3Com 5112M-TPLS installation and operation guide Structure of This Guide

Page 14

Structure of This Guide

This guide contains the following chapters:

Chapter 1, Introduction Introduces the principal features of the Security Module.

Chapter 2, Designing and Expanding the Network Explains examples of possible network configurations using the ONline System Concentrator and the Security Module.

Chapter 3, Installing and Operating the Module Provides illustrated procedures for installing the Security Module into the ONline System Concentrator. Also shows front panel LEDs and the DIP switch on the module.

Chapter 4, Configuring Security Features Describes the security features and provides the management commands to configure these features. Also provided are the commands to show and clear security configurations.

Chapter 5, Troubleshooting Provides help in isolating and correcting problems that may arise during the installation process and during normal operation.

Appendix A, Specifications Provides electrical, environmental, and mechanical specifications for the Security Module, plus information on the module's 50-pin Telco connector, RJ-45 connectors, and Twisted Pair cables.

Appendix B, Technical Support Lists the various methods for contacting the 3Com technical support organization and for accessing other product support services.

Index

xiv ONline 10BASE-T Security Module Installation and Operation Guide

Image 14
Contents Page VDE Class B Compliance Restricted Rights Page Contents Installing and Operating the Module Troubleshooting Appendix B Technical Support Figures Page Tables Page How to Use This Guide AudienceStructure of This Guide Usr/snm/agents Document ConventionsConvention Indicates Example Related Documents 3Com Documents Reference DocumentsPage Introduction ONline 10BASE-T Security ModuleTheory of Operation ApplicationONline Management ONline 10BASE-T Security Module ApplicationPage Designing and Expanding the Network Understanding the General Rules Basic Network RulesSeven Basic Network Rules Rule Definition Recommendations/NotesCertain LAN devices Seven Basic Network Rules LAN Product Equivalent Fiber LAN EquivalenceLAN Product Equivalent Distances Fiber Backbone, Twisted Pair To-The-Desk Fiber Backbone, Twisted Pair To-The-Desk Example Sample Configuration Distance Calculation Cable Gauge Supports Link Distances Up To Twisted Pair Backbone, Twisted Pair To-The-DeskMaximum Link Distance on Twisted Pair Patch Panels Unshielded Twisted Pair NetworkRedundant Twisted Pair Configuration Redundant LinksDesigning and Expanding the Network 2 Page Installing and Operating the Module Procedures for Completing Installation Precautionary ProceduresQuick Installation Chart Step Procedure ReferenceInstalling the Module Unpacking Procedures Setting the Dip Switch Security Module Dip Switch SW1 LocationDIP Switch SW1 Network Selection Settings Switch Network Selection Switch SettingsOff On DIP Switch SW1 Security and Link Integrity SettingsSwitch Function Factory Setting Installing the Module Installing the Cable Tie-Wrap KitAttaching the Tie-Wrap Bracket to the Module Attaching Cables With 90 Connectors Installing the Module Installing an ONline 10BASE-T Security ModuleONline 10BASE-T Security Module Cable Connection Configuring the Module Port Redundancy Port EnableNetwork Assignment Link Integrity Module SecurityAutopartition Threshold Saving Module ConfigurationsReverting Module Configurations Showing Module Configurations Show Module Show Module Verbose Show Port Show Port VerboseMonitoring the Front Panel Security Module Faceplate Interpretation of the Security Module LEDs Color State Indicates NameNetwork Check Codes LED State Network ConfigurationLED and Network Verification Page Configuring Security Features Procedure Command Quick Reference for Configuring SecurityQuick Reference for Configuring the Security Module SET Security Autolearn Configuring Security Features Eavesdropping SecurityIntrusion Detection Example of Eavesdropping SecurityDefining Port Security Type Example of Intrusion DetectionDefining Port Action on Intrusion Configuring Autolearning Mask Enabling PortsConfiguring Autolearning Autolearn capture done learned 0 addresses total Defining a MAC Address Manually Downloading the Autolearning Database Configuring Security Mode Reverting Security Configurations Showing Security ConfigurationsSaving Security Configurations Showing Port Configurations Eavesdrop None ETHERNET1 Showing Security Autolearn Showing Security Intruder List Clearing Security Configurations Clearing the MAC Address TableClearing the Autolearning Database Clearing the Security Intruder ListUsing 3Com MIB Security Variables EMM Security Snmp VariablesUsing the Security Module Snmp Variables Configuring Security Features 4 Page Troubleshooting TroubleshootingTroubleshooting Using the Status LEDs Troubleshooting Using the Port Status LEDsTroubleshooting Using the Port Status LEDs LED State Possible Problem Troubleshooting Solutions Troubleshooting Using the Activity LEDsTroubleshooting Using the Activity LEDs Technical Assistance Page Specifications Electrical SpecificationsGeneral Specifications Environmental SpecificationsMechanical Specifications Pin Connector and Cable Figure A-1 -Pin Cable Male and Female Connectors Port # Function Table A-1 -Pin Cable Pinouts and Port AssignmentsHub Trans Ceiver PolarityHub Twisted Pair Connectors and CablesHub Trans Port #Twisted Pair Connectors Figure A-2. RJ-45 Connector PinoutsTwisted Pair Cables Technical Support On-line Technical SupportWorld Wide Web Site Support from Your Network SupplierEmail Technical Support Support from 3Com Accessing the 3Com MIB Returning Products for Repair3Com Technical Publications Page Index Activity LEDs, 3-18,3-20 Quick Reference Chart Security Type Default Setting Index