EasyManua.ls Logo

3Com SUPERSTACK 3 3250 User Manual

3Com SUPERSTACK 3 3250
132 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
http://www.3com.com/
Part No. DUA1750-0BAA01
Published December 2003
SuperStack
®
3
Switch 3226 and Switch 3250
Implementation Guide
3CR17500-91
3CR17501-91

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the 3Com SUPERSTACK 3 3250 and is the answer not in the manual?

3Com SUPERSTACK 3 3250 Specifications

General IconGeneral
Brand3Com
ModelSUPERSTACK 3 3250
CategorySwitch
LanguageEnglish

Summary

Switch Features Overview

Configuration Save and Restore

Covers saving switch configurations to a remote server and restoring them.

Optimizing Bandwidth

Aggregated Links

Explains combining multiple links (ports) for higher bandwidth and redundancy.

How 802.3ad Link Aggregation Operates

Details the Link Aggregation Control Protocol (LACP) for automatic link aggregation.

Using Multicast Filtering

Multicast Filtering

Explains forwarding multicast traffic only to registered endstations.

Using Resilience Features

Rapid Spanning Tree Protocol

Introduces RSTP for network resilience against link failure and loop prevention.

Using Traffic Management

What is Traffic Prioritization?

Explains prioritizing time-sensitive and system-critical data for minimal delay.

Limiting the Rate of a Port

Discusses controlling traffic rates on ports to manage congestion.

Status Monitoring and Statistics

Setting Up Virtual LANs

VLANs: Tagged and Untagged Membership

Explains the concepts of tagged and untagged port membership in VLANs.

Making Your Network Secure

Limiting Management Access by IP Address

Restricting management access to specific IP addresses or ranges.

Securing Access to the Web Interface

Using HTTPS for secure remote management via the web interface.

Securing Access to the Command Line Interface

Using SSH for secure remote management via the command line interface.

Port Security

Securing network ports using MAC addresses or network login authentication.

What is Network Login?

Explains 802.1X for port-based user authentication.

IP Routing

Benefits of IP Routing

Lists advantages: economy, optimal routing, and network resiliency.

Address Resolution Protocol (ARP)

Explains ARP for locating MAC addresses corresponding to IP addresses.

IP Addressing

Subnets and Subnet Masks

Explains how to divide IP networks into subnets using subnet masks.

Advanced IP Routing Concepts

Variable Length Subnet Masks (VLSMs)

Explains using different subnet masks for subnetworks to optimize IP space.

Related product manuals