Points to Note when using the Switch 3226 and Switch 3250 7
3Com recommends that you set individual ports that
are to be members of an aggregated link to the same
VLAN membership. This ensures communication
between all VLANs at all times.
Telnet and HyperTerminal
Accessing the Command Line Interface via Telnet or
Windows HyperTerminal using TCP/IP may not work
correctly on some platforms unless it has been
configured to send line feeds with carriage returns. To
set this for Telnet enter set crlf when in command
mode. To set this for HyperTerminal click on the
Settings tab in the Properties screen, click ASCII Setup
and ensure that Send line ends with line feeds is
checked within the ASCII Sending section.
You should not configure HyperTerminal in the above
way if you are using a console cable to make a direct
connection to the Switch.
Accessing the Command Line Interface is not possible
using the default Telnet program supplied with Win-
dows XP. Use another Telnet program, such as Hyper-
terminal. See the 3Com Knowledgebase for updates
and a solution, when available:
http://knowledgebase.3com.com
Port Security and Authentication
■ When enabling the static port security feature on a
port the Switch will report static fail if you exceed
the maximum number of secure addresses (200).
The unit will not move the port into secure mode.
3Com recommends that port security be enabled
on only edge ports which will typically have only a
few addresses.
■ If the address of a device is added as a static secure
address on one port and then it is subsequently
moved to a different port with security disabled
then the device may get intermittent network
connectivity. To fix this problem you should remove
the address from the original port and consider
enabling security on the new port.
■ When configuring RADIUS using the CLI command
security radius setup you should note that
the wizard does not include a step to configure the
RADIUS shared secret. You will need to configure
the shared secret using the security radius
sharedSecret command before RADIUS will
operate.
■ The Switch does not log authentication requests or
support logging to a RADIUS accounting server.
Please use the logs generated on your RADIUS
authentication server instead.
■ To create a user with administrator privileges when
using RADIUS device authentication you must
ensure that user has the “Service-Type” attribute
set to 15.
■ Some RADIUS servers will not authenticate users
with a blank password, all user accounts should
have a valid password configured.
Link aggregation and Gigabit ports
■ When manually configuring an aggregated link the
switch may report the following error message: