3com 5112M-TPLS User manual

Category
Networking
Type
User manual

This manual is also suitable for

ONline 10BASE-T Security
Module Installation and
Operation Guide
Document Number 17-00392-3
Printed February 1996
Model Number: 5112M-TPLS
3Com Corporation
118 Turnpike Road
Southborough, MA 01772-1886
U.S.A.
(508) 460-8900
FAX (508) 460-8950
®
ii ONline 10BASE-T Security Module Installation and Operation Guide
Federal Communications Commission
Notice
This equipment has been tested and found to comply with the
limits for a Class A digital device, pursuant to Part 15 of the FCC
Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and can
radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment
in a residential area is likely to cause harmful interference, in which
case you must correct the interference at your own expense.
Canadian Emissions Requirements
Cet appareil numérique respecte les limites de bruits
radioélectriques applicables aux appareils numériques de Classe A
prescrites dans la norme sur la matériel brouilleur: "Appareils
Numériques", NMB-003 édictée par le Ministère des
Communications.
This digital apparatus does not exceed the Class A limits for radio
noise emissions from digital apparatus as set out in the
interference-causing equipment standard entitled "Digital
Apparatus", ICES-003 of the Department of Communications.
VDE Class B Compliance
Hiermit wird bescheinigt, dass der 5112M-TPLS in
Üebereinstimmung mit den Bestimmungen der Vfg 243/1991
funkentstöert ist.
Der Deutschen Bundespost wurde das Inverkehrbringen dieses
Geraetes angezeigt und die Berechtigung zur Üeberprüefung der
Serie auf Einhaltung der Bestimmungen eingeräeumt.
Einhaltung mit betreffenden Bestimmugen kommt darauf an, dass
geschirmte Ausfuehrungen gebraucht werden. Fuer die
Beschaffung richtiger Ausfuehrungen ist der Betreiber
verantwortlich.
This is to certify that the 5112M-TPLS is shielded against radio
interference in accordance with the provisions of Vfg 243/1991.
The German Postal Services have been advised that this equipment
is being placed on the market and that they have been given the
right to inspect the series for compliance with regulations.
Compliance with applicable regulations depends on the use of
shielded cables. The user is responsible for procuring the
appropriate cables.
EN55022/CISPR22 Compliance
This equipment conforms to the Class A emissions limits for a
digital device as defined by EN55022 (CISPR22).
VCCI Class 1 Compliance
This equipment is in the 1st Class category (information equipment
to be used in commercial or industrial areas) and conforms to the
standards set by the Voluntary Control Council for Interference by
Information Technology Equipment aimed at preventing radio
interference in commercial or industrial areas.
Consequently, when the equipment is used in a residential area or
in an adjacent area, radio interference may be caused to radio and
TV receivers, and so on.
Read the instructions for correct handling.
UK General Approval Statement
The ONcore Switching Hub, ONline System Concentrator, and
ONsemble StackSystem Hub are manufactured to the International
Safety Standard EN 60950 and are approved in the UK under the
General Approval Number NS/G/12345/J/100003 for indirect
connection to the public telecommunication network.
Disclaimer
The information in this document is subject to change without
notice and should not be construed as a commitment by 3Com
Corporation. 3Com Corporation assumes no responsibility for any
errors that may appear in this document.
Copyright Statement
©
1996, by 3Com Corporation. Printed in U.S.A. All rights reserved.
3Com is a registered trademark of 3Com Corporation. ONcore is a
registered trademark of 3Com Corporation. The information
contained herein is the exclusive and confidential property of
3Com Corporation. No part of this manual may be disclosed or
reproduced in whole or in part without permission from 3Com
Corporation.
Trademarks
Because of the nature of this material, numerous hardware and
software products are mentioned by name. In most, if not all
cases, these product names are claimed as trademarks by the
companies that manufacture the products. It is not our intent to
claim these names or trademarks as our own.
Artel, Chipcom, Ethermodem, Galactica, ONcore, ORnet,
StarBridge, and TriChannel are registered trademarks of 3Com
Corporation.
Chipcom OpenHub, G-Man, LANsentry, MultiProbe, ONdemand,
ONline, ONsemble, PowerRing, SL2000, SL3000, SL4000,
StackJack, StackSystem, and SwitchCentral are trademarks of
3Com Corporation.
ONline 10BASE-T Security Module Installation and Operation Guide iii
The Chipcom Multichannel Architecture Communications System is
registered under U.S. Patent Number 5,301,303.
XNS is a trademark and Ethernet is a registered trademark of Xerox
Corporation.
