3Com 5112M-TPLS installation and operation guide Designing and Expanding the Network 2

Page 35

To set link redundancy between two Security Modules:

1.Connect two links to two ports on the 50-Pin Telco cables between the modules. Use a crossover adapter between each link because the links are designed to be connected to a station's port, not to other concentrator ports.

2.Use the SET PORT {slot.port} MODE REDUNDANT {slot.port} network management command to specify which port is the primary link and which is the backup link.

Note: If the Security Modules are powered down, and powered up without a 3Com network management module present, a network loop could occur. To prevent a potential network failure, set the DIP switch for the backup port to disable.

3.Once link redundancy is configured, a switchover occurs under two conditions: a link failure or a port partition. The switchover occurs when the primary link fails.

4.Once the switchover occurs and the backup link becomes operational, a switchover back to the primary link happens automatically once the problem is resolved.

Note: If you use a Security Module port as a backbone connection ensure that Security Mode is disabled for the port or it will experience security intrusion attempts.

Refer to the appropriate network management module installation and operation guide for information on setting redundancy between Security Module ports.

Designing and Expanding the Network 2 - 13

Image 35
Contents Page VDE Class B Compliance Restricted Rights Page Contents Installing and Operating the Module Troubleshooting Appendix B Technical Support Figures Page Tables Page Audience How to Use This GuideStructure of This Guide Usr/snm/agents Document ConventionsConvention Indicates Example Related Documents Reference Documents 3Com DocumentsPage ONline 10BASE-T Security Module IntroductionApplication Theory of OperationONline 10BASE-T Security Module Application ONline ManagementPage Designing and Expanding the Network Basic Network Rules Understanding the General RulesRule Definition Recommendations/Notes Seven Basic Network RulesCertain LAN devices Seven Basic Network Rules LAN Product Equivalent Fiber LAN EquivalenceLAN Product Equivalent Distances Fiber Backbone, Twisted Pair To-The-Desk Fiber Backbone, Twisted Pair To-The-Desk Example Sample Configuration Distance Calculation Cable Gauge Supports Link Distances Up To Twisted Pair Backbone, Twisted Pair To-The-DeskMaximum Link Distance on Twisted Pair Unshielded Twisted Pair Network Patch PanelsRedundant Links Redundant Twisted Pair ConfigurationDesigning and Expanding the Network 2 Page Installing and Operating the Module Step Procedure Reference Precautionary ProceduresQuick Installation Chart Procedures for Completing InstallationInstalling the Module Unpacking Procedures Security Module Dip Switch SW1 Location Setting the Dip SwitchSwitch Network Selection Switch Settings DIP Switch SW1 Network Selection SettingsOff On DIP Switch SW1 Security and Link Integrity SettingsSwitch Function Factory Setting Installing the Cable Tie-Wrap Kit Installing the ModuleAttaching the Tie-Wrap Bracket to the Module Attaching Cables With 90 Connectors Installing an ONline 10BASE-T Security Module Installing the ModuleONline 10BASE-T Security Module Cable Connection Configuring the Module Port Redundancy Port EnableNetwork Assignment Module Security Link IntegrityAutopartition Threshold Saving Module ConfigurationsReverting Module Configurations Show Module Show Module Verbose Show Port Show Port Verbose Showing Module ConfigurationsMonitoring the Front Panel Security Module Faceplate Color State Indicates Name Interpretation of the Security Module LEDsNetwork Check Codes LED State Network ConfigurationLED and Network Verification Page Configuring Security Features Procedure Command Quick Reference for Configuring SecurityQuick Reference for Configuring the Security Module SET Security Autolearn Eavesdropping Security Configuring Security FeaturesExample of Eavesdropping Security Intrusion DetectionExample of Intrusion Detection Defining Port Security TypeDefining Port Action on Intrusion Enabling Ports Configuring Autolearning MaskConfiguring Autolearning Autolearn capture done learned 0 addresses total Defining a MAC Address Manually Downloading the Autolearning Database Configuring Security Mode Reverting Security Configurations Showing Security ConfigurationsSaving Security Configurations Showing Port Configurations Eavesdrop None ETHERNET1 Showing Security Autolearn Showing Security Intruder List Clearing the MAC Address Table Clearing Security ConfigurationsClearing the Security Intruder List Clearing the Autolearning DatabaseEMM Security Snmp Variables Using 3Com MIB Security VariablesUsing the Security Module Snmp Variables Configuring Security Features 4 Page Troubleshooting TroubleshootingTroubleshooting Using the Port Status LEDs Troubleshooting Using the Status LEDsTroubleshooting Using the Port Status LEDs LED State Possible Problem Troubleshooting Solutions Troubleshooting Using the Activity LEDsTroubleshooting Using the Activity LEDs Technical Assistance Page Electrical Specifications SpecificationsGeneral Specifications Environmental SpecificationsMechanical Specifications Pin Connector and Cable Figure A-1 -Pin Cable Male and Female Connectors Polarity Table A-1 -Pin Cable Pinouts and Port AssignmentsHub Trans Ceiver Port # FunctionPort # Twisted Pair Connectors and CablesHub Trans HubFigure A-2. RJ-45 Connector Pinouts Twisted Pair ConnectorsTwisted Pair Cables On-line Technical Support Technical SupportWorld Wide Web Site Support from Your Network SupplierEmail Technical Support Support from 3Com Returning Products for Repair Accessing the 3Com MIB3Com Technical Publications Page Index Activity LEDs, 3-18,3-20 Quick Reference Chart Security Type Default Setting Index