3Com 3848 Implementation Guide - Page 6
AKING, ETWORK, ECURE, ONFIGURATION, XAMPLES, DDRESSING, Securing Access to the Command Line Interface - support
UPC - 662705482149
View all 3Com 3848 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 6 highlights
Server Support 73 Event Log Entries and Traps 73 10 MAKING YOUR NETWORK SECURE Securing Access to the Web Interface 75 Getting a Digital Certificate 76 Securing Access to the Command Line Interface 76 Access Control Lists 77 How Access Control List Rules Work 77 Port Security 78 What is Network Login? 78 How Network Login Works 79 Important Considerations 80 What is Switch Management Login? 81 Benefits of RADIUS Authentication 82 How RADIUS Authentication Works 82 Important Considerations 83 What is RADIUS? 83 A CONFIGURATION RULES Configuration Rules for Gigabit Ethernet 85 Configuration Rules for Fast Ethernet 86 Configuration Rules with Full Duplex 87 B NETWORK CONFIGURATION EXAMPLES Simple Network Configuration Examples 90 Desktop Switch Example 90 C IP ADDRESSING IP Addresses 91 Simple Overview 91 Advanced Overview 92 Subnets and Subnet Masks 94 Default Gateways 96