3Com Understanding the Features and Configuration of the 3226 Switch

Page 7

3Com recommends that you set individual ports that are to be members of an aggregated link to the same VLAN membership. This ensures communication between all VLANs at all times.

Telnet and HyperTerminal

Accessing the Command Line Interface via Telnet or Windows HyperTerminal using TCP/IP may not work correctly on some platforms unless it has been configured to send line feeds with carriage returns. To set this for Telnet enter set crlf when in command mode. To set this for HyperTerminal click on the Settings tab in the Properties screen, click ASCII Setup and ensure that Send line ends with line feeds is checked within the ASCII Sending section.

You should not configure HyperTerminal in the above way if you are using a console cable to make a direct connection to the Switch.

Accessing the Command Line Interface is not possible using the default Telnet program supplied with Win- dows XP. Use another Telnet program, such as Hyper- terminal. See the 3Com Knowledgebase for updates and a solution, when available:

http://knowledgebase.3com.com

Port Security and Authentication

When enabling the static port security feature on a port the Switch will report static fail if you exceed the maximum number of secure addresses (200).

The unit will not move the port into secure mode. 3Com recommends that port security be enabled

Points to Note when using the Switch 3226 and Switch 3250

7

on only edge ports which will typically have only a few addresses.

If the address of a device is added as a static secure address on one port and then it is subsequently moved to a different port with security disabled then the device may get intermittent network connectivity. To fix this problem you should remove the address from the original port and consider enabling security on the new port.

When configuring RADIUS using the CLI command security radius setup you should note that the wizard does not include a step to configure the RADIUS shared secret. You will need to configure the shared secret using the security radius sharedSecret command before RADIUS will operate.

The Switch does not log authentication requests or support logging to a RADIUS accounting server. Please use the logs generated on your RADIUS authentication server instead.

To create a user with administrator privileges when using RADIUS device authentication you must ensure that user has the “Service-Type” attribute set to 15.

Some RADIUS servers will not authenticate users with a blank password, all user accounts should have a valid password configured.

Link aggregation and Gigabit ports

When manually configuring an aggregated link the switch may report the following error message:

Image 7
Contents Software License Agreement Related DocumentationAbout this Software Version Enhancements and Fixes for Known Faults Errors and OmissionsWeb Interface VLANs Command Line Interface802.1x Network login authentication Traffic Prioritization Binding an ACL to a port fails occasionally Rmon history statistics and Web port history statistics Software Version Number Static port security and the bridge MAC address table3Com Network Supervisor Discovery Updating the Switch SoftwareConfiguring Link Aggregations Points to Note when using the Switch 3226 and SwitchPoints to Note when Upgrading Software Password RecoveryTelnet and HyperTerminal Port Security and AuthenticationLink aggregation and Gigabit ports SFP Modules IP Configuration and RoutingAccess Control Lists Management via Snmp / MIBs Vlan ConfigurationHttps Management Saving ConfigurationDevice Backup and Restore SSH ManagementRoving Analysis Port Spanning TreeAutonegotiation of Port Speed and Duplex Combination PortsSupported SFP Modules Start-up Time3Com Network Supervisor Known Interoperability Issues