User Guide
Page 1
3Com Baseline Switch 2900 Family User Guide Baseline Switch 2920-SFP Plus Baseline Switch 2928-SFP Plus Baseline Switch 2952-SFP Plus Baseline Switch 2928-PWR Plus Baseline Switch 2928-HPWR Plus Manual Version: 6W102-20090810 www.3com.com 3Com Corporation 350 Campus Drive, Marlborough, MA, USA 01752 3064
3Com Baseline Switch 2900 Family User Guide Baseline Switch 2920-SFP Plus Baseline Switch 2928-SFP Plus Baseline Switch 2952-SFP Plus Baseline Switch 2928-PWR Plus Baseline Switch 2928-HPWR Plus Manual Version: 6W102-20090810 www.3com.com 3Com Corporation 350 Campus Drive, Marlborough, MA, USA 01752 3064
User Guide
Page 3
...diagnostic information file, and view or save the file to local host. 10 File Management Manage files on the device, such as follows: Part Contents 1 Overview Perform overview of 3Com baseline switch 2900 family. 2 Configuration Wizard Perform quick configuration of the device...Device Basic Information Display and configure the system name and idle timeout period for collecting storm constrain statistics. About This Manual Organization 3Com Baseline Switch 2900 Family User Guide is organized as displaying the file list, downloading a file, uploading a file, and removing a file. 11...
...diagnostic information file, and view or save the file to local host. 10 File Management Manage files on the device, such as follows: Part Contents 1 Overview Perform overview of 3Com baseline switch 2900 family. 2 Configuration Wizard Perform quick configuration of the device...Device Basic Information Display and configure the system name and idle timeout period for collecting storm constrain statistics. About This Manual Organization 3Com Baseline Switch 2900 Family User Guide is organized as displaying the file list, downloading a file, uploading a file, and removing a file. 11...
User Guide
Page 5
... items are grouped in braces and separated by vertical bars. For example, pop up the [New User] window. Optional alternative items are grouped in square brackets and separated by forward slashes. Multi-level menus... are inside square brackets. Symbols Convention Description Means reader be selected. Conventions The manual uses the following conventions: Command conventions Convention Boldface italic [ ] { x | y | ... } [ x | y | ... ] { x | y | ... } * [ x | y | ... ] * & # ...
... items are grouped in braces and separated by vertical bars. For example, pop up the [New User] window. Optional alternative items are grouped in square brackets and separated by forward slashes. Multi-level menus... are inside square brackets. Symbols Convention Description Means reader be selected. Conventions The manual uses the following conventions: Command conventions Convention Boldface italic [ ] { x | y | ... } [ x | y | ... ] { x | y | ... } * [ x | y | ... ] * & # ...
User Guide
Page 11
For detailed configuration, refer to the corresponding configuration manuals of the Web interface, as shown in Figure 2-4 to quit the web console. The system does not save the current configuration before logout. Therefore, you ... body area, as the management interface. z If you click the verification code displayed on the Web login page, you can select Device > Users from the navigation tree, create a new user, and select Wizard or Network > VLAN interface to log in the upper-right corner of these modules. Logging Out of the Web...
For detailed configuration, refer to the corresponding configuration manuals of the Web interface, as shown in Figure 2-4 to quit the web console. The system does not save the current configuration before logout. Therefore, you ... body area, as the management interface. z If you click the verification code displayed on the Web login page, you can select Device > Users from the navigation tree, create a new user, and select Wizard or Network > VLAN interface to log in the upper-right corner of these modules. Logging Out of the Web...
User Guide
Page 28
... Username prompt displays: Login authentication Username: Step2 Enter your User Name at the next startup { bootrom | runtime } Reboot the device and run the default configuration initialize Specify VLAN-interface 1 to obtain an IP address through DHCP or manual configuration ipsetup { dhcp | ip address ip-address { ...mask | mask-length } [ default-gateway ip-address ] } Modify the login password of a user password Download the Boot ROM program or boot file from the ...
... Username prompt displays: Login authentication Username: Step2 Enter your User Name at the next startup { bootrom | runtime } Reboot the device and run the default configuration initialize Specify VLAN-interface 1 to obtain an IP address through DHCP or manual configuration ipsetup { dhcp | ip address ip-address { ...mask | mask-length } [ default-gateway ip-address ] } Modify the login password of a user password Download the Boot ROM program or boot file from the ...
User Guide
Page 86
...pin 3 and pin 6 are changed . Therefore, you must be used for receiving signals; SFP optical ports do not support this option to the remote receive pins. With auto power down ...are decided through cable. z For an Ethernet port in one end must be set the limit manually. To enable normal communication, you should configure the MDI mode depending on both sides, when ...pin 2 are used only when the device cannot determine the cable type. Available options include: z User Defined: Select this way, flow control helps to auto. z When crossover cables are used for ...
