3Com 5112M-TPLS installation and operation guide Restricted Rights

Page 3

The Chipcom Multichannel Architecture Communications System is registered under U.S. Patent Number 5,301,303.

XNS is a trademark and Ethernet is a registered trademark of Xerox Corporation.

DEC, DECnet, the Digital logo, DELNI, POLYCENTER, VAX, VT100, and VT220 are trademarks of Digital Equipment Corporation.

UNIX is a registered trademark in the U.S.A. and other countries licensed exclusively through X/Open Company, Ltd.

IBM is a registered trademark of International Business Machines.

3ComFacts, Ask 3Com, CardFacts, NetFacts, and CardBoard are service marks of 3Com Corporation.

3Com, LANplex, BoundaryRouting, LanScanner, LinkBuilder, NETBuilder, NETBuilderII, ParallelTasking, ViewBuilder, EtherDisk, Etherl\Link, EtherLink Plus, EtherLink II, TokenLink, TokenLink Plus, and TokenDisk are registered trademarks of 3Com Corporation.

3ComLaser Library, 3TECH, CacheCard, FDDILink, FMS, NetProbe, SmartAgent, Star-Tek, and Transcend are trademarks of 3Com Corporation.

CompuServe is a registered trademark of CompuServe, Inc.

3Com registered trademarks are registered in the United States, and may or may not be registered in other countries. Other brand and product names may be registered trademarks or trademarks of their respective holders.

Restricted Rights

Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1) (ii) of the Rights in Technical Data and Computer Software clause at

DFARS 252.227-7013.

Printed on recycled paper.

ONline 10BASE-T Security Module Installation and Operation Guide iii

Image 3
Contents Page VDE Class B Compliance Restricted Rights Page Contents Installing and Operating the Module Troubleshooting Appendix B Technical Support Figures Page Tables Page Audience How to Use This GuideStructure of This Guide Document Conventions Convention Indicates ExampleUsr/snm/agents Related Documents Reference Documents 3Com DocumentsPage ONline 10BASE-T Security Module IntroductionApplication Theory of OperationONline 10BASE-T Security Module Application ONline ManagementPage Designing and Expanding the Network Basic Network Rules Understanding the General RulesRule Definition Recommendations/Notes Seven Basic Network RulesCertain LAN devices Seven Basic Network Rules LAN Equivalence LAN Product Equivalent DistancesLAN Product Equivalent Fiber Fiber Backbone, Twisted Pair To-The-Desk Fiber Backbone, Twisted Pair To-The-Desk Example Sample Configuration Distance Calculation Twisted Pair Backbone, Twisted Pair To-The-Desk Maximum Link Distance on Twisted PairCable Gauge Supports Link Distances Up To Unshielded Twisted Pair Network Patch PanelsRedundant Links Redundant Twisted Pair ConfigurationDesigning and Expanding the Network 2 Page Installing and Operating the Module Step Procedure Reference Precautionary ProceduresQuick Installation Chart Procedures for Completing InstallationInstalling the Module Unpacking Procedures Security Module Dip Switch SW1 Location Setting the Dip SwitchSwitch Network Selection Switch Settings DIP Switch SW1 Network Selection SettingsDIP Switch SW1 Security and Link Integrity Settings Switch Function Factory SettingOff On Installing the Cable Tie-Wrap Kit Installing the ModuleAttaching the Tie-Wrap Bracket to the Module Attaching Cables With 90 Connectors Installing an ONline 10BASE-T Security Module Installing the ModuleONline 10BASE-T Security Module Cable Connection Configuring the Module Port Enable Network AssignmentPort Redundancy Module Security Link IntegritySaving Module Configurations Reverting Module ConfigurationsAutopartition Threshold Show Module Show Module Verbose Show Port Show Port Verbose Showing Module ConfigurationsMonitoring the Front Panel Security Module Faceplate Color State Indicates Name Interpretation of the Security Module LEDsLED State Network Configuration LED and Network VerificationNetwork Check Codes Page Configuring Security Features Quick Reference for Configuring Security Quick Reference for Configuring the Security ModuleProcedure Command SET Security Autolearn Eavesdropping Security Configuring Security FeaturesExample of Eavesdropping Security Intrusion DetectionExample of Intrusion Detection Defining Port Security TypeDefining Port Action on Intrusion Enabling Ports Configuring Autolearning MaskConfiguring Autolearning Autolearn capture done learned 0 addresses total Defining a MAC Address Manually Downloading the Autolearning Database Configuring Security Mode Showing Security Configurations Saving Security ConfigurationsReverting Security Configurations Showing Port Configurations Eavesdrop None ETHERNET1 Showing Security Autolearn Showing Security Intruder List Clearing the MAC Address Table Clearing Security ConfigurationsClearing the Security Intruder List Clearing the Autolearning DatabaseEMM Security Snmp Variables Using 3Com MIB Security VariablesUsing the Security Module Snmp Variables Configuring Security Features 4 Page Troubleshooting TroubleshootingTroubleshooting Using the Port Status LEDs Troubleshooting Using the Status LEDsTroubleshooting Using the Port Status LEDs Troubleshooting Using the Activity LEDs Troubleshooting Using the Activity LEDsLED State Possible Problem Troubleshooting Solutions Technical Assistance Page Electrical Specifications SpecificationsEnvironmental Specifications Mechanical SpecificationsGeneral Specifications Pin Connector and Cable Figure A-1 -Pin Cable Male and Female Connectors Polarity Table A-1 -Pin Cable Pinouts and Port AssignmentsHub Trans Ceiver Port # FunctionPort # Twisted Pair Connectors and CablesHub Trans HubFigure A-2. RJ-45 Connector Pinouts Twisted Pair ConnectorsTwisted Pair Cables On-line Technical Support Technical SupportSupport from Your Network Supplier Email Technical SupportWorld Wide Web Site Support from 3Com Returning Products for Repair Accessing the 3Com MIB3Com Technical Publications Page Index Activity LEDs, 3-18,3-20 Quick Reference Chart Security Type Default Setting Index