DEC, DECnet, the Digital logo, DELNI, POLYCENTER, VAX, VT100,
and VT220 are trademarks of Digital Equipment Corporation.
UNIX is a registered trademark in the U.S.A. and other countries
licensed exclusively through X/Open Company, Ltd.
IBM is a registered trademark of International Business Machines.
3ComFacts, Ask 3Com, CardFacts, NetFacts, and CardBoard are
service marks of 3Com Corporation.
3Com, LANplex, BoundaryRouting, LanScanner, LinkBuilder,
NETBuilder, NETBuilderII, ParallelTasking, ViewBuilder, EtherDisk,
Etherl\Link, EtherLink Plus, EtherLink II, TokenLink, TokenLink Plus,
and TokenDisk are registered trademarks of 3Com Corporation.
3ComLaser Library, 3TECH, CacheCard, FDDILink, FMS, NetProbe,
SmartAgent, Star-Tek, and Transcend are trademarks of 3Com
Corporation.
CompuServe is a registered trademark of CompuServe, Inc.
3Com registered trademarks are registered in the United States,
and may or may not be registered in other countries. Other brand
and product names may be registered trademarks or trademarks of
their respective holders.
Restricted Rights
Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c)(1) (ii) of the Rights in
Technical Data and Computer Software clause at
DFARS 252.227-7013.
Printed on recycled paper.
iv ONline 10BASE-T Security Module Installation and Operation Guide
Contents
ONline 10BASE-T Security Module Installation and Operation Guide v
How to Use This Guide
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Structure of This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
3Com Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xvii
Reference Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xvii
Chapter 1 — Introduction
The ONline 10BASE-T Security Module . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1
Theory of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
ONline Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-3
Chapter 2 — Designing and Expanding the Network
Understanding the General Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Basic Network Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
LAN Equivalence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-6
Fiber Backbone, Twisted Pair To-The-Desk . . . . . . . . . . . . . . . . . . . . . . . . . .2-7
Fiber Backbone, Twisted Pair To-The-Desk Example . . . . . . . . . . . . .2-8
Twisted Pair Backbone, Twisted Pair To-The-Desk . . . . . . . . . . . . . . . . . . .2-10
Patch Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-11
Redundant Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-12
vi ONline 10BASE-T Security Module Installation and Operation Guide
Chapter 3 — Installing and Operating the Module
Precautionary Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
Quick Installation Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
Unpacking Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-4
Setting the Dip Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-5
Installing the Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-8
Installing the Cable Tie-Wrap Kit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-8
Installing the Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-11
Configuring the Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-13
Port Enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-14
Network Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-14
Port Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-14
Link Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-15
Module Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-15
Autopartition Threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-16
Saving Module Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-16
Reverting Module Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-16
Showing Module Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-17
Monitoring the Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-18
LED and Network Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-21
Chapter 4 — Configuring Security Features
Quick Reference for Configuring Security . . . . . . . . . . . . . . . . . . . . . . . . . .4-2
Configuring Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Eavesdropping Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5
Defining Port Security Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-6
Defining Port Action on Intrusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-7
Configuring Autolearning Mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-8
Enabling Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-8
Configuring Autolearning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-9
Defining a MAC Address Manually . . . . . . . . . . . . . . . . . . . . . . . . . . .4-11
Downloading the Autolearning Database . . . . . . . . . . . . . . . . . . . . . .4-12
Configuring Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-13
Saving Security Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14
Reverting Security Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14
Showing Security Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14
ONline 10BASE-T Security Module Installation and Operation Guide vii
Showing Port Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15
Showing Security Autolearn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-17
Showing Security Intruder List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-18
Clearing Security Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-19
Clearing the MAC Address Table . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-19
Clearing the Autolearning Database . . . . . . . . . . . . . . . . . . . . . . . . . .4-20
Clearing the Security Intruder List . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-20
Using 3Com MIB Security Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-21
EMM Security SNMP Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-21
Using the Security Module SNMP Variables . . . . . . . . . . . . . . . . . . . . .4-22
