3Com 3C17205-US Implementation Guide - Page 17
Switch Features Explained, Automatic IP Configuration, Port Security, Automatic IP, Configuration
UPC - 662705468488
View all 3Com 3C17205-US manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 17 highlights
Switch Features Explained 17 9 Log in to the Command Line Interface (CLI) of the Switch 4400 SE unit that you are upgrading. 10 At the Top-level menu, enter: system license add 11 Enter the Activation Key for your Upgrade License. Enter Yes to confirm the installation of the license. The Enhanced Software features are now available on this unit. If your Switch 4400 SE has additional features enabled by a License Key, and that Switch fails, you do not need to purchase an additional License Key. In order to re-use the License Key, when you raise a Return Materials Authorization (RMA) with 3Com for the failed product, your License Key will be released and you will be able to re-use it against the replacement product. To re-use your License Key, you must re-register it against the replacement product at the following URL: http://www.3com.com/register Switch Features Explained The management software provides you with the capability to change the default state of some of the Switch features. This section provides a brief overview of these features - their applications are explained in more detail later in this guide. For a list of the features supported by your Switch, please refer to the Management Quick Reference Guide that accompanies your Switch. Automatic IP Your Switch can have its IP information automatically configured using a Configuration DHCP server, Auto-IP, or BOOTP server. Alternatively, you can manually configure the IP information. For more information about how the automatic IP configuration feature works, see Chapter 10 "Using Automatic IP Configuration". Port Security Your Switch has the following port security features, which guard against unauthorized users connecting devices to your network: s Network Login - controls user access at the network edge by blocking or unblocking access on a per-port basis.