3com 3CRWX120695A, 3CRWX440095A Configuration manual

  • Hello! I am an AI chatbot trained to assist you with the 3com 3CRWX120695A, 3CRWX440095A Configuration manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
http://www.3com.com/
Part No. 730-9502-0071, Revision B
Published April 2005
Wireless LAN Mobility System
Wireless LAN Switch and Controller
Configuration Guide
3CRWX120695A, 3CRWX440095A
3Com Corporation
350 Campus Drive
Marlborough, MA USA
01752-3064
Copyright © 2004, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced
in any form or by any means or used to make any derivative work (such as translation, transformation, or
adaptation) without written permission from 3Com Corporation.
3Com Corporation reserves the right to revise this documentation and to make changes in content from time
to time without obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either
implied or expressed, including, but not limited to, the implied warranties, terms or conditions of
merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or
changes in the product(s) and/or the program(s) described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license
agreement included with the product as a separate document, in the hard copy documentation, or on the
removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy,
please contact 3Com and a copy will be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein are
provided to you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense.
Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or
as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are
provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights
only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable.
You agree not to remove or deface any portion of any legend provided on any licensed program or
documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may
not be registered in other countries.
3Com is a registered trademark of 3Com Corporation. The 3Com logo is a trademark of 3Com Corporation.
Mobility Domain, Mobility Point, Mobility Profile, Mobility System, Mobility System Software, MP, MSS, and
SentrySweep are trademarks of Trapeze Networks, Inc.
Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, Windows XP,
and Windows NT are registered trademarks of Microsoft Corporation.
All other company and product names may be trademarks of the respective companies with which they are
associated.
ENVIRONMENTAL STATEMENT
It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we
are committed to:
Establishing environmental performance standards that comply with national legislation and regulations.
Conserving energy, materials and natural resources in all operations.
Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental
standards. Maximizing the recyclable and reusable content of all products.
Ensuring that all products can be recycled, reused and disposed of safely.
Ensuring that all products are labelled according to recognized environmental standards.
Improving our environmental record on a continual basis.
End of Life Statement
3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components.
Regulated Materials Statement
3Com products do not contain any hazardous or ozone-depleting material.
Environmental Statement about the Documentation
The documentation for this product is printed on paper that comes from sustainable, managed forests; it is
fully biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally-friendly, and
the inks are vegetable-based with a low heavy-metal content.
CONTENTS
ABOUT THIS GUIDE
Conventions 17
Documentation 18
Documentation Comments 19
1 USING THE COMMAND-LINE INTERFACE
Overview 21
CLI Conventions 21
Command Prompts 22
Syntax Notation 22
Text Entry Conventions and Allowed Characters 22
User Globs, MAC Address Globs, and VLAN Globs 24
Port Lists 26
Virtual LAN Identification 26
Command-Line Editing 27
Keyboard Shortcuts 27
History Buffer 27
Tabs 27
Single-Asterisk (*) Wildcard Character 28
Double-Asterisk (**) Wildcard Characters 28
Using CLI Help 28
Understanding Command Descriptions 29
2 CONFIGURING AAA FOR ADMINISTRATIVE AND LOCAL ACCESS
