EasyManua.ls Logo

3Com 3CRBSG2893 - Baseline Smart 28PORT Gig Sfp 10/100/1000 User Manual

3Com 3CRBSG2893 - Baseline Smart 28PORT Gig Sfp 10/100/1000
505 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
3Com Baseline Switch 2900 Family
User Guide
Baseline Switch 2920-SFP Plus
Baseline Switch 2928-SFP Plus
Baseline Switch 2952-SFP Plus
Baseline Switch 2928-PWR Plus
Baseline Switch 2928-HPWR Plus
Manual Version:
6W102-20090810
www.3com.com
3Com Corporation
350 Campus Drive, Marlborough,
MA, USA 01752 3064

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the 3Com 3CRBSG2893 - Baseline Smart 28PORT Gig Sfp 10/100/1000 and is the answer not in the manual?

3Com 3CRBSG2893 - Baseline Smart 28PORT Gig Sfp 10/100/1000 Specifications

General IconGeneral
Switching Capacity56 Gbps
Forwarding Rate41.7 Mpps
MAC Address Table Size8K
Jumbo Frame Support9K Bytes
Switch TypeManaged
Power SupplyInternal
Ports24 x 10/100/1000BASE-T ports, 4 x SFP
ManagementWeb-based, SNMP
FeaturesVLAN, QoS, Port Mirroring
Dimensions (W x D x H)440 x 44 mm
Weight3.2 kg

Summary

Overview

Configuration Through the Web Interface

Web-Based Network Management Operating Environment

Describes the environment for web-based network management operations.

Logging In to the Web Interface

Details on accessing the device via its web interface, including default credentials.

Logging Out of the Web Interface

Procedure for safely exiting the web interface session and saving configurations.

Introduction to the Web Interface

Overview of the web interface structure: navigation tree, title area, and body area.

Web User Level

Defines different access levels (Visitor, Monitor, Configure, Management) for web users.

Introduction to the Web-Based NM Functions

Details the various network management functions available through the web interface.

Configuration Through the Command Line Interface

Getting Started with the Command Line Interface

Guide to initiating CLI configuration, including essential prerequisites and steps.

Setting Up the Configuration Environment

Instructions for preparing the console connection and terminal emulation software.

Logging In to the CLI

Steps for authenticating and accessing the Command Line Interface using username and password.

CLI Commands

Overview of available commands for device management via the Command Line Interface.

Configuration Wizard

Overview

Introduction to the configuration wizard's purpose and guidance.

Basic Service Setup

Steps to configure fundamental network parameters using the wizard.

Entering the Configuration Wizard Homepage

Navigation path to access the initial page of the configuration wizard.

Configuring System Parameters

Setting essential system parameters like name, location, and contact information.

Configuring Management IP Address

Steps to assign an IP address to the VLAN interface for device management access.

Finishing Configuration Wizard

Reviewing and confirming the configurations completed by the setup wizard.

IRF

IRF Overview

Introduction to Intelligent Resilient Framework (IRF) for stacking network devices.

Introduction to Stack

Explains the concept of a stack as a management domain with master and slave devices.

Establishing a Stack

Procedure for creating a stack, configuring master device, and defining stack ports.

Configuring an IRF Stack

Tasks required for setting up an IRF stack, including global parameters and ports.

Configuring Global Parameters of a Stack

Setting global parameters for the IRF stack, such as private IP and build stack options.

Configuring Stack Ports

Enabling or disabling ports to be used as stack ports for IRF communication.

Displaying Topology Summary of a Stack

Viewing the topological layout and member status of the IRF stack.

Displaying Device Summary of a Stack

Viewing individual device details and interface layouts within the IRF stack.

Logging Into a Slave Device From the Master

Accessing slave device interfaces from the master device for management.

MSTP Configuration

Overview

Introduction to Spanning Tree Protocols (STP, RSTP, MSTP) and their evolution.

Introduction to STP

Explanation of STP's role in eliminating network loops and preventing duplicate packets.

Protocol Packets of STP

Details on Bridge Protocol Data Units (BPDUs) used in STP for topology calculation.

