3Com 5112M-TPLS Twisted Pair Connectors and Cables, Hub Trans, Port #

Page 94

Table A-1. 50-Pin Cable Pinouts and Port Assignments (Continued)

 

Hub

Hub

Trans-

 

 

Hub

Trans-

Hub

ceiver

Hub

Hub

ceiver

Pin

Function

Function

Port #

Function

Port #

Pin#

Function

#

/Polarity

/Polarity

 

/Polarity

 

 

/Polarity

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Port 5

35

TX, +

RX, +

(3)

Port 11

47

TX, +

RX, + (3)

 

 

 

 

 

 

 

 

 

Port 5

10

TX, -

RX, -

(6)

Port 11

22

TX, -

RX, - (6)

 

 

 

 

 

 

 

 

 

Port 6

36

RX, +

TX, +

(1)

Port 12

48

RX, +

TX, + (1)

 

 

 

 

 

 

 

 

 

Port 6

11

RX, -

TX, -

(2)

Port 12

23

RX, -

TX, - (2)

 

 

 

 

 

 

 

 

 

Port 6

37

TX, +

RX, +

(3)

Port 12

49

TX, +

RX, + (3)

 

 

 

 

 

 

 

 

 

Port 6

12

TX, -

RX, -

(6)

Port 12

24

TX, -

RX, - (6)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

50

Not Used

Not Used

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

25

Not Used

Not Used

 

 

 

 

 

 

 

 

 

Twisted Pair Connectors and Cables

You can use many types of cables and connectors to link your Security Module to your network. Use the information in this section to ensure that the cables and connecting hardware meet requirements.

Note: For proper operation, use only approved cables when you install all equipment.

3Com recommends that you connect cables first at the active concentrator location, and connect transceivers second. Refer to the ONline System Concentrator Installation and Operation Guide for more information about the ONline System Concentrator connections.

A - 6 ONline 10BASE-T Security Module Installation and Operation Guide

Image 94
Contents Page VDE Class B Compliance Restricted Rights Page Contents Installing and Operating the Module Troubleshooting Appendix B Technical Support Figures Page Tables Page How to Use This Guide AudienceStructure of This Guide Convention Indicates Example Document ConventionsUsr/snm/agents Related Documents 3Com Documents Reference DocumentsPage Introduction ONline 10BASE-T Security ModuleTheory of Operation ApplicationONline Management ONline 10BASE-T Security Module ApplicationPage Designing and Expanding the Network Understanding the General Rules Basic Network RulesSeven Basic Network Rules Rule Definition Recommendations/NotesCertain LAN devices Seven Basic Network Rules LAN Product Equivalent Distances LAN EquivalenceLAN Product Equivalent Fiber Fiber Backbone, Twisted Pair To-The-Desk Fiber Backbone, Twisted Pair To-The-Desk Example Sample Configuration Distance Calculation Maximum Link Distance on Twisted Pair Twisted Pair Backbone, Twisted Pair To-The-DeskCable Gauge Supports Link Distances Up To Patch Panels Unshielded Twisted Pair NetworkRedundant Twisted Pair Configuration Redundant LinksDesigning and Expanding the Network 2 Page Installing and Operating the Module Procedures for Completing Installation Precautionary ProceduresQuick Installation Chart Step Procedure ReferenceInstalling the Module Unpacking Procedures Setting the Dip Switch Security Module Dip Switch SW1 LocationDIP Switch SW1 Network Selection Settings Switch Network Selection Switch SettingsSwitch Function Factory Setting DIP Switch SW1 Security and Link Integrity SettingsOff On Installing the Module Installing the Cable Tie-Wrap KitAttaching the Tie-Wrap Bracket to the Module Attaching Cables With 90 Connectors Installing the Module Installing an ONline 10BASE-T Security ModuleONline 10BASE-T Security Module Cable Connection Configuring the Module Network Assignment Port EnablePort Redundancy Link Integrity Module SecurityReverting Module Configurations Saving Module ConfigurationsAutopartition Threshold Showing Module Configurations Show Module Show Module Verbose Show Port Show Port VerboseMonitoring the Front Panel Security Module Faceplate Interpretation of the Security Module LEDs Color State Indicates NameLED and Network Verification LED State Network ConfigurationNetwork Check Codes Page Configuring Security Features Quick Reference for Configuring the Security Module Quick Reference for Configuring SecurityProcedure Command SET Security Autolearn Configuring Security Features Eavesdropping SecurityIntrusion Detection Example of Eavesdropping SecurityDefining Port Security Type Example of Intrusion DetectionDefining Port Action on Intrusion Configuring Autolearning Mask Enabling PortsConfiguring Autolearning Autolearn capture done learned 0 addresses total Defining a MAC Address Manually Downloading the Autolearning Database Configuring Security Mode Saving Security Configurations Showing Security ConfigurationsReverting Security Configurations Showing Port Configurations Eavesdrop None ETHERNET1 Showing Security Autolearn Showing Security Intruder List Clearing Security Configurations Clearing the MAC Address TableClearing the Autolearning Database Clearing the Security Intruder ListUsing 3Com MIB Security Variables EMM Security Snmp VariablesUsing the Security Module Snmp Variables Configuring Security Features 4 Page Troubleshooting TroubleshootingTroubleshooting Using the Status LEDs Troubleshooting Using the Port Status LEDsTroubleshooting Using the Port Status LEDs Troubleshooting Using the Activity LEDs Troubleshooting Using the Activity LEDsLED State Possible Problem Troubleshooting Solutions Technical Assistance Page Specifications Electrical SpecificationsMechanical Specifications Environmental SpecificationsGeneral Specifications Pin Connector and Cable Figure A-1 -Pin Cable Male and Female Connectors Port # Function Table A-1 -Pin Cable Pinouts and Port AssignmentsHub Trans Ceiver PolarityHub Twisted Pair Connectors and CablesHub Trans Port #Twisted Pair Connectors Figure A-2. RJ-45 Connector PinoutsTwisted Pair Cables Technical Support On-line Technical SupportEmail Technical Support Support from Your Network SupplierWorld Wide Web Site Support from 3Com Accessing the 3Com MIB Returning Products for Repair3Com Technical Publications Page Index Activity LEDs, 3-18,3-20 Quick Reference Chart Security Type Default Setting Index