Overview 31
Before You Start 34
About Administrative Access 35
Access Modes 35
Types of Administrative Access 35
First-Time Configuration via the Console 36
Enabling an Administrator 36
Setting the WX Switch Enable Password 37
Authenticating at the Console 38
Customizing AAA with “Globs” and Groups 39
Setting User Passwords 39
Adding and Clearing Local Users for Administrative Access 40
Configuring Accounting for Administrative Users 40
Displaying the AAA Configuration 42
Saving the Configuration 42
Administrative AAA Configuration Scenarios 43
Local Authentication 43
Local Authentication for Console Users and RADIUS Authentication for
Telnet Users 44
Local Override and Backup Local Authentication 44
Authentication When RADIUS Servers Do Not Respond 45
3 CONFIGURING AND MANAGING PORTS AND VLANS
Configuring and Managing Ports 47
Setting the Port Type 47
Configuring a Port Name 54
Configuring Interface Preference on a Dual-Interface Gigabit Ethernet
Port (WX4400 only) 54
Configuring Port Operating Parameters 55
Displaying Port Information 57
Configuring Load-Sharing Port Groups 60
Configuring and Managing VLANs 63
Understanding VLANs in 3Com MSS 63
Configuring a VLAN 66
Changing Tunneling Affinity 69
Displaying VLAN Information 69
Managing the Layer 2 Forwarding Database 70
Types of Forwarding Database Entries 70
How Entries Enter the Forwarding Database 70
Displaying Forwarding Database Information 71
Adding an Entry to the Forwarding Database 72
Removing Entries from the Forwarding Database 72
Configuring the Aging Timeout Period 73
Port and VLAN Configuration Scenario 73
4 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES
MTU Support 77
Configuring and Managing IP Interfaces 78
Adding an IP Interface 78
Disabling or Reenabling an IP Interface 78
Removing an IP Interface 78
Displaying IP Interface Information 78
Configuring the System IP Address 79
Designating the System IP Address 79
Displaying the System IP Address 79
Clearing the System IP Address 79
Configuring and Managing IP Routes 79
Displaying IP Routes 80
Adding a Static Route 82
Removing a Static Route 83
Managing the Management Services 83
Managing SSH 83
Managing Telnet 87
Managing HTTPS 89
Configuring and Managing DNS 90
Enabling or Disabling the DNS Client 90
Configuring DNS Servers 90
Configuring a Default Domain Name 91
Displaying DNS Server Information 91
Configuring and Managing Aliases 92
Adding an Alias 92
Removing an Alias 92
Displaying Aliases 92
Configuring and Managing Time Parameters 93
Setting the Time Zone 93
Configuring the Summertime Period 94
Statically Configuring the System Time and Date 95
Displaying the Time and Date 96
Configuring and Managing NTP 96
Adding an NTP Server 97
Removing an NTP Server 97
Changing the NTP Update Interval 97
Resetting the Update Interval to the Default 97
Enabling the NTP Client 97
Displaying NTP Information 97
Managing the ARP Table 98
Displaying ARP Table Entries 98
Adding an ARP Entry 99
Changing the Aging Timeout 99
Pinging Another Device 100
Logging In to a Remote Device 100
Tracing a Route 101
IP Interfaces and Services Configuration Scenario 103
5 CONFIGURING AND MANAGING MOBILITY DOMAIN ROAMING
About the Mobility Domain Feature 107
Configuring a Mobility Domain 108
Configuring the Seed 108
Configuring Member WX Switches on the Seed 109
Configuring a Member 109
Displaying Mobility Domain Status 109
Displaying the Mobility Domain Configuration 110
Clearing a Mobility Domain from a WX Switch 110
Clearing a Mobility Domain Member from a Seed 110
Monitoring the VLANs and Tunnels in a Mobility Domain 111
Displaying Roaming Stations 111
Displaying Roaming VLANs and Their Affinities 112
Displaying Tunnel Information 112
Understanding the Sessions of Roaming Users 113
Requirements for Roaming to Succeed 113
Effects of Timers on Roaming 114
Monitoring Roaming Sessions 114
Mobility Domain Scenario 115
6 CONFIGURING MAP ACCESS POINTS
MAP Overview 117
Country of Operation 119
Directly Connected MAPs and Distributed MAPs 119
Service Profiles 129
Radio Profiles 133
Configuring MAP Access Points 136
Specifying the Country of Operation 136
Configuring MAP Port Parameters 139
Configuring a Service Profile 145
Configuring a Radio Profile 147
Configuring Radio-Specific Parameters 154
Mapping the Radio Profile to Service Profiles 157
Assigning a Radio Profile and Enabling Radios 157
Disabling or Reenabling Radios 157
Enabling or Disabling Individual Radios 157
Disabling or Reenabling All Radios Using a Profile 158
Resetting a Radio to its Factory Default Settings 158
Restarting a MAP 159
Displaying MAP Information 159
Displaying MAP Configuration Information 159
Displaying a List of Distributed MAPs 160
Displaying a List of Distributed MAPs that Are Not Configured 161
Displaying Connection Information for Distributed MAPs 161
Displaying Service Profile Information 161
Displaying Radio Profile Information 162
Displaying MAP Status Information 162
Displaying MAP Statistics Counters 163
7 CONFIGURING USER ENCRYPTION
Overview 165
Configuring WPA 168
WPA Cipher Suites 168
TKIP Countermeasures 171
WPA Authentication Methods 172
WPA Information Element 172
Client Support 173
Configuring WPA 174
Configuring WPA2 179
Creating a Service Profile for RSN 179
Enabling RSN 179
Specifying the RSN Cipher Suites 180
Changing the TKIP Countermeasures Timer Value 181
Enabling PSK Authentication 181
Displaying RSN Settings 181
Assigning the Service Profile to Radios and Enabling the Radios 181
Configuring WEP 182
Setting Static WEP Key Values 183
Assigning Static WEP Keys 184
Encryption Configuration Scenarios 185
Enabling WPA with TKIP 185
Enabling Dynamic WEP in a WPA Network 187
Configuring Encryption for MAC Clients 189
8 CONFIGURING RF AUTO-TUNING
Overview 193
Initial Channel and Power Assignment 193
Channel and Power Tuning 194
RF Auto-Tuning Parameters 197
Changing RF Auto-Tuning Settings 198
Changing Channel Tuning Settings 198
Changing Power Tuning Settings 199
Changing the Minimum Transmit Data Rate 201
Displaying RF Auto-Tuning Information 201
Displaying RF Auto-Tuning Settings 201
Displaying RF Neighbors 203
Displaying RF Attributes 203
9 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL
Overview 205
Enabling the Spanning Tree Protocol 206
Changing Standard Spanning Tree Parameters 206
Bridge Priority 206
Port Cost 207
Port Priority 207
Changing the Bridge Priority 207
Changing STP Port Parameters 208
Changing Spanning Tree Timers 210
Configuring and Managing STP Fast Convergence Features 211
Configuring Port Fast Convergence 212
Displaying Port Fast Convergence Information 213
Configuring Backbone Fast Convergence 213
Displaying the Backbone Fast Convergence State 213
Configuring Uplink Fast Convergence 214
Displaying Uplink Fast Convergence Information 214
Displaying Spanning Tree Information 214
Displaying STP Bridge and Port Information 214
Displaying the STP Port Cost on a VLAN Basis 215
Displaying Blocked STP Ports 216
Displaying Spanning Tree Statistics 216
Clearing STP Statistics 218
Spanning Tree Configuration Scenario 219
10 CONFIGURING AND MANAGING IGMP SNOOPING
Overview 223
Disabling or Reenabling IGMP Snooping 223
Disabling or Reenabling Proxy Reporting 223
Enabling the Pseudo-Querier 224
Changing IGMP Timers 224
Changing the Query Interval 225
Changing the Other-Querier-
Present Interval 225
Changing the Query Response Interval 225
Changing the Last Member Query Interval 225
Changing Robustness 225
Enabling Router Solicitation 226
Changing the Router Solicitation Interval 226
Configuring Static Multicast Ports 226
Adding or Removing a Static Multicast Router Port 226
Adding or Removing a Static Multicast Receiver Port 227
Displaying Multicast Information 227
Displaying Multicast Configuration Information and Statistics 227
Displaying Multicast Queriers 229
Displaying Multicast Routers 229
Displaying Multicast Receivers 229
11 CONFIGURING AND MANAGING SECURITY ACLS
About Security Access Control Lists 231
Overview of Security ACL Commands 231
Security ACL Filters 232
Creating and Committing a Security ACL 233
Setting a Source IP ACL 233
Setting an ICMP ACL 236
Setting TCP and UDP ACLs 238
Determining the ACE Order 239
Committing a Security ACL 240
Viewing Security ACL Information 240
Clearing Security ACLs 242
Mapping Security ACLs 242
Mapping User-Based Security ACLs 242
Mapping Security ACLs to Ports, VLANs, Virtual Ports, or Distributed
MAPs 244
Modifying a Security ACL 246
Adding Another ACE to a Security ACL 247
Placing One ACE before Another 247
Modifying an Existing Security ACL 248
Clearing Security ACLs from the Edit Buffer 249
Enabling Prioritization for Voice over IP 250
Enabling Prioritization for SpectraLink Phones 251
Security ACL Configuration Scenario 252
12 MANAGING KEYS AND CERTIFICATES
Why Use Keys and Certificates? 255
Wireless Security through TLS 255
PEAP-MS-CHAP-V2 Security 256
About Keys and Certificates 256
Public Key Infrastructures 257
Public and Private Keys 258
Digital Certificates 258
PKCS #7, PKCS #10, and PKCS #12 Object Files 258
Creating Keys and Certificates 260
Choosing the Appropriate Certificate Installation Method for Your
Network 260
Creating Public-Private Key Pairs 262
Generating Self-Signed Certificates 262
Installing a Key Pair and Certificate from a PKCS #12 Object File 263
Creating a CSR and Installing a Certificate from a PKCS #7 Object
File 264
Installing a CAs Own Certificate 265
Displaying Certificate and Key Information 266
Key and Certificate Configuration Scenarios 267
Creating Self-Signed Certificates 267
Installing CA-Signed Certificates from PKCS #12 Object Files 270
Installing CA-Signed Certificates Using a PKCS #10 Object File (CSR) and a
PKCS #7 Object File 272
13 CONFIGURING AAA FOR NETWORK USERS
About AAA for Network Users 277
Authentication 277
Authorization 282
Accounting 284
Summary of AAA Features 284
AAA Tools for Network Users 285
“Globs” and Groups for Network User Classification 285
AAA Methods for IEEE 802.1X and Web Network Access 286
IEEE 802.1X Extensible Authentication Protocol Types 289
Ways a WX Switch Can Use EAP 290
Effects of Authentication Type on Encryption Method 291
Configuring 802.1X Authentication 292
Configuring EAP Offload 293
Using Pass-Through 293
Authenticating via a Local Database 293
Binding User Authentication to Machine Authentication 294
Configuring Authentication and Authorization by MAC Address 298
Adding and Clearing MAC Users and User Groups Locally 299
Configuring MAC Authentication and Authorization 300
Changing the MAC Authorization Password for RADIUS 301
Configuring WebAAA 302
WebAAA Process 303
WebAAA Requirements and Recommendations 304
Configuring WebAAA and Authorization 306
Using a Custom Login Page 307
Using Dynamic Fields in WebAAA Redirect URLs 310
Configuring Last-Resort Access 312
Assigning Authorization Attributes 313
Assigning Attributes to Users and Groups 318
Assigning a Security ACL to a User or a Group 319
Clearing a Security ACL from a User or Group 320
Assigning Encryption Types to Wireless Users 321
Overriding or Adding Attributes Locally with a Location Policy 323
About the Location Policy 323
How the Location Policy Differs from a Security ACL 324
Setting the Location Policy 324
Clearing Location Policy Rules and Disabling the Location Policy 326
Configuring Accounting for Wireless Network Users 327
Viewing Local Accounting Records 328
Viewing Roaming Accounting Records 328
Displaying the AAA Configuration 330
Avoiding AAA Problems in Configuration Order 331
Using the Wildcard “Any” as the SSID Name in Authentication
Rules 331
Using Authentication and Accounting Rules Together 332
Configuring a Mobility Profile 333
Network User Configuration Scenarios 335
General Use of Network User Commands 336
Enabling RADIUS Pass-Through Authentication 337
Enabling PEAP-MS-CHAP-V2 Authentication 338
Enabling PEAP-MS-CHAP-V2 Offload 339
Combining EAP Offload with Pass-Through Authentication 340
Overriding AAA-Assigned VLANs 341
14 CONFIGURING COMMUNICATION WITH RADIUS
RADIUS Overview 343
Before You Begin 345
Configuring RADIUS Servers 345
Configuring Global RADIUS Defaults 346
Setting the System IP Address as the Source Address 347
Configuring Individual RADIUS Servers 347
Deleting RADIUS Servers 348
Configuring RADIUS Server Groups 348
Creating Server Groups 349
Deleting a Server Group 351
RADIUS and Server Group Configuration Scenario 352
15 MANAGING 802.1X ON THE WX SWITCH
Managing 802.1X on Wired Authentication Ports 355
Enabling and Disabling 802.1X Globally 355
Setting 802.1X Port Control 356
Managing 802.1X Encryption Keys 357
Enabling 802.1X Key Transmission 357
Configuring 802.1X Key Transmission Time Intervals 357
Managing WEP Keys 358
Setting EAP Retransmission Attempts 359
Managing 802.1X Client Reauthentication 360
Enabling and Disabling 802.1X Reauthentication 360
Setting the Maximum Number of 802.1X Reauthentication
Attempts 360
Setting the 802.1X Reauthentication Period 361
Setting the Bonded Authentication Period 361
Managing Other Timers 362
Setting the 802.1X Quiet Period 362
Setting the 802.1X Timeout for an Authorization Server 362
Setting the 802.1X Timeout for a Client 363
Displaying 802.1X Information 363
Viewing 802.1X Clients 363
Viewing the 802.1X Configuration 364
Viewing 802.1X Statistics 365
16 MANAGING SESSIONS
About the Session Manager 367
Displaying and Clearing Administrative Sessions 367
Displaying and Clearing All Administrative Sessions 368
Displaying and Clearing an Administrative Console Session 368
Displaying and Clearing Administrative Telnet Sessions 369
Displaying and Clearing Client Telnet Sessions 369
Displaying and Clearing Network Sessions 370
Displaying Verbose Network Session Information 371
Displaying and Clearing Network Sessions by Username 371
Displaying and Clearing Network Sessions by MAC Address 372
Displaying and Clearing Network Sessions by VLAN Name 373
Displaying and Clearing Network Sessions by Session ID 374
17 ROGUE DETECTION AND COUNTERMEASURES
Overview 377
About Rogues and RF Detection 377
Mobility Domain Requirement 377
Rogue Access Points and Users 377
Ad Hoc Users 378
RF Detection Scans 378
Countermeasures 379
Enabling Countermeasures 379
Attacking Specific Rogues 379
Ignoring Friendly Third-Party Devices 381
Disabling or Reenabling Logging of Rogues 382
Enabling Rogue and Countermeasures Traps 382
Displaying RF Detection Information 383
Displaying Countermeasures Information 383
Displaying All Rogue Devices Detected in the Mobility Domain 383
Displaying all Devices Detected by an Individual Switch 384
Displaying the Devices By a Specific Radio 385
18 MANAGING SYSTEM FILES
About System Files 387
Displaying Software Version Information 387
Displaying Boot Information 389
Working with Files 389
Displaying a List of Files 389
Copying a File 391
Deleting a File 393
Creating a Subdirectory 393
Removing a Subdirectory 394
Managing Configuration Files 394
Displaying the Running Configuration 395
Saving Configuration Changes 396
Specifying the Configuration File to Use After the Next Reboot 396
Loading a Configuration File 397
Resetting to the Factory Default Configuration 397
Backing Up and Restoring the System 398
Managing Configuration Changes 400
Backup and Restore Examples 400
Upgrading the System Image 401
A TROUBLESHOOTING A WX SWITCH
Fixing Common WX Setup Problems 403
Recovering the System Password 406
Configuring and Managing the System Log 406
Log Message Components 407
Logging Destinations and Levels 407
Using Log Commands 408
Running Traces 413
Using the Trace Command 414
Displaying a Trace 415
Stopping a Trace 415
About Trace Results 415
Displaying Trace Results 416
Copying Trace Results to a Server 417
Clearing the Trace Log 417
List of Trace Areas 417
Using display Commands 418
Viewing VLAN Interfaces 418
Viewing AAA Session Statistics 419
Viewing FDB Information 420
Viewing ARP Information 420
Capturing System Information for Technical Support 421
Displaying Technical Support Information 421
Sending Information to 3Com Technical Support 421
B SUPPORTED RADIUS ATTRIBUTES
Attributes 423
Supported Standard and Extended Attributes 424
3Com Vendor-Specific Attributes 431
C MOBILITY DOMAIN TRAFFIC PORTS
Traffic Ports 433
D OBTAINING SUPPORT FOR YOUR PRODUCT
Register Your Product 435
Purchase Value-Added Services 435
Troubleshoot Online 436
Access Software Downloads 436
Telephone Technical Support and Repair 436
Contact Us 437
GLOSSARY
INDEX
COMMAND INDEX
ABOUT THIS GUIDE
This guide describes the configuration commands for the 3Com Wireless
LAN Switch WX1200 or 3Com Wireless LAN Controller WX4400.