Basic Concepts in STP

Defines key STP terms like Root Bridge, Root Port, Designated Bridge, and Designated Port.

Link Aggregation and LACP Configuration

Overview

Introduction to aggregating multiple physical ports into a single logical link.

Basic Concepts of Link Aggregation

Defines aggregate interfaces, aggregation groups, and member port states.

Link Aggregation Modes

Explains static and dynamic aggregation modes, including LACP.

LLDP

Overview

Introduction to Link Layer Discovery Protocol (LLDP) for device discovery and topology mapping.

Basic Concepts

Explains LLDPDUs, TLVs, and LLDPDU encapsulation formats (Ethernet II, SNAP).

Operating Modes of LLDP

Details the different operating modes (TxRx, Tx, Rx, Disable) for LLDP ports.

Configuring LLDP

Tasks for enabling LLDP globally and on ports, and configuring settings.

IGMP Snooping

Overview

Introduction to IGMP snooping for managing multicast groups on Layer 2 devices.

Principle of IGMP Snooping

Explains how IGMP snooping maps ports to multicast addresses and forwards data.

IGMP Snooping Related Ports

Defines router ports and member ports in the context of IGMP snooping.

Configuring IGMP Snooping

Steps for enabling IGMP snooping globally and within VLANs, and configuring port functions.

Routing Configuration

Overview

Introduction to routing functions on switches and the role of routing tables.

Routing Table

Explanation of routing table entries: origin, destination, mask, next hop, and interface.

Static Route

Manual configuration of static routes for network traffic management and performance.

Default Route

Configuration of a default route for packets with no matching entry in the routing table.

DHCP Overview

Introduction to DHCP

Explanation of DHCP's role in automating IP address assignment and network configuration.

DHCP Address Allocation

Mechanisms for IP address allocation: manual, automatic, and dynamic (lease).

Dynamic IP Address Allocation Process

Step-by-step process of how a DHCP client obtains an IP address from a server.

IP Address Lease Extension

How DHCP clients request to extend their IP address lease duration.

DHCP Relay Agent Configuration

Introduction to DHCP Relay Agent

Explains how DHCP relay agents solve subnet limitations for DHCP communication.

Application Environment

Describes the typical setup for DHCP relay agent functionality.

Fundamentals

Overview of DHCP relay agent operation and its benefits.

DHCP Relay Agent Configuration Task List

Key tasks for configuring DHCP relay agents: enabling, server groups, and interface setup.

DHCP Snooping Configuration

DHCP Snooping Overview

Introduction to DHCP snooping as a security feature for managing DHCP traffic.

Functions of DHCP Snooping

Details DHCP snooping's capabilities: IP-to-MAC mapping and ensuring authorized DHCP servers.

Recording IP-to-MAC Mappings of DHCP Clients

How DHCP snooping records client IP-to-MAC bindings from DHCP messages.

Ensuring Clients Use Authorized DHCP Servers

Configuring trusted/untrusted ports to enforce client IP address acquisition from authorized servers.

Diagnostic Tools

Overview

Introduction to diagnostic tools for examining network connectivity and device reachability.

Ping

Function to check device reachability and examine network connectivity using ICMP echo requests.

Trace Route

Utility to display Layer 3 devices in packet delivery path for network failure identification.

Diagnostic Tool Operations

How to perform ping and trace route operations using the web interface.

ARP Management

ARP Overview

Introduction to Address Resolution Protocol (ARP) for IP to MAC address translation.

ARP Function

Explains ARP's role in translating IP addresses to Ethernet MAC addresses for data transmission.

ARP Message Format

Describes the structure of ARP request and reply messages.

ARP Operation

Details the process of ARP address resolution between hosts on the same or different subnets.

Managing ARP Entries

Tasks for displaying and managing ARP entries, including creating static entries.

ARP Attack Defense Configuration

ARP Detection

Feature to forward only ARP packets from authorized clients, preventing man-in-the-middle attacks.

Introduction to ARP Detection

Explains ARP detection's role in preventing MITM attacks by validating ARP packets.

Man-in-the-Middle Attack

Description of MITM attacks resulting from ARP spoofing and how they are facilitated.

802.1X

Overview

Introduction to the 802.1X protocol for port-based access control on wired and wireless LANs.

Architecture of 802.1X

Explains the three entities in 802.1X: Client, Device (Authenticator), and Server (RADIUS).

Authentication Modes of 802.1X

Describes how EAP exchanges authentication information between client, device, and server.

Basic Concepts of 802.1X

Defines controlled/uncontrolled ports, authorized/unauthorized states, and control direction.

AAA Configuration

Overview

Introduction to AAA (Authentication, Authorization, Accounting) for network security management.

Introduction to AAA

Explains the AAA client/server model and its three security functions.

Introduction to ISP Domain

Defines ISP domains for user grouping and distinguishing user attributes.

Configuring AAA

Tasks for configuring AAA, including prerequisites, ISP domains, and authentication/authorization methods.

RADIUS

Overview

Introduction to RADIUS protocol for AAA services and its client/server model.

Introduction to RADIUS

Details RADIUS's distributed information protocol, UDP usage, and extended access methods.

Client/Server Model

Explains the roles of NAS (client) and RADIUS server, including their databases.

Security and Authentication Mechanisms

How RADIUS ensures security via shared keys, password encryption, and multiple authentication methods.

Users

Overview

Module for configuring local users and user groups on the device.

Configuring Users

Steps for creating and managing local user accounts and their attributes.

Configuring a Local User

Detailed guide on creating local user entries with username, password, and service types.

Configuring a User Group

Managing user attributes centrally by creating and configuring user groups.

PKI Configuration

PKI Overview

Introduction to Public Key Infrastructure (PKI) for information security and identity verification.

PKI Terms

Definitions of key PKI terms: Digital Certificate, CRL, and CA Policy.

Architecture of PKI

Explains the PKI system components: entities, CA, RA, and PKI repository.

Operation of PKI

Describes the process of requesting and verifying digital certificates.

Port Isolation Group Configuration

Overview

Introduction to port isolation for Layer 2 traffic separation within VLANs.

Configuring a Port Isolation Group

Steps to configure port isolation, assigning ports to an isolation group.

Authorized IP Configuration

Overview

Function to associate ACLs with Telnet/HTTP services to filter client requests.

Configuring Authorized IP

Steps to associate IPv4 ACLs with Telnet and HTTP services for access control.

ACL Configuration

ACL Overview

Introduction to Access Control Lists (ACLs) for packet filtering and network security.

Introduction to IPv4 ACL

Classification of IPv4 ACLs (Basic, Advanced, Ethernet Frame Header) by ACL number.

IPv4 ACL Match Order

Defines how packets are matched against ACL rules: config vs. auto (depth-first) order.

Configuring an ACL

Tasks for configuring ACLs, including time ranges and creating IPv4 ACLs.

QoS Configuration

Introduction to QoS

Explanation of Quality of Service (QoS) for meeting customer network needs and evaluating performance.

Networks Without QoS Guarantee

Describes best-effort service where packets are treated equally without performance guarantees.

QoS Requirements of New Applications

Discusses special requirements for bandwidth, delay, and jitter for modern network applications.

Congestion: Causes, Impacts, and Countermeasures

Analysis of network congestion causes, negative impacts, and effective countermeasures.

Configuring Queue Scheduling on a Port

Setting queue scheduling modes (SP, WRR) for ports to manage traffic during congestion.

PoE Configuration

PoE Overview

Introduction to Power over Ethernet (PoE) for supplying power to devices via Ethernet cables.

Advantages

Highlights the benefits of PoE: reliability, ease of connection, standardization, and broad application.

Composition

Describes the components of a PoE system: PoE power, PSE, PI, and PD.

Configuring PoE

Prerequisites and basic steps for configuring PoE functionality on the device.

Configuring PoE Ports

Steps to enable/disable PoE, set power state, max power, and priority for individual ports.

Related product manuals