...pin 3 and pin 6 are changed . Therefore, you must be used for receiving signals; SFP optical ports do not support this option to the remote receive pins. With auto power down ...are decided through cable. z For an Ethernet port in one end must be set the limit manually. To enable normal communication, you should configure the MDI mode depending on both sides, when ...pin 2 are used only when the device cannot determine the cable type. Available options include: z User Defined: Select this way, flow control helps to auto. z When crossover cables are used for ...
User Guide
Page 184
...configure the voice VLANs to operate in normal mode, thus reducing the consumption of the port is the voice VLAN and the port works in manual VLAN assignment mode, the port forwards all other tags Packet processing mode If the source MAC address of the access port as the voice ... the recognizable OUI addresses can forge a large amount of the access port, and the 802.1X guest VLAN for the functions to operate normally. Vicious users can pass through 1-3 z Security mode: In this case, 802.1X authentication function cannot take effect. If you have to, first ensure that the ...
...configure the voice VLANs to operate in normal mode, thus reducing the consumption of the port is the voice VLAN and the port works in manual VLAN assignment mode, the port forwards all other tags Packet processing mode If the source MAC address of the access port as the voice ... the recognizable OUI addresses can forge a large amount of the access port, and the 802.1X guest VLAN for the functions to operate normally. Vicious users can pass through 1-3 z Security mode: In this case, 802.1X authentication function cannot take effect. If you have to, first ensure that the ...
User Guide
Page 205
... of the MAC address entries displayed in the tab are as follows: z Config static: indicates static MAC address entries manually configured by the users z Config dynamic: indicates dynamic MAC address entries manually configured by the users z Blackhole: indicates blackhole MAC address entries z Learned: indicates dynamic MAC address entries learned by the device z Other: indicates...
... of the MAC address entries displayed in the tab are as follows: z Config static: indicates static MAC address entries manually configured by the users z Config dynamic: indicates dynamic MAC address entries manually configured by the users z Blackhole: indicates blackhole MAC address entries z Learned: indicates dynamic MAC address entries learned by the device z Other: indicates...
User Guide
Page 315
By default, no static binding is , you can manually configure IP-to-MAC bindings on the DHCP relay agent, so that users can dynamically record clients' IP-to expand the advanced DHCP relay agent configuration field, as shown in the DHCP Service field. It also supports static ...
By default, no static binding is , you can manually configure IP-to-MAC bindings on the DHCP relay agent, so that users can dynamically record clients' IP-to expand the advanced DHCP relay agent configuration field, as shown in the DHCP Service field. It also supports static ...
User Guide
Page 327
Table 3-3 DHCP snooping user information configuration items Item Description IP Address MAC Address This field displays the IP address assigned by the DHCP server to DHCP Snooping Configuration Task List. This field displays the VLAN to which the client is configured manually. Return to the client. z Enable GigabitEthernet 1/0/1 to -MAC address bindings in...
Table 3-3 DHCP snooping user information configuration items Item Description IP Address MAC Address This field displays the IP address assigned by the DHCP server to DHCP Snooping Configuration Task List. This field displays the VLAN to which the client is configured manually. Return to the client. z Enable GigabitEthernet 1/0/1 to -MAC address bindings in...
User Guide
Page 420
...understand the CA policy before selecting a trusted CA for checking the validity of certificate owner identity information and public keys. This manual involves two types of the certificate. CRL An existing certificate may need to obtain certificates, use different methods to show all ...way for certificate request. 1-1 The CRLs contain the serial numbers of all certificates that contains a public key and the related user identity information. Usually, a CA advertises its policy in communication, and thus guaranteeing the confidentiality, integrity and non-repudiation of the public...
...understand the CA policy before selecting a trusted CA for checking the validity of certificate owner identity information and public keys. This manual involves two types of the certificate. CRL An existing certificate may need to obtain certificates, use different methods to show all ...way for certificate request. 1-1 The CRLs contain the serial numbers of all certificates that contains a public key and the related user identity information. Usually, a CA advertises its policy in communication, and thus guaranteeing the confidentiality, integrity and non-repudiation of the public...
User Guide
Page 423
... to the CA along with the local security domain for improved query efficiency and reduced query count, z Prepare for requesting a certificate manually Task Creating a PKI Entity Remarks Required Create a PKI entity and configure the identity information. The key pair includes a public key ...and a private key. Table 1-1 Configuration task list for certificate verification. A certificate is the binding of a user. Required Create a PKI domain, setting the certificate request mode to remove the CA certificate and local certificate first. 1-4 The private key...
... to the CA along with the local security domain for improved query efficiency and reduced query count, z Prepare for requesting a certificate manually Task Creating a PKI Entity Remarks Required Create a PKI entity and configure the identity information. The key pair includes a public key ...and a private key. Table 1-1 Configuration task list for certificate verification. A certificate is the binding of a user. Required Create a PKI domain, setting the certificate request mode to remove the CA certificate and local certificate first. 1-4 The private key...