2USING THE 3COM WEB INTERFACE
Starting the 3Com Web Interface.............. ...............................................31
Multi-Session Web Connections ..................................................... 31
Accessing the 3Com Web Interface ................................................ 32
Understanding the 3Com Web Interface...................................................33
Device Representation .................................................................... 35
Using the 3Com Web Interface Management Buttons .................... 35
Using Screen and Table Options................................................................36
Saving the Configuration..........................................................................40
Resetting the Device..................................................................... ............41
Restoring Factory Defaults...................................... ..................................43
Logging Off the Device.............................................................................44
3VIEWING BASIC SETTINGS
Viewing Device Settings ................................ ................................. 46
Viewing Color Keys .................................................... .................... 48
4MANAGING DEVICE SECURITY
Configuring System Access.......................................................................50
Viewing System Access Settings ............. ........................................ 51
Defining System Access .................................................................. 52
Modifying System Access ................. .............................................. 53
Removing System Access ................................................................ 54
Defining RADIUS Clients............................................................... ............55
Defining Port-Based Authentication (802.1X)............................................57
Viewing 802.1X Authentication .... ................................................. 58
Defining 802.1X Authentication ..................................................... 60
Defining Access Control Lists.................................................................... 62
Viewing MAC Based ACLs .............................................................. 63
Configuring MAC Based ACLs ........................................................ 64
Modifying MAC Based ACLs .......................................................... 67
Removing MAC Based ACLs ........................................................... 69
Viewing IP Based ACLs ............................................... .................... 71
Defining IP Based ACLs .................................................................. 72
Modifying IP Based ACLs ................................................................ 77
Removing IP Based ACLs ............................ .................................... 80