2
U
SING
THE
3C
OM
W
EB
I
NTERFACE
Starting the 3Com Web Interface
.............................................................
31
Multi-Session Web Connections
.....................................................
31
Accessing the 3Com Web Interface
................................................
32
Understanding the 3Com Web Interface
...................................................
33
Device Representation
....................................................................
35
Using the 3Com Web Interface Management Buttons
....................
35
Using Screen and Table Options
................................................................
36
Saving the Configuration
..........................................................................
40
Resetting the Device
.................................................................................
41
Restoring Factory Defaults
........................................................................
43
Logging Off the Device
.............................................................................
44
3
V
IEWING
B
ASIC
S
ETTINGS
Viewing Device Settings
.................................................................
46
Viewing Color Keys
........................................................................
48
4
M
ANAGING
D
EVICE
S
ECURITY
Configuring System Access
.......................................................................
50
Viewing System Access Settings
.....................................................
51
Defining System Access
..................................................................
52
Modifying System Access
...............................................................
53
Removing System Access
................................................................
54
Defining RADIUS Clients
...........................................................................
55
Defining Port-Based Authentication (802.1X)
............................................
57
Viewing 802.1X Authentication
.....................................................
58
Defining 802.1X Authentication
.....................................................
60
Defining Access Control Lists
....................................................................
62
Viewing MAC Based ACLs
..............................................................
63
Configuring MAC Based ACLs
........................................................
64
Modifying MAC Based ACLs
..........................................................
67
Removing MAC Based ACLs
...........................................................
69
Viewing IP Based ACLs
...................................................................
71
Defining IP Based ACLs
..................................................................
72
Modifying IP Based ACLs
................................................................
77
Removing IP Based ACLs
................................................................
80