This guide is intended for System integrators who are configuring the
WX1200 or WX4400.
If release notes are shipped with your product and the information there
differs from the information in this guide, follow the instructions in the
release notes.
Most user guides and release notes are available in Adobe Acrobat
Reader Portable Document Format (PDF) or HTML on the 3Com
World Wide Web site:
http://www.3com.com/
Conventions Table 1 and Table 2 list conventions that are used throughout this guide.
Tab le 1 Notice Icons
Icon Notice Type Description
Information note Information that describes important features or
instructions
Caution Information that alerts you to potential loss of data or
potential damage to an application, system, or device
18 ABOUT THIS GUIDE
This manual uses the following text and syntax conventions:
Documentation The MSS documentation set includes the following documents.
Wireless LAN Switch Manager (3WXM) Release Notes
These notes provide information about the system software release,
including new features and bug fixes.
Wireless LAN Switch and Controller Release Notes
These notes provide information about the system software release,
including new features and bug fixes.
Wireless LAN Switch and Controller Quick Start Guide
This guide provides instructions for performing basic setup of secure
(802.1X) and guest (WebAAA™) access, for configuring a Mobility
Domain for roaming, and for accessing a sample network plan in
3WXM for advanced configuration and management.
Tab le 2 Text Conventions
Convention Description
Monospace text Sets off command syntax or sample commands and system
responses.
Bold text Highlights commands that you enter or items you select.
Italic text Designates command variables that you replace with
appropriate values, or highlights publication titles or words
requiring special emphasis.
[ ] (square brackets) Enclose optional parameters in command syntax.
{ } (curly brackets) Enclose mandatory parameters in command syntax.
| (vertical bar) Separates mutually exclusive options in command syntax.
Keyboard key names If you must press two or more keys simultaneously, the key
names are linked with a plus sign (+). Example:
Press Ctrl+Alt+Del
Words in italics Italics are used to:
Emphasize a point.
Denote a new term at the place where it is defined in the
text.
Highlight an example string, such as a username or SSID.
Documentation Comments 19
Wireless LAN Switch Manager Reference Manual
This manual shows you how to plan, configure, deploy, and manage a
Mobility System wireless LAN (WLAN) using the 3Com Wireless LAN
Switch Manager (3WXM).
Wireless LAN Switch and Controller Installation and Basic
Configuration Guide
This guide provides instructions and specifications for installing a WX
wireless switch in a Mobility System WLAN, and basic instructions for
deploying a secure IEEE 802.11 wireless service.
Wireless LAN Switch and Controller Configuration Guide
This guide provides instructions for configuring and managing the
system through the Mobility System Software (MSS) CLI.
Wireless LAN Switch and Controller Command Reference
This reference provides syntax information for all MSS commands
supported on WX switches.
Documentation
Comments
Your suggestions are very important to us. They will help make our
documentation more useful to you. Please e-mail comments about this
document to 3Com at:
Please include the following information when contacting us:
Document title
Document part number and revision (on the title page)
Page number (if appropriate)
Example:
Wireless LAN Switch and Controller Configuration Guide
Part number 730-9502-0071, Revision B
Page 25
Please note that we can only respond to comments and questions about
3Com product documentation at this e-mail address. Questions related to
technical support or sales should be directed in the first instance to your
network supplier.
20 ABOUT THIS GUIDE
/