3
COM
®
S
UPERSTACK
®
3
SWITCH 3200 FAMILY DATA SHEET
2
3Com
®
SuperStack
®
3 Switch 3200 family
switches are wirespeed, Layer 3 switches
w
ith 10/100 desktop connections and Gigabit
d
ownlinks for high performance connectivity
to the rest of the network. These switches
support dynamic Layer 3 routing, simplifying
the implementation of Layer 3 networks by
a
utomatically configuring and updating the
switch with all topology changes. This ability
to dynamically reconfigure the routing
provides a significant benefit over the use of
s
tatic routes, avoiding the drawback of many
L
ayer 3 switches which require manual
intervention when changing the topology
of the network.
The SuperStack 3 Switch 3200 is optimized
for edge desktop connections. Layer 3
switching for the network’s edge, with the
Switch 3200’s hardware-based wirespeed
routing, improves performance by routing
locally without data having to travel back to
the network core. This is especially useful in
organizations having or anticipating multiple
subnets in their workgroups, where even
local traffic may otherwise need to be routed
via a core switch.
Also, for edge-optimized deployment, the
SuperStack 3 Switch 3200 supports the
l
earning of up to 2,000 IP routes through an
u
plink to a core router using Router Internet
Protocol (RIP). This high number of routes
enables the switch to operate in larger
networks than can other switches which
h
ave significantly smaller numbers of routes.
The SuperStack 3 Switch 3200 also supports
core-level switching in smaller networks,
with local routing for 32 IP interfaces and up
to 14 routes distributed from other local
Layer 3 devices.
The SuperStack 3 Switch 3200 family
confirms 3Com’s commitment to strong
network security. Its implementation of
IEEE 802.1X network login security helps
ensure all users are authorized before being
granted access to any network resource.
User authentication is carried out using any
standards-based RADIUS server, avoiding
any proprietary authentication mechanisms.
Containment of users to specific areas of
the network can be easily controlled through
Access Control Lists (ACLs), restricting the
IP addresses with which a port can commu-
nicate.