3com 3CRUS2475 24 User manual

  • Hello! I am an AI chatbot trained to assist you with the 3com 3CRUS2475 24 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
www.3Com.com
Part No. 10015245 Rev. AA
Published October 2006
3Com
®
Unified Gigabit Wireless
PoE Switch 24
User Guide
3CRUS2475
3Com Corporation
350 Campus Drive
Marlborough,
MA 01752-3064
Copyright © 2006, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced
in any form or by any means or used to make any derivative work (such as translation, transformation, or
adaptation) without written permission from 3Com Corporation.
3Com Corporation reserves the right to revise this documentation and to make changes in content from time
to time without obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either
implied or expressed, including, but not limited to, the implied warranties, terms or conditions of
merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or
changes in the product(s) and/or the program(s) described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license
agreement included with the product as a separate document, in the hard copy documentation, or on the
removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy,
please contact 3Com and a copy will be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein are
provided to you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense.
Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or
as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are
provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights
only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable.
You agree not to remove or deface any portion of any legend provided on any licensed program or
documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not
be registered in other countries.
3Com and the 3Com logo are registered trademarks of 3Com Corporation.
ntel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows
NT are registered trademarks of Microsoft Corporation. Novell and NetWare are registered trademarks of
Novell, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively
through X/Open Company, Ltd.
IEEE and 802 are registered trademarks of the Institute of Electrical and Electronics Engineers, Inc.
All other company and product names may be trademarks of the respective companies with which they are
associated.
ENVIRONMENTAL STATEMENT
It is the policy of 3Com Corporation to be environmentally friendly in all operations. To uphold our policy, we
are committed to:
Establishing environmental performance standards that comply with national legislation and regulations.
Conserving energy, materials and natural resources in all operations.
Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental
standards. Maximizing the recyclable and reusable content of all products.
Ensuring that all products can be recycled, reused and disposed of safely.
Ensuring that all products are labelled according to recognized environmental standards.
Improving our environmental record on a continual basis.
End of Life Statement
3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components.
Regulated Materials Statement
3Com products do not contain any hazardous or ozone-depleting material.
Environmental Statement about the Documentation
The documentation for this product is printed on paper that comes from sustainable, managed forests; it is
fully biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally friendly, and
the inks are vegetable-based with a low heavy-metal content.
ABOUT THIS GUIDE
This guide provides information about the Web user interface for the
3Com® Unified Gigabit Wireless PoE Switch 24. The Embedded Web
System (EWS) is a network management system. The Embedded Web
Interface configures, monitors, and troubleshoots network devices from a
remote web browser. The Embedded Web Interface web pages are
easy-to-use and easy-to-navigate. In addition, The Embedded Web
Interface provides real time graphs and RMON statistics to help system
administrators monitor network performance.
This preface provides an overview to the Embedded Interface User Guide,
and includes the following sections:
User Guide Overview
Intended Audience
2 CHAPTER : ABOUT THIS GUIDE
User Guide
Overview
This section provides an overview to the Embedded Web System User
Guide. The Embedded Web System User Guide provides the following
sections:
Configuring the Wizard — Provides information for configuring the
Setup wizard which enables system administrator configure basic
device settings at the Setup stage or to return and reconfigure the
device settings at any stage.
Getting Started — Provides information for using the Embedded
Web Management System, including adding, editing, and deleting
device configuration information.
Viewing Basic Settings — provides information for viewing and
configuring essential information required for setting up and
maintaining device settings.
Section 4, Configuring Device Security — Provides information for
configuring both system and network security, including traffic
control, ACLs, and device access methods.
Managing System Information — Provides information for
configuring general system information
including the user-defined
system name, the user-defined system location, and the system contact
person.
Configuring Wired Ports — Provides information for configuring
Port Settings.
Aggregating Ports — Provides information for configuring Link
Aggregation which optimizes port usage by linking a group of ports
together to form a single LAG.
Configuring VLANs — Provides information for configuring VLANs.
VLANs are logical subgroups with a Local Area Network (LAN) which
combine user stations and network devices into a single unit,
regardless of the physical LAN segment to which they are attached.
Defining WLAN — Provides information for configuring WLANs. A
Wireless Local Area Network (WLAN) is a technology that provides
network services using radio waves.
Configuring IP Information — Provides information for configuring
IP addresses, DHCP and ARP.
Configuring Mulitcast Forwarding — Provides information for
configuring Multicast forwarding.
User Guide Overview 3
“Configuring Spanning Tree” — Provides information for
configuring Classic, Rapid, and multiple Spanning Tree.
Configuring Quality of Service — Provides information for Basic
and Advanced Quality of Service, including DSCP and CoS mapping,
policies, and configuring Trust mode.
Managing System Logs Provides information for viewing system
logs, and configuring device log servers.