Chapter 5 — Troubleshooting
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-1
Troubleshooting Using the Status LEDs . . . . . . . . . . . . . . . . . . . . . . . . .5-2
Troubleshooting Using the Activity LEDs . . . . . . . . . . . . . . . . . . . . . . . .5-4
Technical Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-5
Appendix A — Specifications
Electrical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1
Environmental Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2
Mechanical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2
General Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2
50-Pin Connector and Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3
Twisted Pair Connectors and Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-6
Twisted Pair Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-7
Twisted Pair Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-8
viii ONline 10BASE-T Security Module Installation and Operation Guide
Appendix B — Technical Support
On-line Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B-1
Email Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B-2
World Wide Web Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B-2
Support from Your Network Supplier . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B-2
Support from 3Com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B-3
Returning Products for Repair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B-4
Accessing the 3Com MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B-4
3Com Technical Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B-5
Index
ONline 10BASE-T Security Module Installation and Operation Guide ix
Figures
Figure 1-1. ONline 10BASE-T Security Module Application . . . . . . . . . .1-3
Figure 2-1. Sample Configuration Distance Calculation . . . . . . . . . . . . .2-9
Figure 2-2. Unshielded Twisted Pair Network . . . . . . . . . . . . . . . . . . .2-11
Figure 2-3. Redundant Twisted Pair Configuration . . . . . . . . . . . . . . .2-12
Figure 3-1. Security Module Dip Switch SW1 Location . . . . . . . . . . . . .3-5
Figure 3-2. Attaching the Tie-Wrap Bracket to the Module . . . . . . . . . .3-9
Figure 3-3. Attaching Cables With 90° Connectors . . . . . . . . . . . . . . .3-10
Figure 3-4. Installing an ONline 10BASE-T Security Module . . . . . . . . .3-11
Figure 3-5. ONline 10BASE-T Security Module Cable Connection . . . .3-12
Figure 3-6. Security Module Faceplate . . . . . . . . . . . . . . . . . . . . . . . .3-19
Figure 4-1. Example of Eavesdropping Security . . . . . . . . . . . . . . . . . . .4-5
Figure 4-2. Example of Intrusion Detection . . . . . . . . . . . . . . . . . . . . . .4-6
Figure A-1. 50-Pin Cable Male and Female Connectors . . . . . . . . . . . . A-4
Figure A-2. RJ-45 Connector Pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . A-7
x ONline 10BASE-T Security Module Installation and Operation Guide
ONline 10BASE-T Security Module Installation and Operation Guide xi
Tables
Table 2-1. Seven Basic Network Rules . . . . . . . . . . . . . . . . . . . . . . . . .2-3
Table 2-2. LAN Product Equivalent Distances . . . . . . . . . . . . . . . . . . . .2-6
Table 2-3. Maximum Link Distance on Twisted Pair . . . . . . . . . . . . . .2-10
Table 3-1. Procedures for Completing Installation . . . . . . . . . . . . . . . .3-2
Table 3-2. DIP Switch SW1 Network Selection Settings . . . . . . . . . . . .3-6
Table 3-3. DIP Switch SW1 Security and Link Integrity Settings. . . . . . .3-7
Table 3-4. Interpretation of the Security Module LEDs . . . . . . . . . . . .3-20
Table 3-5. Network Check Codes. . . . . . . . . . . . . . . . . . . . . . . . . . . .3-21
Table 4-1. Quick Reference for Configuring the Security
Module. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2
Table 5-1. Troubleshooting Using the Port Status LEDs. . . . . . . . . . . . .5-2
Table 5-2. Troubleshooting Using the Activity LEDs . . . . . . . . . . . . . . .5-4
Table A-1. 50-Pin Cable Pinouts and Port Assignments . . . . . . . . . . . . A-5
ONline 10BASE-T Security Module Installation and Operation Guide xiii
How to Use This Guide
This guide tells you how to install and operate the 3Com ONline™
10BASE-T Security Module (referred throughout this guide as the Security
Module) for the ONline System Concentrator. A configuration section is
provided to help you plan your network configuration. This guide also
includes information on monitoring the module using an ONline network
management module. An appendix explains cabling guidelines and options
for this module.
Audience
This guide is intended for the following people at your site:
Network manager or administrator
Hardware installer
xiv ONline 10BASE-T Security Module Installation and Operation Guide
Structure of This Guide
This guide contains the following chapters:
Chapter 1, IntroductionIntroduces the principal features of the
Security Module.
Chapter 2, Designing and Expanding the NetworkExplains
examples of possible network configurations using the ONline System
Concentrator and the Security Module.
Chapter 3, Installing and Operating the ModuleProvides illustrated
procedures for installing the Security Module into the ONline System
Concentrator. Also shows front panel LEDs and the DIP switch on the
module.
Chapter 4, Configuring Security FeaturesDescribes the security
features and provides the management commands to configure these
features. Also provided are the commands to show and clear security
configurations.
Chapter 5, Troubleshooting Provides help in isolating and correcting
problems that may arise during the installation process and during normal
operation.
Appendix A, SpecificationsProvides electrical, environmental, and
mechanical specifications for the Security Module, plus information on the
module's 50-pin Telco connector, RJ-45 connectors, and Twisted Pair cables.
Appendix B, Technical Support Lists the various methods for
contacting the 3Com technical support organization and for accessing
other product support services.
Index
ONline 10BASE-T Security Module Installation and Operation Guide xv
Document Conventions
The following document conventions are used in this manual:
Convention Indicates Example
Courier text User input In the Agent Information Form,
enter MIS in the New Contact
field.
System output After pressing the Apply
button, the system displays
the message
Transmitting data.
Bold command
string
Path names Before you begin, read the
readme.txt file located in
/usr/snm/agents.
Italic text in braces User-substituted
identifiers
Use the following command to
show port details:
SHOW PORT {
slot
.all} VERBOSE
Capitalized text in
plain brackets
Keyboard entry
by the user
Type your password and press
[ENTER].
Italics Text emphasis,
document titles
Ensure that you press the Apply
button after you add the new
search parameters.
xvi ONline 10BASE-T Security Module Installation and Operation Guide
Related Documents
This section provides information on supporting documentation, including:
3Com Documents
Reference Documents
Note: A Note. The
information is
important
Note: Use STP lobe
cables for your system.
Caution: A Caution. A
condition may
damage
software or
hardware
Caution: Do not put
your installation
diskettes on a
magnetic surface.
This may damage the
diskettes.
Warning: A Warning. A
condition may
threaten
personal safety
Warning: Wear eye
protection when
performing these
maintenance
procedures.
Convention Indicates Example
ONline 10BASE-T Security Module Installation and Operation Guide xvii
3Com Documents
The following documents provide additional information on 3Com
products:
17-Slot ONline System Concentrator Installation and Operation
Guide Explains how to install, operate, and manage the 3Com ONline
17-Slot System Concentrator (Models 5017C-LS and 5017C with load
sharing).
6-Slot ONline System Concentrator Installation and Operation
Guide – Explains how to install, operate, and manage the 3Com ONline
6-Slot System Concentrator.
ONline Ethernet Management Module Installation and Operation Guide
Describes how to install the ONline Ethernet Network Management
Module in the ONline System Concentrator and explains the LEDs on the
module faceplate. This guide also provides instructions for connecting a
terminal to the module and describes the management commands
necessary to perform management tasks on the concentrator and on
remote devices.
ONline Management Commands Guide – Provides an alphabetized
reference resource describing all ONline management commands.
For a complete list of 3Com documents, contact your 3Com representative.
Reference Documents
The following documents supply related background information:
Case, J., Fedor, M., Scoffstall, M., and J. Davin, The Simple Network
Management Protocol, RFC 1157, University of Tennessee at Knoxville,
Performance Systems International and the MIT Laboratory for Computer
Science, May 1990.
Rose, M., and K. McCloghrie, Structure and Identification of
Management Information for TCP/IP-based Internets, RFC 1155,
Performance Systems International and Hughes LAN Systems, May 1990.
Introduction 1 - 1
1
Introduction
This chapter describes the principle features of the ONline 10BASE-T
Security Module.
The ONline 10BASE-T Security Module
The ONline 10BASE-T Security Module is a 12-port IEEE 802.3 repeater
module that complies with the 10BASE-T standard. The module is designed
for use with the 3Com ONline System Concentrators using unshielded
twisted pair wiring. The Security Module provides the following features
and benefits:
Provides jamming security for 12 10BASE-T ports
Provides security from unauthorized transmissions
Uses the 3Com ONguard™ technology to secure the network from
eavesdropping and intrusions
Supports up to 150 meter link distances on 22 gauge wire and up to
125 meters on 24 gauge wire (the meter distance on 26 gauge wire
varies by cable type)
Complies fully with the 10BASE-T signaling standard
1 - 2 ONline 10BASE-T Security Module Installation and Operation Guide
Features 'hot swap' capability so that you can install or remove the
module without having to power down the concentrator
In addition, the Security Module allows you to disable Link Integrity, which
allows the module to be connected to equipment that does not conform to
the 10BASE-T standard.
Before installing the Security Module into the ONline System Concentrator,
read the ONline System Concentrator Installation and Operation Guide.
Theory of Operation
The Security Module incorporates repeaters and twisted pair transceivers in
its hardware:
Repeaters restore phase and frequency. Repeated signals
synchronize to the system clock and enter on the ONline
concentrator's TriChannel™ backplane. Outgoing signals
from the TriChannel backplane are sent directly to
transceivers to be transmitted to twisted pair link
segments.
Transceivers receive and restore amplitude to incoming
signals.
Application
Attach the Security Module to a patch or punchdown block using bundled
25-pair or 12-leg hydra cables. This provides connections for the 12 twisted
pair ports, as shown in Figure 1-1.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108

3com 5112M-TPLS User manual

Category
Networking
Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI