 Click Security > 80.1X > Summary. The 802.1X Summary Page opens. Figure  802.1X Summary Page The 802.1X Summary Page contains the following fields: Port —...
  • Page 61 HAPTER ANAGING EVICE  Click Apply. Port Authentication is enabled, and the device is up- dated. The 802.1X Setup Page contains information for configuring 802.1X Defining 80.1X global settings on the device and defining specific 802.1X setting for Authentication each port individually. Monitor users have no access to this page.
  • Page 62 The 802.1X Setup Page contains the following fields: 80.1X Global Settings Port Based Authentication State — Indicates if Port Authentication is enabled on the device. The possible field values are: Enabled — Enables port-based authentication on the device. Disabled — Disables port-based authentication on the device. This is the default value.
  • Page 63 HAPTER ANAGING EVICE ECURITY 80.1X Port Settings Admin Port Control — Displays the admin port authorization state. Guest VLAN — Specifies whether the Guest VLAN is enabled on the port. The possible field values are: Periodic Reauthentication — Enables periodic reauthentication on the port.
  • Page 64: Defining Access Control Lists

    Defining Access Access Control Lists (ACL) allow network managers to define classifi- Control Lists cation actions and rules for specific ingress ports. Packets entering an ingress port, with an active ACL are either admitted or denied entry. If they are denied entry, the port can be disabled. For example, an ACL rule is defined states that port number 20 can receive TCP packets, however, if a UDP packet is received, the packet is dropped.
  • Page 65 HAPTER ANAGING EVICE Viewing MAC Based The MAC Based ACL Summary Page displays information regarding MAC Based ACLs configured on the device. Ports are reactivated from ACLs the Interface Configuration Page. To view MAC Based ACLs: 1 Click Device > ACL > MAC Based ACL > Summary. The MAC Based ACL Summary Page opens.
  • Page 66 The MAC Based ACL Summary Page contains the following fields: ACL Name — Contains a list of the MAC-based ACLs. Priority — Indicates the rule priority, which determines which rule is matched to a packet on a first match basis. Source Address —...
  • Page 67 HAPTER ANAGING EVICE Configuring MAC The MAC Based ACL Setup Page allows the network administrator to Based ACLs select, create, and define rules for MAC-based Access Control Lists. Monitor users have no access to this page. 1 Click Device > ACL > MAC Based ACL > Setup. The MAC Based ACL Setup Page opens.
  • Page 68 4: M HAPTER ANAGING EVICE ECURITY Source Mask — Indicates the source MAC Address wildcard mask.Wildcards are used to mask all or part of a source MAC address. Wildcard masks specify which bits are used and which are ignored. A wildcard mask of FF:FF:FF:FF:FF:FF indicates that no bit is important.
  • Page 69 HAPTER ANAGING EVICE ECURITY VLAN ID — Matches the packet’s VLAN ID to the ACE. The possible field values are 1 to 4094. CoS — Classifies traffic based on the CoS tag value. CoS Mask — Defines the CoS mask used to classify network traffic.
  • Page 70 Modifying MAC The MAC Based ACL Modify Page allows the network administrator to Based ACLs modify MAC Based ACLs settings. Monitor users have no access to this page. 1 Click Device > ACL > MAC Based ACL > Modify. The MAC Based ACL Modify Page opens.
  • Page 71 HAPTER ANAGING EVICE ECURITY mask of FF:FF:FF:FF:FF:FF indicates that no bit is important. A wildcard of 00.00.00.00.00.00.00 indicates that all bits are important. For example, if the source MAC address is E0:3B:4A:C2: CA:E2 and the wildcard mask is 00:00:00:00:00:FF, the first five bytes of the MAC are used, while the last byte is ignored.
  • Page 72  Define the fields.  Click Apply. The Rule Setup settings are configured, and the device is updated. Removing MAC The MAC Based ACL Remove Page allows the user to remove MAC Based ACLs Based ACLs. Monitor users have no access to this page. To remove MAC Based ACLs: 1 Click Device >...
  • Page 73 4: M HAPTER ANAGING EVICE ECURITY Source Address — Matches the source MAC address to which packets are addressed to the ACE. Source Mask — Indicates the source MAC Address wildcard mask.Wildcards are used to mask all or part of a source MAC address.
  • Page 74 VLAN ID — Matches the packet’s VLAN ID to the ACE. The possible field values are 1 to 4094. CoS — Classifies Class of Service of the packet. CoS Mask — Defines the wildcard bits to be applied to the CoS. Ethertype —...
  • Page 75 HAPTER ANAGING EVICE Viewing IP Based The IP Based ACL Summary Page displays information regarding IP Based ACLs configured on the device. ACLs To view IP Based ACLs: 1 Click Device > ACL > IP Based ACL > Summary. The IP Based ACL Summary Page opens.
  • Page 76 Destination Port — Indicates the destination port that is matched packets. Enabled only when TCP or UDP are selected in the Protocol list. Flag Set — Indicates the TCP flag to which the packet is mapped. Source Address — Matches the source IP address to which packets are addressed to the ACL.
  • Page 77 HAPTER ANAGING EVICE Access Control Lists (ACL) allow network managers to define Defining IP Based classification actions and rules for specific ingress ports. Your switch ACLs supports up to 128 ACLs. Packets entering an ingress port, with an active ACL, are either admitted or denied entry. ACLs are composed of access control entries (ACEs) that are made of the filters that determine traffic classifications.
  • Page 78 Add Rules to ACL Priority — Defines the ACL priority. ACLs are checked on the first fit basis. The ACL priority defines the ACL order in the ACL list. Protocol — Indicates the protocol in the ACE to which the packet is matched.
  • Page 79 HAPTER ANAGING EVICE ECURITY For each TCP flag, the possible field values are: Source IP Address — If selected, enables matching the source port IP address to which packets are addressed to the ACE, according to a wildcard mask. The field value is either user defined or Any.
  • Page 80 ■ Destination IP Address — If selected, enables matching the destination port IP address to which packets are addressed to the ACE, according to a wildcard mask. The field value is either user defined or Any. If Any is selected, accepts any destination IP address and disables wildcard mask filtering.
  • Page 81 HAPTER ANAGING EVICE ECURITY Match DSCP — Matches the packet DSCP value to the ACL. Either the DSCP value or the IP Precedence value is used to match packets to ACLs. Match IP Precedence— Matches the packet IP Precedence value to the ACE.
  • Page 82 Modifying IP Based The IP Based ACL Modify Page allows the network administrator to ACLs modify IP Based ACLs settings. Monitor users have no access to this page. Figure  IP Based ACL Modify Page The IP Based ACL Modify Page contains the following fields: Modify Rule Selection ACL —...
  • Page 83 HAPTER ANAGING EVICE ECURITY Destination Port — Indicates the destination port that is matched packets. Enabled only when TCP or UDP are selected in the Protocol list. TCP Flags — If checked, enables configuration of TCP flags matched to the packet. The possible fields are: For each TCP flag, the possible field values are: Source IP Address —...
  • Page 84 Destination IP Address — Matches the destination IP address to which packets are addressed to the ACL. Wild Card Mask — Indicates the destination IP Address wildcard mask. Wildcards are used to filter a destination IP Address. Masks specify which bits are used and which bits are ignored.
  • Page 85 HAPTER ANAGING EVICE The IP Based ACL Remove Page allows the user to remove IP Based Removing IP Based ACLs. ACLs Monitor users have no access to this page. 1 Click Device > ACL > IP Based ACL > Remove. The IP Based ACL Remove Page opens.
  • Page 86 Destination Port — Defines the TCP/UDP destination port. Flag Set — Sets the indicated TCP flag matched to the packet. Source Address — Indicates the source IP address. Source Mask — Indicates the source IP address mask. Destination Address — Indicates the destination IP address. Destination Mask —...
  • Page 87 HAPTER ANAGING EVICE Viewing ACL The ACL Binding Summary Page displays the user-defined ACLs mapped to the interfaces. Binding To view ACL Binding: 1 Click Device > ACL > ACL Binding > Summary. The ACL Binding Summary Page opens. Figure  ACL Binding Summary Page The ACL Binding Summary Page contains the following fields: ECURITY Interface —...
  • Page 88 Configuring ACL The ACL Binding Setup Page allows the network administrator to bind Binding specific ports to MAC or IP Based ACLs. The monitor user has no access to this page. To define ACL Binding: 1 Click Device > ACL > ACL Binding > Setup. The ACL Binding Setup Page opens.
  • Page 89 HAPTER ANAGING EVICE ECURITY The ACL Binding Setup Page contains the following fields: Select Port(s) — Indicates the ports to be configured. Select All — Allows the user to assign the ACL to all ports. Select None — Removes the ports selected. Bind ACL —...
  • Page 90 Removing ACL The ACL Binding Remove Page allows the network administrator to Binding remove user-defined ACLs from a selected interface. The monitor user has no access to this page. To remove ACL Binding: 1 Click Device > ACL > ACL Binding > Remove. The ACL Binding Remove Page opens.
  • Page 91: Viewing Broadcast Storm

    HAPTER ANAGING EVICE Broadcast Storm limits the amount of Multicast and Broadcast frames Viewing Broadcast accepted and forwarded by the device. When Layer 2 frames are Storm forwarded, Broadcast and Multicast frames are flooded to all ports on the relevant VLAN. This occupies bandwidth, and loads all nodes on all ports.
  • Page 92 To view Broadcast Storm Traffic: 1 Click Device > Broadcast Storm > Summary. The Broadcast Storm Setup Page opens. Monitor users have no access to this page. Figure 8 Broadcast Storm Summary Page The Broadcast Storm Summary Page contains the following fields: Port —...
  • Page 93 HAPTER ANAGING EVICE Modifying The Broadcast Storm Modify Page allows the network administrator to modify Broadcast Storm settings. Broadcast Storm Monitor users have no access to this page. 1 Click Device > Broadcast Storm > Modify. The Broadcast Storm Modify Page opens. Figure 9 Broadcast Storm Modify Page The Broadcast Storm Modify Page contains the following fields: ECURITY...
  • Page 94 Broadcast Rate Threshold (10-00,000) — Indicates the maximum rate (packets per second) at which Broadcast or Broadcast&Multicast packets are forwarded. The range is 10-500,000. The default value is 100. Select Port(s) — Indicates the ports to be configured. Select All — Allows the user to assign the Broadcast Mode to all ports.
  • Page 95: Viewing System Description

    GENERAL SYSTEM INFORMATION This section contains information about configuring general system parameters, and includes the following: The Device View Page displays parameters for configuring general Viewing System device information, including the system name, MAC Address, software Description and hardware versions, and more. 1 Click Device Summary.
  • Page 96 System Contact — Displays the name of the contact person. See “Configuring System Name Information” page 86. Serial Number — Displays the device serial number. Not editable. Product C Number — Displays the 3Com device model number. Not editable. System Object ID — Displays the vendor’s authoritative identification of the network management subsystem contained in the entity.
  • Page 97: Configuring System Name Information

    HAPTER ENERAL YSTEM NFORMATION Configuring System The System Name Page allows the Network Administrator to provide a user-defined system name, location, and contact information for the Name Information device. Monitor users have read-only permissions on this page. To configure the System Name: 1 Click Administration >...
  • Page 98: Configuring System Time

     Define the fields.  Click Apply. The System Name is enabled, and the device is updated. 4 Be sure to save your configuration, or the changes will be lost when the switch is rebooted. To save the configuration, refer to “Saving the Configuration”...
  • Page 99 HAPTER ENERAL YSTEM NFORMATION The System Time Setup Page contains the following sections: Current Time — Displays the current time in Mon-Day-Year Hour: Min:Sec. Daylight Saving — This check box enables and disables automatic Daylight Saving Time (DST) on the switch. Use NTP Server —Use the Simple Network Time Protocol to get the time from the time server.
  • Page 100 HAPTER ENERAL YSTEM NFORMATION  Define the Time Zone for the NTP server option.  Click the Daylight Saving Box to enable or disable automatic DST option. 4 Manually define the related fields for NTP server or local date and time.
  • Page 101: Onfiguring Orts

    This section contains information for configuring Port Settings, and includes the following sections: Viewing Port The Port Administration Summary Page permits the network manager to view the current port and LAG setting configuration. The Port Settings Administration Summary Page also displays to which LAGs the port belongs.
  • Page 102 To view Port Settings: Click Port > Administration > Summary. The Port Administration Summary Page opens. Figure 4 Port Administration Summary Page The Port Administration Summary Page contains the following fields: Port — Indicates the selected port number. Port Status — Indicates whether the port is currently operational or non-operational.
  • Page 103 HAPTER 6: ONFIGURING ORTS Speed — Displays the configured rate for the port. The port type determines what speed setting options are available. Port speeds can only be configured when auto-negotiation is disabled. The possible field values are: Duplex — Displays the port duplex mode. This field is configurable only when auto-negotiation is disabled, and the port speed is set to 10M or 100M or 1000M per second.
  • Page 104: Defining Port Settings

    Defining Port The Port Administration Setup Page allows network managers to configure port parameters for specific ports. Settings Monitor users have no access to this page. To configure Port Settings: Figure 44 Port Administration Setup Page The Port Administration Setup Page contains the following fields: Click Port >...
  • Page 105 HAPTER 6: ONFIGURING ORTS Speed — Defines the configured rate for the port. The port speed determines what speed setting options are available. Port speeds can only be configured when auto negotiation is disabled. The possible field values are: Duplex — Defines the port duplex mode. This field is configurable only when auto-negotiation is disabled.
  • Page 106: Viewing Port Details

    Viewing Port The Port Detail Page displays current port parameters for specific ports. Details To view Port Details: opens. Figure 4 Port Detail Page The Port Detail Page contains the following fields: Click Port > Administration > Detail. The Port Detail Page Select a Port —...
  • Page 107 HAPTER 6: ONFIGURING ORTS Speed — Displays the configured rate for the port. The port type determines what speed setting options are available. Port speeds can only be configured when auto-negotiation is disabled. The possible field values are: The value in the bracket indicates the current operating speed. Duplex —...
  • Page 108: Aggregating Ports

    This section contains information for configuring Link Aggregation, which optimizes port usage by linking a group of ports together to form a single LAG. A Link Aggregated Group (LAG) aggregates ports or VLANs into a single virtual port or VLAN. Aggregating ports multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy.
  • Page 109: Viewing Link Aggregation

    HAPTER 7: GGREGATING ORTS Viewing Link The Link Aggregation Summary Page displays port usage by linking a group of ports together to form a single LAG. Aggregating ports Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. To view Link Aggregation: Figure 4 Link Aggregation Summary Page The Link Aggregation Summary Page includes the following fields:...
  • Page 110: Configuring Link Aggregation

    Configuring Link The Link Aggregation Create Page optimizes port usage by linking a group of ports together to form a single LAG. Aggregating ports Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. Monitor users have no access to this page. Create Page opens.
  • Page 111: Modifying Link Aggregation

    HAPTER 7: GGREGATING ORTS Summary Modifying Link The Link Aggregation Modify Page optimizes port usage by linking a Aggregation group of ports together to form a single LAG. Aggregating ports multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. Monitor users have no access to this page.
  • Page 112 The Link Aggregation Modify Page includes the following fields: Select Aggregation to Modify — Selects the Link Aggregation Group ID to modify. Selected Ports — Allows the network manager to select ports to be added or removed from a current aggregation. The selected or deselected ports are color-coded as follows: Blue —...
  • Page 113: Removing Link Aggregation

    HAPTER 7: GGREGATING ORTS Removing Link The Link Aggregation Remove Page allows the network manager to remove group IDs containing member ports. Aggregation Monitor users have no access to this page. To remove Link Aggregation: Figure 49 Link Aggregation Remove Page The Link Aggregation Remove Page includes the following fields: Click Ports >...
  • Page 114: Viewing Lacp

    Viewing LACP LAG ports can contain different media types if the ports are operating at the same speed. Aggregated links can be set up manually or automatically established by enabling LACP on the relevant links. Aggregate ports can be linked into link-aggregation port-groups. The LACP Summary Page contains fields for viewing LACP LAGs.
  • Page 115: Defining Lacp Priority

    HAPTER 7: GGREGATING ORTS LAG ports can contain different media types if the ports are operating Defining LACP Prior- at the same speed. Aggregated links can be set up manually or automatically established by enabling LACP on the relevant links. Aggregate ports can be linked into link-aggregation port-groups.
  • Page 116: Defining Lacp Port

    LAG ports can contain different media types if the ports are operating Defining LACP Port at the same speed. Aggregated links can be set up manually or auto- matically established by enabling LACP on the relevant links. Aggregate ports can be linked into link-aggregation port-groups. The LACP Port Setup Page contains fields for modifying LACP LAGs.
  • Page 117: Configuring Vlans

    HAPTER 8: ONFIGURING This section contains the following topics: ■ ■ ■ ■ ■ ■ ■ VLANs are logical subgroups with a Local Area Network (LAN) which VLAN Overview combine user stations and network devices into a single unit, regardless of the physical LAN segment to which they are attached.
  • Page 118 VLANS 107 HAPTER 8: ONFIGURING VLANs function at Layer 2. Since VLANs isolate traffic within the VLAN, a Layer 3 router working at a protocol level is required to allow traffic flow between VLANs. Layer 3 routers identify segments and coordinate with VLANs.
  • Page 119: Viewing Vlan Details

    HAPTER 8: ONFIGURING Viewing VLAN The VLAN Detail Page provides information and global parameters on Details VLANS configured on the system. Figure 53 VLAN Detail Page The VLAN Detail Page contains the following information: ■ ■ Click Device > VLAN > VLAN Detail. The VLAN Detail Page opens.
  • Page 120: Viewing Vlan Port Details

    The VLAN Port Detail Page provides displays VLAN configured ports. Viewing VLAN Port Details To view VLAN Port details: Figure 54 The VLAN Port Detail Page contains the following information: Click Device > VLAN > Port Detail. The VLAN Port Detail Page opens.
  • Page 121: Creating Vlans

    HAPTER 8: ONFIGURING Creating VLANs The VLAN Setup Page allows the network administrator to create user- defined VLANs. To view Voice VLAN Settings: The monitor users have no access to this page. To create VLANs: Figure 55 VLAN Setup Page The VLAN Setup Page contains the following fields: Create Click Device >...
  • Page 122: Rename The Vlans

    Rename the VLANS The VLAN Rename Page allows the network administrator to rename user-defined VLAN name. The monitor users have no access to this page. To rename VLANs: Figure 56 VLAN Rename Page The VLAN Rename Page contains the following fields: To rename a VLAN: Click Device >...
  • Page 123: Modifying Vlan Settings

    HAPTER 8: ONFIGURING Modifying VLAN The Modify VLAN Page allows the network manager to change VLAN membership. Settings The monitor users have no access to this page. To edit VLAN Settings: Figure 57 Modify VLAN Page The Modify VLAN Page contains the following fields: ■...
  • Page 124 Select Membership Type — Displays the membership type for ■ each VLAN. The possible field values are: Untagged — Indicates the interface is an untagged member of the VLAN. Tagged — Indicates the interface is a tagged member of a VLAN.
  • Page 125: Modifying Port Vlan Settings

    HAPTER 8: ONFIGURING The Modify VLAN Port Page allows the network manager to modify Modifying Port port VLAN settings. VLAN Settings The monitor users have no access to this page. Figure 58 Modify VLAN Port Page The Modify VLAN Port Page contains the following fields: Click Device >...
  • Page 126: Removing Vlans

    The VLAN Remove Page allows the network administrator to remove Removing VLANs VLANs. The monitor users have no access to this page. 1 Click Device > VLAN > Remove. The VLAN Remove Page opens. Figure 59 VLAN Remove Page Not Available for Selection — Indicates the interface is not available for selection.
  • Page 127 HAPTER 8: ONFIGURING The VLAN Remove Page contains the following fields: ID — Displays the VLAN ID. Name — Displays the user-defined VLAN name. Select All — Allows the user to select the entire table to be removed. Select the VLAN ID to be deleted. Click Remove.
  • Page 128: Defining Ip Addressing

    This section contains information for defining IP interfaces, and includes the following sections: Defining IP The IP Setup Page contains fields for assigning an IP address. The default gateway is erased when the Default IP address is modified. Addressing Packets are forwarded to the default gateway when sent to a remote network.
  • Page 129: Configuring Arp Settings

    HAPTER9: ONFIGURING The IP Setup Page contains the following fields: ■ Configuring ARP The Address Resolution Protocol (ARP) converts IP addresses into physi- cal addresses, and maps the IP address to a MAC address. ARP allows Settings a host to communicate with other hosts when only the IP address of its neighbors is known.
  • Page 130: Viewing Arp Settings

    The ARP Settings Summary Page displays the current ARP settings. Viewing ARP To view ARP Settings: Settings Figure 61 ARP Settings Summary Page The ARP Settings Summary Page contains the following fields: HAPTER 9: ONFIGURING Click Administration > ARP Settings > Summary. The ARP Settings Summary Page opens.
  • Page 131: Defining Arp Settings

    HAPTER9: ONFIGURING The ARP Settings Setup Page allows network managers to define ARP Defining ARP parameters for specific interfaces. Settings The monitor users have no access to this page. To configure ARP entries: Figure 62 ARP Settings Setup Page The ARP Settings Setup Page contains the following fields:■ MAC A DDRESS NFORMATION...
  • Page 132: Removing Arp Entries

    Removing ARP The ARP Settings Remove Page provides parameters for removing ARP entries from the ARP Table. Entries The monitor user has no access to this page. To remove ARP entries: Figure 63 ARP Settings Remove Page The ARP Settings Remove Page contains the following fields:■ are cleared.
  • Page 133: Configuring Address Tables

    HAPTER9: ONFIGURING MAC addresses are stored in either the Static Address or the Dynamic Configuring Address databases. A packet addressed to a destination stored in one of Address Tables the databases is forwarded immediately to the port. The Dynamic Ad- dress Table can be sorted by interface, VLAN, and MAC Address.
  • Page 134: Viewing Address Table Settings

    This section includes the following sections: Viewing Address The Address Table Summary Page displays the current MAC address Table Settings table configuration. To view Address Table settings: Figure 64 Address Table Summary Page HAPTER 9: ONFIGURING Viewing Address Table Settings Viewing Port Summary Settings Adding Entries into Address Tables Defining Aging Time...
  • Page 135 HAPTER9: ONFIGURING The Address Table Summary Page contains the following fields: State — Filters the list of MAC Addresses displayed according to the type of MAC Address configuration. Possible values are: MAC Address — Displays the current MAC addresses listed in the MAC address table, filtered by the selected value of the State field.
  • Page 136: Viewing Port Summary Settings

    Viewing Port The Port Summary Page allows the user to view the MAC addresses Summary Settings assigned to specific ports. Figure 65 Port Summary Page The Port Summary Page contains the following fields: HAPTER 9: ONFIGURING Click Monitoring > Address Tables > Port Summary. The Port Summary Page opens.
  • Page 137: Adding Entries Into Address Tables

    HAPTER9: ONFIGURING The Address Table Add Page allows the network manager to assign MAC Adding Entries into addresses to ports with VLANs. Address Tables The monitor users have no access to this page. To add Address Tables: Figure 66 Address Table Add Page DDRESS NFORMATION State —...
  • Page 138 HAPTER 9: The Address Table Add Page contains the following fields: VLAN ID — Assigns a VLAN ID to the user-defined MAC Address. MAC Address — Defines a MAC Address to be assigned to the specific port and VLAN ID. No Aging —...
  • Page 139: Defining Aging Time

    HAPTER9: ONFIGURING Defining Aging Time The Address Table Setup Page allows the network manager to define the Address Table Aging Time. The Aging Time is the amount of time the MAC Addresses remain in the Dynamic MAC Address Table before they are timed out if no traffic from the source is detected.
  • Page 140: Removing Address Table Ports

    The Port Remove Page allows the network manager to remove ports Removing Address from the address tables. Table Ports The monitor users have no access to this page. To remove ports: Figure 68 Port Remove Page The Port Remove Page contains the following fields: ■...
  • Page 141: Remove Address Table

    HAPTER9: ONFIGURING ■ Remove address The Address Table Remove Page allows the network manager to remove current MAC addresses from the Address Table. Table The monitor users have no access to this page. To remove Address Tables: Figure 69 Address Table Remove Page DDRESS NFORMATION Aging Time —Indicates that the MAC address is aged out or not.
  • Page 142 HAPTER 9: The Address Table Remove Page contains the following fields: MAC Address — Displays the current MAC addresses listed in the MAC address table. VLAN ID — Displays the VLAN ID attached to the MAC Address. State — Displays the MAC address configuration method. Possible values are: ■...
  • Page 143: Onfiguring Igmp S Nooping & Q Uery

    HAPTER10: ONFIGURING Introduction This section contains information for configuring IGMP Snooping & Query. When IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. The CPU analyzes the incoming packets and determines: ■ When IGMP Snooping is enabled and IGMP Query globally, the device issues IGMP query.
  • Page 144 Figure 70 IGMP Snooping & Query Setup Page The IGMP Snooping & Query Setup Page contains the following fields: IGMP Snooping Status — Indicates if IGMP Snooping is enabled ■ on the device. The possible field values are: ■ Disabled — Indicates that IGMP Snooping is Disabled on the device.
  • Page 145 HAPTER10: ONFIGURING NOOPING & ■ IGMP Query Status — Indicates if IGMP Query is enabled on the VLAN. The possible field values are: Select Enabled IGMP Snooping. Define the fields. Click Apply. IGMP settings are applied, and the device is updated UERy Disabled —...
  • Page 146: Configuring Spanning Tree

    This section contains information for configuring STP. The Spanning Tree Protocol (STP) provides tree topography for any arrangement of bridges. STP also provides a single path between end stations on a network, eliminating loops. Loops occur when alternate routes exist between hosts. Loops in an extended network can cause bridges to forward traffic indefinitely, resulting in increased traffic and reducing network efficiency.
  • Page 147: Viewing Spanning Tree

    HAPTER11: ONFIGURING PANNING Viewing Spanning The Spanning Tree Summary Page displays the current Spanning Tree parameters for all ports. Tree To view Spanning Tree Summary: Figure 71 Spanning Tree Summary Page The Spanning Tree Summary Page contains the following fields:■ ■...
  • Page 148 Edge Port — Indicates if Edge Port is enabled on the port. If Edge ■ Port is enabled for a port, the Port State is automatically placed in the Forwarding state when the port link is up. Edge Port optimizes the STP protocol convergence.
  • Page 149: Defining Spanning Tree

    HAPTER11: ONFIGURING PANNING Defining Spanning Network administrators can assign STP settings to specific interfaces Tree using the Spanning Tree Setup Page. The monitor user has no access to this page. To configure Spanning Tree Setup: Figure 72 Spanning Tree Setup Page The Spanning Tree Setup Page contains the following fields: Priority —...
  • Page 150: Modifying Spanning Tree

    Modifying Spanning The Spanning Tree Port Setup Page contains information for modifying Tree Spanning Tree parameters. Monitor users have no access to this page. To modify Spanning Tree: Priority — Specifies the bridge priority value. When switches or bridges are running STP, each is assigned a priority. After exchanging BPDUs, the device with the lowest priority value be comes the Root Bridge.
  • Page 151 HAPTER11: ONFIGURING PANNING Figure 73 Spanning Tree Port Setup Page The Spanning Tree Port Setup Page contains the following fields: Status — Specifies if STP is enabled on the port. The possible field values are: Edge Port —Specifies if Edge Port is enabled on the port. If Edge Port is enabled for a port, the Port State is automatically placed in the Forwarding state when the port link is up.
  • Page 152 Enabled —Specifies the Edge Port is enabled on the port. Disabled —Specifies the Edge Port is disabled on the port. No Change —Maintains the current the Edge Port settings. This is the default value. Link Type — Specifies the RSTP link type. The possible field values are: Point to Point —Enables the device to establish a Point-to-Point link on the port.
  • Page 153: Onfiguring Snmp

    HAPTER12: ONFIGURING ONFIGURING Simple Network Management Protocol (SNMP) provides a method for managing network devices. The device supports the following SNMP versions: The SNMP agents maintain a list of variables, which are used to manage SNMP v1 and v2c the device. The variables are defined in the Management Information Base (MIB).
  • Page 154: Defining Snmp Communities

    Access rights are managed by defining communities in the SNMP Com- Defining SNMP munities Setup Page. When the community names are changed, access Communities rights are also changed. SNMP communities are defined only for SNMP v1 and SNMP v2c. Monitor users have no access to this page. To define SNMP communities: Figure 74 SNMP Communities Setup Page The SNMP Communities Setup Page contains the following fields:...
  • Page 155 HAPTER12: ONFIGURING SNMP Management Management Station — Displays the management station IP address for which the SNMP community is defined. Open Access — Provides SNMP access to all the stations. Community String Standard — Displays pre-defined community strings. The possible field values are: User Defined —...
  • Page 156: Removing Snmp Communities

    Removing SNMP The SNMP Communities Remove Page allows the system manager to remove SNMP Communities. Communities Monitor users have no access to this page. To remove SNMP communities: Figure 75 SNMP Communities Remove Page The SNMP Communities Remove Page contains the following fields: ■...
  • Page 157: Defining Snmp Traps

    HAPTER12: ONFIGURING ■ The SNMP Traps Setup Page contains information for defining filters that Defining SNMP determine whether traps are sent to specific users, and the trap type Traps sent. Monitor users have no access to this page. To define SNMP traps: Figure 76 SNMP Traps Setup Page Access Mode —...
  • Page 158: Removing Snmp Traps

    The SNMP Traps Setup Page contains the following fields: ■ ■ ■ The SNMP Traps Remove Page allows the network manager to remove Removing SNMP SNMP Traps. Traps Monitor users have no access to this page. To remove SNMP traps: Recipients IP Address —...
  • Page 159 HAPTER12: ONFIGURING Figure 77 SNMP Traps Remove Page The SNMP Traps Remove Page contains the following fields: Remove — Deletes the currently selected recipient. The possible ■ field values are: ■ Recipients IP — Defines the IP address to which the traps are sent. Trap —...
  • Page 160: Onfiguring Uality Of Ervices

    Quality of Service (QoS) provides the ability to implement QoS and priority queuing within a network. For example, certain types of traffic that require minimal delay, such as Voice, Video, and real-time traffic can be assigned a high priority queue, while other traffic can be assigned a lower priority queue.
  • Page 161: Viewing Cos Settings

    HAPTER 13: ONFIGURING UALITY Viewing CoS The CoS Summary Page displays CoS default settings assigned to ports. Settings To view CoS Settings: opens. Figure78 CoS Summary Page The CoS Summary Page contains the following fields: ERVICE Click Device > QoS > CoS > Summary. The CoS Summary Page Interface —...
  • Page 162: Defining Cos

    Defining CoS The CoS Setup Page contains information for enabling QoS globally. Monitor users have no access to this page. To configure CoS Settings: Figure79 CoS Setup Page The CoS Setup Page contains the following fields: Click Device > QoS > CoS Setup. The CoS Setup Page opens. QoS Mode —...
  • Page 163: Defining Queuing Algorithm

    HAPTER 13: ONFIGURING UALITY Defining Queuing The Queue Setup Page provides two scheduling methods: strict and weighted round robin (WRR).When QoS mode is disabled in the CoS Algorithm Setup page, the scheduling method will be the default setting, WRR. Monitor users have no access to this page To configure Queue Settings: Figure 80 The Queue Setup Page contains the following fields:...
  • Page 164: Viewing Cos To Queue

    Viewing CoS to The CoS to Queue Summary Page contains a table that displays the CoS values mapped to traffic queues. Queue To view CoS Values to Queues: Queue Summary Page opens. Figure81 CoS to Queue Summary Page The CoS to Queue Summary Page contains the following fields: Defining CoS to The CoS to Queue Setup Page contains fields for mapping CoS values to traffic queues.
  • Page 165 HAPTER 13: ONFIGURING UALITY To configure CoS values to queues: Click Device > QoS > CoS to Queue > Setup. The CoS to Queue Setup Page opens. Figure 82 The CoS to Queue Setup Page contains the following fields: Restore Defaults — Restores the device factory defaults for mapping CoS values to a forwarding queue.
  • Page 166: Viewing Dscp To Cos

    Viewing DSCP to The DSCP to CoS Summary Page contains fields for mapping DSCP settings to traffic queues. For example, a packet with a DSCP tag value of 3 can be assigned to queue 4. To view the DSCP Queue: Figure 83 DSCP to CoS Summary Page The DSCP to CoS Summary Page contains the following fields: Click Device >...
  • Page 167: Configuring Dscp To Cos

    HAPTER 13: ONFIGURING UALITY Configuring DSCP The DSCP to CoS Setup Page contains fields for mapping DSCP settings to values of CoS. For example, a packet with a DSCP tag value of 3 can to CoS be assigned to CoS 1. The monitor user has no access to this page.
  • Page 168: Configuring Trust Settings

    Configuring Trust The Trust Setup Page contains information for enabling trust on configured interfaces. The original device QoS default settings can be Settings reassigned to the interface in the Trust Setup Page. To enable Trust: Figure 85 The Trust Setup Page contains the following fields: 2 Define the fields.
  • Page 169: Viewing Bandwidth Settings

    HAPTER 13: ONFIGURING UALITY Viewing Bandwidth The Bandwidth Summary Page displays bandwidth settings for a specified interface. Settings To view Bandwidth Settings: Figure 86 The Bandwidth Summary Page contains the following fields: Ingress Rate Limit ERVICE Click Device > QoS > Bandwidth > Summary. The Bandwidth Summary Page opens.
  • Page 170: Defining Bandwidth Settings

    Egress Shaping Rates Defining The Bandwidth Setup Page allows network managers to define the bandwidth settings for a specified interface. Interface shaping can be Bandwidth Settings based on an interface and is determined by the lower specified value. The interface shaping type is selected in the Bandwidth Setup Page. The monitor user has no access to this page.
  • Page 171 HAPTER 13: ONFIGURING UALITY The Bandwidth Setup Page contains the following fields: Ingress Rate Limit Enable Ingress Rate Limit — Enables setting an Ingress Rate Limit. Ingress Rate Limit — Indicates the traffic limit for the port. The possible field value is 128-500,032 kbits per second. Egress Shaping Rate Enable Egress Shaping Rate —...
  • Page 172: Defining Voice Vlan

    Voice VLAN allows network administrators to enhance the VoIP service Defining Voice by configuring ports to carry IP voice traffic from IP phones on a specific VLAN VLAN. VoIP traffic has a preconfigured OUI prefix in the source MAC address. Network Administrators can configure VLANs on which voice IP traffic is forwarded.
  • Page 173 HAPTER 13: ONFIGURING UALITY Viewing Voice VLAN The Voice VLAN Summary Page contains information about the Voice VLAN currently enabled on the device, including the ports enabled and included in the Voice VLAN. To view Voice VLAN Settings: Figure 88 Voice VLAN Summary Page The Voice VLAN Summary Page contains the following fields: ERVICE Click Device >...
  • Page 174 Defining Voice The Voice VLAN Setup Page provides information for enabling and defining Voice VLAN globally on the device. VLANs To configure Voice VLAN Settings: Figure 89 Voice VLAN Setup Page The Voice VLAN Setup Page contains the following fields: Address table.
  • Page 175 HAPTER 13: ONFIGURING UALITY The Voice VLAN Port Setup Page contains information for defining Defining Voice VLAN Voice VLAN port settings. Port Settings To configure Voice VLAN port settings: Figure 90 Voice VLAN Port Setup Page ERVICE Voice VLAN ID — Defines the Voice VLAN ID number. Voice VLAN Aging Time —...
  • Page 176 The Voice VLAN Port Setup Page contains the following fields: Voice VLAN Port Mode — Defines the Voice VLAN mode. The possible field values are: No Changes — Maintains the current Voice VLAN port settings. This is the default value. None —...
  • Page 177 HAPTER 13: ONFIGURING UALITY The Voice VLAN Port Details Page displays the Voice VLAN port settings Viewing Voice VLAN for specific ports. Port Definitions To view Voice VLAN Port Detail Settings: Figure 91 Voice VLAN Port Details Page ERVICE Click a port in the Zoom View. The port is highlighted in blue. Define the Voice VLAN Port Mode and Voice VLAN Security fields.
  • Page 178 The Voice VLAN Port Details Page contains the following fields: Viewing the OUI The Voice VLAN OUI Summary Page lists the Organizationally Unique Identifiers (OUIs) associated with the Voice VLAN. The first three bytes Summaries of the MAC Address contain a manufacturer identifier. The last three bytes contain a unique station ID.
  • Page 179 Voice VLAN. The following OUIs are enabled by default. Description — Provides an OUI description (up to 32 characters). ERVICE 00:E0:BB — Assigned to 3Com IP Phones. 00:03:6B — Assigned to Cisco IP Phones. 00:E0:75 — Assigned to Polycom/Veritel IP Phones.
  • Page 180 Modifying OUI The Voice VLAN OUI Modify Page allows network administrators to add new OUIs or to remove previously defined OUIs from the Voice VLAN. Definitions The OUI is the first half on the MAC address and is manufacture specific. The last three bytes contain a unique station ID. The packet priority derives from the source/destination MAC prefix.
  • Page 181: Anaging Ystem Iles

    Configuration File Structure ANAGING This section contains information about managing the configuration files and installing and backing up the switch firmware. This section includes the following topics: Configuration File Structure Backing Up System Files Restoring Files Upgrade the Firmware Image Activating Image Files The configuration file structure consists of the following: Startup Configuration File —...
  • Page 182: Backing Up System Files

    Backing Up System The Backup Page permits network managers to backup the system configuration to a TFTP or HTTP server. Files The monitor users have no access to this page. Figure 94 Backup Page The Backup Page contains the following fields: 4 Click Apply. The backup file is defined, and the device is updated. To keep your currently running configuration, click the Save Configuration item on the left side of the page.
  • Page 183: Restoring Files

    HAPTER 14: AnAgIng YSTEM Restoring Files The Restore Page restores files from the TFTP or HTTP server. The monitor users have no access to this page. Figure 95 Restore Page The Restore Page contains the following fields: Configuration Download IlES Click Administration > Backup & Restore > Restore. The Restore Page opens. Download via TFTP —...
  • Page 184: Upgrade The Firmware Image

    Upgrade the The Restore Image Page permits network managers to upgrade the switch firmware. Firmware Image To download the software image: 1 Click Administration > Firmware Upgrade > Restore Image. Figure 96 Restore Image Page The Restore Image Page contains the following fields: note: The bootcode can only be upgraded using the Command line Interface (ClI).
  • Page 185: Activating Image Files

    HAPTER 14: AnAgIng YSTEM Activating Image The Active Image Page allows network managers to select and reset the Image files. Files To upload System files: Figure 97 Active Image Page The Active Image Page contains the following fields: IlES Click Administration > Firmware Upgrade > Active Image. The Active Image Page opens. Active Image After Reset —...
  • Page 186: Iewing Tatistics Tatitatisticstictatistics

    This section contains information about viewing port statistics. Viewing Port The Port Statistics Summary Page contains fields for viewing Information about device utilization and errors that occurred on the device. Statistics To view RMOn statistics: 1 Click Ports > Statistics > Summary. The Port Statistics Summary Figure 98 Port Statistics Summary Page The Port Statistics Summary Page contains the following fields: IEWING...
  • Page 187 HAPTER 15: IEWIng TATISTICS Refresh Rate — Defines the amount of time that passes before the interface statistics are refreshed. The possible field values are: Received Bytes (Octets) — Displays the number of octets received on the interface since the device was last refreshed. This number includes bad packets and FCS octets, but excludes framing bits.
  • Page 188 Fragments — Displays the number of fragments (packets with less than 64 octets, excluding framing bits, but including FCS octets) received on the interface since the device was last refreshed. Jabbers — Displays the total number of received packets that were longer than 1518 octets.
  • Page 189: Anaging Evice Iagnostics

    Configuring Port Mirroring ANAGING This section contains information for viewing and configuring port and cable diagnostics, and includes the following topics: Configuring Port Mirroring Viewing Cable Diagnostics Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port.
  • Page 190 Defining Port The Port Mirroring Setup Page contains parameters for configuring port mirroring. Mirroring To enable port mirroring: Figure 99 Port Mirroring Setup Page The Port Mirroring Setup Page contains the following fields: Click Monitoring > Port Mirroring > Setup. The Port Mirroring Setup Page opens. Select Port Type — Defines the port that will be the monitor port (destination port) and the port that will be mirrored (source port).
  • Page 191 HAPTER 16: AnAgIng EVICE Removing Port The Port Mirroring Remove Page permits the network manager to Mirroring terminate port mirroring or monitoring. The monitor users have no access to this page. Figure 100 Port Mirroring Remove Page IAgnOSTICS Select port — Selects the port for mirroring or monitoring. A port unavailable for mirroring is colored grey.
  • Page 192: Viewing Cable Diagnostics

    The Port Mirroring Remove Page contains the following fields: The Cable Diagnostics Summary Page contains fields for viewing tests Viewing Cable on copper cables. Cable testing provides information about where Diagnostics errors occurred in the cable, the last time a cable test was performed, and the type of cable error which occurred.
  • Page 193 HAPTER 16: AnAgIng EVICE The Cable Diagnostics Summary Page contains the following fields: The Diagnostics Page contains fields for performing tests on copper Configuring Cable cables. Cable testing provides information about where errors occurred Diagnostics in the cable, the last time a cable test was performed, and the type of cable error, which occurred.
  • Page 194 To test cables: Click Monitoring > Cable Diagnostics > Diagnostics. The Diagnostics Page opens. Figure 102 Diagnostics Page The Diagnostics Page contains the following fields: Select a Port — Specifies the port to be tested. Test Result — Displays the cable test results. Possible values: Open — Indicates that a cable is not connected to the cable but is either connected on only one side or the cable is 1 meter.
  • Page 195: Om Etwork Anagement

    3nS is configured with intelligent defaults and the ability to detect network misconfigurations. It can also offer optimization suggestions, making this application ideal for network managers with all levels of experience. To find out more about 3Com network Supervisor and to download a trial version, go to: www.3com.com/3ns ANAGEMENT...
  • Page 196: 3Com Network Director

    Director networks. By using 3nD you can discover, map, and monitor all your 3Com devices on the network. It simplifies tasks such as backup and restore for 3Com device configurations as well as firmware and agent upgrades. 3nD makes it easy to roll out network-wide configuration changes with its intelligent VlAn configuration tools and the powerful template based configuration tools.
  • Page 197: 3Com Enterprise Management Suite

    The client-server offering operates on Windows and UnIX (linux and Solaris) systems. 3Com EMS is available in four packages, varying in the maximum number of devices actively managed. These include SnMP-capable devices such as switches, routers, security switches, the 3Com VCX™...
  • Page 198: Features

    Related Standard The 3Com® Baseline Switch 2948-SFP Plus has been designed to the following standards: Function Safety EMC Emissions EMC Immunity Operating Temperature Environmental Storage Temperature Humidity Standard Width Physical Depth Height Weight Mounting EVICE PECIFICATIONS AND EATURES 8802-3, IEEE 802.3 (Ethernet), IEEE 802.3u (Fast Ethernet), IEEE 802.3ab (gigabit Ethernet), IEEE 802.1D (Bridging)
  • Page 199: Electrical

    PPEnDIX EVICE PECIFICATIOn AnD Electrical Line Frequency Input Voltage Current Rating Switch 2948-SFP Plus Maximum Power Consumption Switch 2948-SFP Plus Max Heat Dissipation Switch 2948-SFP Plus Switch Features This section describes the device features. The system supports the following features: Table 11 Features of the Baseline Switch 2948-SFP Plus Feature Auto-negotiation EATURES...
  • Page 200 Table 11 Features of the Baseline Switch 2948-SFP Plus Feature Automatic MAC Addresses Aging Back Pressure Address Resolution Protocol (ARP) Class Of Service (CoS) Command line Interface Configuration File Management DHCP Clients Fast link Full 802.1Q VlAn PPEnDIX Description MAC addresses from which no traffic is received for a given period are aged out.
  • Page 201 PPEnDIX EVICE PECIFICATIOn AnD Table 11 Features of the Baseline Switch 2948-SFP Plus Feature IgMP Snooping link Aggregated groups MAC Address Capacity Support MAC Multicast Support MDI/MDIX Support Password Management Port-based EATURES Description IgMP Snooping examines IgMP frame contents, when they are forwarded by the device from work stations to an upstream Multicast router.
  • Page 202 Table 11 Features of the Baseline Switch 2948-SFP Plus Feature Port-based Virtual lAns RADIUS Clients Rapid Spanning Tree Remote Monitoring Self-learning MAC Addresses SnMP Alarms and Trap logs SnMP Versions 1 and 2 Spanning Tree Protocol Static MAC Entries PPEnDIX Description Port-based VlAns classify incoming packets to VlAns based on their ingress port.
  • Page 203 PPEnDIX EVICE PECIFICATIOn AnD Table 11 Features of the Baseline Switch 2948-SFP Plus Feature TFTP Trivial File Transfer Protocol Virtual Cable Testing VlAn Support Web-based Management EATURES Description Transport Control Protocol (TCP). TCP connections are defined between 2 ports by an initial synchronization exchange. TCP ports are identified by an IP address and a 16-bit port number.
  • Page 204: Console Cable

    Console Cable A Console cable is an 8-conductor RJ45-to-DB9 cable. One end of the cable has an RJ-45 plug for connecting to the switch’s Console port, and the other end has a DB-9 socket connector for connecting to the serial port on the terminal, as shown in Figure 102. Figure 102 Console cable Table 12 RJ-45...
  • Page 205: Null Modem Cable

    PPEnDIX Null Modem Cable RJ-45 to RS-232 25-pin PC-AT Serial Cable RJ-45 to 9-pin Modem Cable RJ-45 to RS-232 25-pin...
  • Page 206: Ethernet Port Rj-45Pin Assignments

    Ethernet Port RJ-45 10/100 and 1000BASE-T RJ-45 connections. Pin Assignments Table 10 Pin assignments Pin Number 10/100 Ports configured as MDI Table 11 Pin assignments Pin Number 10/100 Ports configured as MDIX 1000 Transmit Data + Bidirectional Data A+ Transmit Data − Bidirectional Data A− Receive Data + Bidirectional Data B+ not assigned Bidirectional Data C+...
  • Page 207: Roubleshooting

    Problem Management Troubleshooting Solutions ROUBLESHOOTING This section describes problems that may arise when installing the switch and how to resolve these issues. This section includes the following topics: Problem Management — Provides information about problem management. Troubleshooting Solutions — Provides a list of troubleshooting issues and solutions for using the device.
  • Page 208 Table 12 Troubleshooting Solutions Problems Possible Cause Switch does not run; Power is disconnected. power lED is off. Cannot connect to management using Console connection Cannot connect to switch management using HTTP SnMP, etc. no response from the Faulty serial cable terminal emulation Incorrect serial cable software Software Settings...
  • Page 209 Change if necessary. Check Rx and Tx on fiber optic cable. Replace with a tested cable. Verify that all 10 Mbps connections use a Cat 5 cable. Check the port lED or zoom screen in the nMS application, and change setting if necessary. Contact 3Com...
  • Page 210: Om Cli R Eference Uide

    This section describes using the Command line Interface (ClI) to manage the device. The device is managed through the ClI from a direct connection to the device console port. Using the ClI, network managers enter configuration commands and Getting Started parameters to configure the device.
  • Page 211: Cli Commands

    PPEnDIX EFEREnCE 3 Press Enter. The Password prompt display The login information is verified, and displays the following ClI menu: If the password is invalid, the following message appears and login process restarts. The user session is automatically terminated after 30 minutes in which Automatic Logout no device configuration activity has occurred.
  • Page 212 The ? command displays a list of ClI commands on the device. Syntax Default Configuration This command has no default configuration. User Guidelines There are no user guidelines for this command. Example The following displays the list presented for the ? command: Select menu option? Displays Help information.
  • Page 213 PPEnDIX EFEREnCE UIDE Ping Select menu option: ping Ping server 10.6.150.75 64 bytes from 10.6.150.75: icmp_seq=0 time=0ms 64 bytes from 10.6.150.75: icmp_seq=1 time=10ms 64 bytes from 10.6.150.75: icmp_seq=2 time=0ms 64 bytes from 10.6.150.75: icmp_seq=3 time=0ms Sent 4 packets, received 4 OK, lost 0 packets, The Ping command sends ICMP echo request packets to another node on the network.
  • Page 214 Summary The Summary command displays the current IP configuration and software versions running on the device. It is intended for devices that support separate runtime and bootcode Images. Syntax summary Default Configuration This command has no default configuration. User Guidelines There are no user guidelines for this command. Example The following displays current IP configuration and software versions running on the device:...
  • Page 215 PPEnDIX EFEREnCE UIDE ipSetup The ipSetup command allows the user to define an IP address on the device either manually or via a DHCP server. Syntax ipSetup Parameters auto — Specifies the IP address is acquired automatically from the Dynamic Host Configuration Protocol (DHCP) server. manual —...
  • Page 216 Upgrade The Upgrade command starts a system download and thereby allowing a system upgrade. Syntax upgrade Parameters TFTP Server IP Address — Defines the TFTP server’s IP address. Source File name — Specifies the source file name. Default Configuration This command has no default configuration. User Guidelines During the upgrade process, a series of dots appear representing the upgrade process in the ClI interface.
  • Page 217 PPEnDIX EFEREnCE UIDE Intialize The Initialize command resets the device configuration to factory defaults, including the IP configuration. Syntax initialize Default Configuration This command has no default configuration. User Guidelines The system prompts for confirmation of the request. If no response is entered within 15 seconds, timeout occurs and the command is not executed.
  • Page 218 Reboot The Reboot command simulates a power cycle of the device. Syntax reboot Default Configuration This command has no default configuration. User Guidelines There are no user guidelines for this command. Example Select menu option: reboot Are you sure you want to reboot the system (yes,no)[no]: no Select menu option: ClI R PPEnDIX...
  • Page 219 PPEnDIX EFEREnCE UIDE Layout The Logout command terminates the ClI session. Syntax logout Default Configuration This command has no default configuration. User Guidelines There are no user guidelines for this command. Example Select menu option: logout exiting session... Login:...
  • Page 220 Password The Password command changes the user’s password. Syntax password Default Configuration This command has no default configuration. User Guidelines The user needs to login to the session in order to change the password. Example Select menu option: password Change password for user: username Old password: Enter new password: Retype password:...
  • Page 221: F Glossary

    F Access Control Entries (ACE) Access Control List (ACl) Address Resolution Protocol (ARP) Boot Protocol (BOOTP) Committed Information Rate (CIR) Committed Burst Size (CbS) Class of Service (CoS) CoS is supported by prioritizing packets based on the required level of LOSSARY ACEs are made of the filters that determine traffic classifications. ACls can limit network traffic and restrict access to certain users or devices by checking each packet for certain IP or MAC (i.e., layer 2) information.
  • Page 222 Differentiated DSCP uses a six-bit tag to provide for up to 64 different forwarding Services Code Point behaviors. Based on network policies, different kinds of traffic can be Service (DSCP) marked for different kinds of forwarding. The DSCP bits are mapped to the Class of Service categories, and then into the output queues. Domain Name A system used for translating host names for network nodes into IP Service (DnS)
  • Page 223 PPEnDIX lOSSARY Port Authentication controls access to the switch ports by requiring IEEE 802.1X users to first enter a user ID and password for authentication. Defines frame extensions for VlAn tagging. IEEE 802.3ac Defines Ethernet frame start/stop requests and timers used for flow IEEE 802.3x control on full-duplex links.
  • Page 224: Management Network

    Layer 3 network layer in the ISO 7-layer Data Communications Protocol. This layer handles the routing functions for data moving from one open system to another. Link Aggregated Aggregates ports or VlAns into a single virtual port or VlAn. Group (lAg) Link Aggregation See Port Trunk. Management An acronym for Management Information Base.
  • Page 225 PPEnDIX lOSSARY Protected Extensible A protocol proposed by Microsoft, Cisco and RSA Security for securely Authentication transporting authentication data, including passwords, over 802.11 Protocol (PEAP) wireless networks. like the competing standard Tunneled Transport layer Security (TTlS), PEAP makes it possible to authenticate wireless lAn clients without requiring them to have certificates, simplifying the architecture of secure wireless lAns.Protocol-Independent Multicasting (PIM)
  • Page 226 Spanning Tree A technology that checks your network for any loops. A loop can often Protocol (STP) occur in complicated or backup linked network systems. Spanning Tree detects and directs data along the shortest available path, maximizing the performance and efficiency of the network. Terminal Access TACACS+ is a logon authentication protocol that uses software Controller Access...
  • Page 227: Register Your Product To Gain Service Benefits

    OUR To take advantage of warranty and other service benefits, you must first register your product at: 3Com eSupport services are based on accounts that are created or that you are authorized to access. 3Com offers the following support tool: 3Com Knowledgebase —...
  • Page 228: Access Software Downloads

    3Com as a separately ordered product. Separately orderable software releases and licenses are listed in the 3Com Price list and are available for purchase from your 3Com reseller.
  • Page 229 PPEnDIX BTAInIng UPPORT FOR To send a product directly to 3Com for repair, you must first obtain a return materials authorization number (RMA). Products sent to 3Com without authorization numbers clearly marked on the outside of the package will be returned to the sender unopened, at the sender’s expense.
  • Page 230 Country Telephone Number You can also obtain support in this region using this URl: http://emea.3com.com/support/email.html You can also obtain non-urgent support in this region at these email addresses: Technical support and general requests: Return material authorization: Contract requests: emea_contract@3com.com Latin America - Telephone Technical Support and Repair 1 800 988 2112...
  • Page 231 A copy of the signed Declaration of Conformity can be downloaded from the Product Support web page for the Baseline Switch 2948-SFP Plus at http://www.3Com.com. Also available at http://support.3com/doc/BL_WEITCH_2948_EU_DOC.pdf...

This manual is also suitable for:

2948-sfp plus

Table of Contents