Managing System Files — Provides information for defining File
maintenance and includes both configuration file management as
well as device access.
Viewing Statistics — Provides information for viewing RMON and
interface statistics.
WLAN Country Settings — Provides the individual WLAN country
settings.
4 CHAPTER : ABOUT THIS GUIDE
Intended Audience This guide is intended for network administrators familiar with IT
concepts and terminology.
If release notes are shipped with your product and the information there
differs from the information in this guide, follow the instructions in the
release notes.
Most user guides and release notes are available in Adobe Acrobat Reader
Portable Document Format (PDF) or HTML on the 3Com World Wide Web
site:
http://www.3com.com/
Conventions Table 1 lists conventions that are used throughout this guide.
Related
Documentation
In addition to this guide, other documentation available for the 3Com
Unified Switch 24 include the following:
Quick Start Guide: Provides installation and set-up information.
Command Reference Guide: Provides complete details for using the
command line interface (CLI).
Table 1 Notice Icons
Icon Notice Type Description
Information note Information that describes important features or
instructions.
Caution Information that alerts you to potential loss of data or
potential damage to an application, system, or device.
Warning Information that alerts you to potential personal
injury.
CONTENTS
ABOUT THIS GUIDE
User Guide Overview 2
Intended Audience 4
Conventions 4
Related Documentation 4
1 CONFIGURING THE WIZARD
Step 1 — Viewing Factory Defaults 13
Step 2 — Configuring System Settings 16
Step 3 — Configuring IP Settings 17
Step 4 — Defining Wireless Settings 18
Step 5 — Saving Configured Settings 19
2 GETTING STARTED
Starting the 3Com Embedded Web Interface 20
Understanding the 3Com Embedded Web Interface 22
Using Screen and Table Options 25
Saving the Configuration 30
Resetting the Device 30
Restoring Factory Defaults 31
Logging Off the Device 32
3 VIEWING BASIC SETTINGS
Device Summary Section 33
Viewing Device Settings 34
Viewing Wired Settings 35
Viewing Wireless Settings 37
6 CONTENTS
3 MANAGING DEVICE SECURITY
Configuring Management Security 39
Defining Management Access 39
Configuring Password Management 44
Defining RADIUS Authentication 48
Defining TACACS+ Authentication 50
Configuring Network Security 53
Modifying Port Authentication 56
Advanced Port-based Authentication 58
Viewing Authenticated Hosts 59
Defining Multiple Hosts 59
Defining Multiple Hosts 61
Modifying Multiple Hosts 62
Managing Port Security 64
Enabling Storm Control 68
Configuring EAP Statistics 71
Defining ACLs 73
Configuring ACLs 76
Defining MAC-based ACL Rules 78
Removing MAC-based ACLs 80
Defining IP-based ACLs 82
Defining IP-based ACLs 84
Defining IP-based ACLs 87
Removing IP-based ACLs 90
Binding ACLs 92
4 MANAGING SYSTEM INFORMATION
Viewing System Description 95
Defining System Settings 97
Configuring Country Codes 98
Configuring System Name 107
Configuring System Time 108
Saving the Device Configuration 113
Resetting the Device 114
CONTENTS 7
5 CONFIGURING WIRED PORTS
Viewing Port Settings 116
Defining Port Settings 119
Configuring Address Tables 122
Viewing Static Addresses 122
Defining Static Addresses 123
Removing Static Addresses 125
Viewing Dynamic Addresses 127
6 AGGREGATING PORTS
Configuring LACP 130
Defining Link Aggregation 132
Configuring Link Aggregation 132
Defining LAG Membership 136
7 CONFIGURING VLANS
Defining VLAN Properties 140
Defining VLAN Membership 144
Defining VLAN Interface Settings 147
Defining GVRP 151
Defining Voice VLAN 154
8 DEFINING WLAN
Defining Wireless Access Points 157
Defining Wireless Security 162
Configuring Wireless Access Point Security 162
Defining Wireless Rogue Handling 164
Mitigating Rogue Handling 168
Defining Wireless Radio Settings 169
Configuring Radio 802.11a Settings 174
Defining Radio 802.11a Settings 176
Managing VAPs 177
Viewing WLAN Profiles 179
Defining WLAN Profiles 181
8 CONTENTS
Modifying WLAN Profiles 182
Removing WLAN Profiles 185
Viewing WLAN Stations 186
Removing WLAN Stations 187
Defining WLAN Power Settings 189
9 CONFIGURING IP INFORMATION
Defining IP Addressing 191
Configuring ARP 193
Defining ARP Interface Settings 195
Configuring Address Tables 198
Defining Static Addresses 200
Viewing Dynamic Addresses 202
10 CONFIGURING MULITCAST FORWARDING
Defining IGMP Snooping 205
Enabling IGMP Snooping 207
Defining Multicast Groups 209
Defining Router Groups 215
11 CONFIGURING SPANNING TREE
Defining Classic Spanning Tree for Ports 219
Configuring Classic Spanning Tree 222
