2 USING THE 3COM WEB INTERFACE
Starting the 3Com Web Interface .............................................................31
Multi-Session Web Connections ..................................................... 31
Accessing the 3Com Web Interface ................................................ 32
Understanding the 3Com Web Interface...................................................33
Device Representation .................................................................... 35
Using the 3Com Web Interface Management Buttons .................... 35
Using Screen and Table Options................................................................36
Saving the Configuration..........................................................................40
Resetting the Device.................................................................................41
Restoring Factory Defaults ........................................................................43
Logging Off the Device.............................................................................44
3 VIEWING BASIC SETTINGS
Viewing Device Settings ................................................................. 46
Viewing Color Keys ........................................................................ 48
4 MANAGING DEVICE SECURITY
Configuring System Access.......................................................................50
Viewing System Access Settings ..................................................... 51
Defining System Access .................................................................. 52
Modifying System Access ............................................................... 53
Removing System Access ................................................................ 54
Defining RADIUS Clients...........................................................................55
Defining Port-Based Authentication (802.1X)............................................57
Viewing 802.1X Authentication ..................................................... 58
Defining 802.1X Authentication ..................................................... 60
Defining Access Control Lists....................................................................62
Viewing MAC Based ACLs .............................................................. 63
Configuring MAC Based ACLs ........................................................ 64
Modifying MAC Based ACLs .......................................................... 67
Removing MAC Based ACLs ........................................................... 69
Viewing IP Based ACLs ................................................................... 71
Defining IP Based ACLs .................................................................. 72
Modifying IP Based ACLs ................................................................ 77
Removing IP Based ACLs ................................................................ 80