3Com 3848 Implementation Guide - Page 6

AKING, ETWORK, ECURE, ONFIGURATION, XAMPLES, DDRESSING, Securing Access to the Command Line Interface - support

Page 6 highlights

Server Support 73 Event Log Entries and Traps 73 10 MAKING YOUR NETWORK SECURE Securing Access to the Web Interface 75 Getting a Digital Certificate 76 Securing Access to the Command Line Interface 76 Access Control Lists 77 How Access Control List Rules Work 77 Port Security 78 What is Network Login? 78 How Network Login Works 79 Important Considerations 80 What is Switch Management Login? 81 Benefits of RADIUS Authentication 82 How RADIUS Authentication Works 82 Important Considerations 83 What is RADIUS? 83 A CONFIGURATION RULES Configuration Rules for Gigabit Ethernet 85 Configuration Rules for Fast Ethernet 86 Configuration Rules with Full Duplex 87 B NETWORK CONFIGURATION EXAMPLES Simple Network Configuration Examples 90 Desktop Switch Example 90 C IP ADDRESSING IP Addresses 91 Simple Overview 91 Advanced Overview 92 Subnets and Subnet Masks 94 Default Gateways 96

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110

Server Support
73
Event Log Entries and Traps
73
10
M
AKING
Y
OUR
N
ETWORK
S
ECURE
Securing Access to the Web Interface
75
Getting a Digital Certificate
76
Securing Access to the Command Line Interface
76
Access Control Lists
77
How Access Control List Rules Work
77
Port Security
78
What is Network Login?
78
How Network Login Works
79
Important Considerations
80
What is Switch Management Login?
81
Benefits of RADIUS Authentication
82
How RADIUS Authentication Works
82
Important Considerations
83
What is RADIUS?
83
A
C
ONFIGURATION
R
ULES
Configuration Rules for Gigabit Ethernet
85
Configuration Rules for Fast Ethernet
86
Configuration Rules with Full Duplex
87
B
N
ETWORK
C
ONFIGURATION
E
XAMPLES
Simple Network Configuration Examples
90
Desktop Switch Example
90
C
IP A
DDRESSING
IP Addresses
91
Simple Overview
91
Advanced Overview
92
Subnets and Subnet Masks
94
Default Gateways
96