Modifying Spanning Tree Settings 225
Defining Rapid Spanning Tree 227
Modifying Rapid Spanning Tree Settings 229
Defining Multiple Spanning Tree 232
Defining Multiple STP Instance Settings 234
Defining MSTP Port Settings 239
12 CONFIGURING QUALITY OF SERVICE
Quality of Service Overview 243
Defining QoS Basic Mode 243
Configuring Trust Settings 244
CONTENTS 9
Configure DSCP Rewrite 245
Defining QoS General Mode 247
Defining CoS Services 247
Defining Queues 250
Defining Bandwidth Settings 251
DSCP to Queue 254
Configuring DSCP Queue Mappings 255
Configuring QoS Mapping 256
Defining CoS to Queue 257
13 MANAGING SYSTEM LOGS
Viewing Logs 260
Configuring Logging 261
14 MANAGING SYSTEM FILES
Backing Up and Restoring System Files 265
Downloading the Software Image 267
Activating Image Files 269
15 VIEWING STATISTICS
Viewing RMON Statistics 271
Configuring RMON History 274
Modifying RMON History Entries 277
Removing RMON History Entries 279
Viewing RMON History Summeries 281
Configuring RMON Events 283
Configuring RMON Event Control 285
Configuring RMON Events Control 287
Removing RMON Events 289
Viewing RMON Events 291
Defining RMON Alarms 292
Defining RMON Alarm Setups 294
Removing RMON Alarms 298
10 CONTENTS
A WLAN COUNTRY SETTINGS
B DEVICE SPECIFICATIONS AND FEATURES
Related Standards 308
Environmental 308
Physical 309
Electrical 309
Unified Switch 24 Features 310
C TROUBLESHOOTING
Problem Management 316
Troubleshooting Solutions 316
GLOSSARY
INDEX
1
CONFIGURING THE WIZARD
This section contains information for configuring the Setup wizard. The
3Com Web-based Interface presents a Setup wizard as part of the Device
Summary Section . The Setup wizard enables system administrator
configure basic device settings at the Setup stage or to return and
reconfigure the device settings at any stage. Each step in the wizard
displays a set of parameters that can be manually configured by the
system administrator. The wizard includes the following steps:
Step 1 — Viewing Factory Defaults
Step 2 — Configuring System Settings
Step 3 — Configuring IP Settings
Step 4 — Defining Wireless Settings
Step 5 — Saving Configured Settings
Step 1 — Viewing
Factory Defaults
The Welcome to the Setup Wizard Page is the first step in the wizard and
it displays a summary of factory default settings. The table displays three
sets of settings: System parameters, IP configuration and Wireless
configuration. Each section is displayed as a step within the wizard.
14 SECTION 1: CONFIGURING THE WIZARD
To start the Setup Wizard:
1 Click Device Summary > Wizard. The Welcome to the Setup Wizard
Page opens:
Figure 1 Welcome to the Setup Wizard Page
Step 1 - The Setup Wizard Page contains the following sections:
System Parameters — Displays parameters for configuring general
device information. The System Parameters are manually configured in
Appendix 1.
System Name — Defines the user-defined device name. The field
range is 0-160 characters.
System Location — Defines the location where the system is
currently running. The field range is 0-160 characters.
System Contact — Defines the name of the contact person. The
field range is 0-160 characters.
IP Configuration — Displays parameters for assigning IP addresses.
Packets are forwarded to the default IP when frames are sent to a
remote network. The IP Configuration parameters are manually
configured in Step 3. The section includes the following fields:
Method — Indicates if the IP address has been configured
statically or added dynamically. The possible field values are:
Manual — Indicates the IP Interface is configured by the user.
Step 1 — Viewing Factory Defaults 15
DHCP — Indicates the IP Interface is dynamically created.
IP Address — Displays the currently configured IP address.
Subnet Mask — Displays the currently configured IP address
mask.
Default Gateway — Displays the currently configured default
gateway.
Wireless Configuration — Provides information for configuring
Extended Service Sets (ESS). The Wireless Configuration parameters
can be manually configured in Step 4. The section includes the
following fields:
SSID Name — Displays the Service Set Identifier SSID for the ESS.
SSIDs act as a password when a mobile device attempts to connect
to the BSS. SSIDs differentiate between WLANs, therefore all access
points and devices which comprise the specific WLAN must have
the same SSID. Devices not providing a unique SSID are denied
network access. Each SSID must be unique, and can contain up-to
32 characters.
Security TypeIndicates the method used to secure WLAN access.
The possible field values are:
Open — Enables open system authentication without
encryption.
WEP — Indicates that Wired Equivalent Privacy (WEP) is the
selected WLAN security method. WEP provides the same security
level as a wired LAN. WEP encrypts data over radio waves during the
packet transmission. WEP keys are 40 bit or 104 bit encryption keys.
WPA-PSK — Indicates that Wi-Fi Protected Access (WPA) is the
selected WLAN security method. WPA is based on WEP, but provides
enhanced encryption using Temporal Key Integrity Protocol (TKIP). In
addition, WPA improves authentication using EAP. EAP ensures that
only authorized network users access the network though secure
encryption systems.
WPA2-PSK — Indicates that WPA2-PSK is the selected WLAN
security method. WPA2-PSK improves system security by encrypting
signals at a higher bit rates.
VLAN ID Displays the VLAN ID. The field range is 1-4094.
2 Click . Start configuring the Wizard.
The System Setup Page opens:
16 SECTION 1: CONFIGURING THE WIZARD
Step 2 — Configuring
System Settings
The System Setup Page displays basic parameters for configuring general
device information.
Figure 2 System Setup Page
The System Setup Page contains the following fields:
Master Radio Enable — Enables the Master Radio.
Country Code — Displays a list of country codes.
System Name — Defines the user-defined device name. The field
range is 0-160 characters.
System Location — Defines the location where the system is
currently running. The field range is 0-160 characters.
System Contact — Defines the name of the contact person. The field
range is 0-160 characters.
3 Define the fields.
4 Click to move to the next stage.
The IP Configuration Page opens:
Step 3 — Configuring IP Settings 17
Step 3 — Configuring
IP Settings
Figure 3 IP Configuration Page
The IP Configuration Page contains the following fields:
Configuration Method — Indicates if the IP address has been
configured statically or added dynamically. The possible field values
are:
Manual — Indicates that the IP Interface is configured by the user.
DHCP — Indicates that the IP Interface is dynamically created.
IP Address — Displays the currently configured IP address.
Subnet Mask — Displays the currently configured IP address mask.
Default Gateway — Displays the currently configured default
gateway.
5 Define the fields.
6 Click to move to the next stage.
The Wireless Configuration Page opens:
Note: The Wireless Configuration Page appears only if the Master Radio
Enable checkbox was selected on the System Setup Page.
18 SECTION 1: CONFIGURING THE WIZARD
Step 4 — Defining
Wireless Settings
Figure 4 Wireless Configuration Page
The Wireless Configuration Page contains the following fields:
SSID Name — Displays the Service Set Identifier SSID for the ESS.
SSIDs act as a password when a mobile device attempts to connect to
the BSS. SSIDs differentiate between WLANs, therefore all access
points and devices which comprise the specific WLAN must have the
same SSID. Devices not providing a unique SSID are denied network
access. Each SSID must be unique, and can contain up-to 32
characters.
Security TypeIndicates the method used to secure WLAN access.
The possible field values are:
Open — Enables open system authentication without encryption.
WEP — Indicates that Wired Equivalent Privacy (WEP) is the
selected WLAN security method. WEP provides the same security
level as a wired LAN. WEP encrypts data over radio waves during
the packet transmission. WEP keys are 40 bit or 104 bit encryption
keys.
WPA-PSK — Indicates that Wi-If Protected Access (WPA) is the
selected WLAN security method. WPA is based on WEP, but
provides enhanced encryption using Temporal Key Integrity
Step 5 — Saving Configured Settings 19
Protocol (TKIP). In addition, WPA improves authentication using
EAP. EAP ensures that only authorized network users access the
network though secure encryption systems.
WPA2-PSK — Indicates that WPA2-PSK is the selected WLAN
security method. WPA2-PSK improves system security by
encrypting signals at a higher bit rates.
Passphrase/Key — Indicates the encryption key type.
VLAN ID — Specifies the VLAN ID.
7 Define the fields.
8 Click to move to the final stage.
Step 5 — Saving
Configured Settings
The Manual Configuration Wizard - Completed Page opens:
Figure 5 Manual Configuration Wizard - Completed Page
The Manual Configuration Wizard - Completed Page displays the
manually configured settings. The system administrator can choose to go
back and edit the parameters or,
9 Click . The manually configured settings are saved, and the device
is updated.
2
GETTING STARTED
This section provides an introduction to the user interface, and includes
the following topics:
Starting the 3Com Embedded Web Interface
Understanding the 3Com Embedded Web Interface
Saving the Configuration
Resetting the Device
Restoring Factory Defaults
Logging Off the Device
Starting the 3Com
Embedded Web
Interface
Disable the popup blocker before beginning device configuration using
the EWS.
This section contains information on starting the 3Com Embedded Web
interface. To access the 3Com user interface:
1 Open an Internet browser.
2 Ensure that pop-up blockers are disabled. If pop-up blockers are enable,
edit, add, and device information messages may not open.
3 Enter the device IP address in the address bar and press Enter. The Enter
Network Password Page opens:
/