EasyManua.ls Logo

3Com SUPERSTACK 3 3250 - Page 6

3Com SUPERSTACK 3 3250
132 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
10 MAKING YOUR NETWORK SECURE
Limiting Management Access by IP Address 71
Securing Access to the Web Interface 72
Getting a Digital Certificate 72
Securing Access to the Command Line Interface 73
Access Control Lists 73
How Access Control List Rules Work 74
Port Security 74
What is Network Login? 75
How Network Login Works 75
Important Considerations 76
What is Switch Management Login? 77
Benefits of RADIUS Authentication 77
How RADIUS Authentication Works 78
Important Considerations 79
What is RADIUS? 80
11 IP ROUTING
What is Routing? 82
Routing in a Subnetworked Environment 82
What is IP Routing? 83
Benefits of IP Routing 84
IP Routing Concepts 84
Router Interfaces 84
Routing Tables 85
Layer 3 Switching 86
Multiple IP Interfaces per VLAN 87
Implementing IP Routing 88
Configuring IP VLANs 88
Establishing IP Interfaces 88
IP Routing Protocols 90
Routing Information Protocol (RIP) 90
User Datagram Protocol (UDP) Helper 93
Address Resolution Protocol (ARP) 94
ARP Proxy 96
Internet Control Message Protocol (ICMP) 97
Advanced IP Routing Options 97

Table of Contents

Related product manuals