3com SuperStack® 3 Switch 3226 3CR17500-91-ME User Manual

Product codes
3CR17500-91-ME
Page of 5
3 C O M
®
S U P E R S TA C K
®
3   S W I T C H   3 2 0 0   FA M I LY   D ATA   S H E E T
2
3Com
®
SuperStack
®
3 Switch 3200 family
switches are wirespeed, Layer 3 switches
with 10/100 desktop connections and Gigabit
downlinks for high performance connectivity
to the rest of the network. These switches
support dynamic Layer 3 routing, simplifying
the implementation of Layer 3 networks by
automatically configuring and updating the
switch with all topology changes. This ability
to dynamically reconfigure the routing
provides a significant benefit over the use of
static routes, avoiding the drawback of many
Layer 3 switches which require manual 
intervention when changing the topology 
of the network.
The SuperStack 3 Switch 3200 is optimized
for edge desktop connections. Layer 3
switching for the network’s edge, with the
Switch 3200’s hardware-based wirespeed
routing, improves performance by routing
locally without data having to travel back to
the network core. This is especially useful in
organizations having or anticipating multiple
subnets in their workgroups, where even
local traffic may otherwise need to be routed
via a core switch.
Also, for edge-optimized deployment, the
SuperStack 3 Switch 3200 supports the
learning of up to 2,000 IP routes through an
uplink to a core router using Router Internet
Protocol (RIP). This high number of routes
enables the switch to operate in larger
networks than can other switches which
have significantly smaller numbers of routes.
The SuperStack 3 Switch 3200 also supports
core-level switching in smaller networks,
with local routing for 32 IP interfaces and up
to 14 routes distributed from other local
Layer 3 devices.
The SuperStack 3 Switch 3200 family
confirms 3Com’s commitment to strong
network security.  Its implementation of
IEEE 802.1X network login security helps
ensure all users are authorized before being
granted access to any network resource.
User authentication is carried out using any
standards-based RADIUS server, avoiding
any proprietary authentication mechanisms.
Containment of users to specific areas of 
the network can be easily controlled through
Access Control Lists (ACLs), restricting the
IP addresses with which a port can commu-
nicate.
 2
3
Floor
1
 2
3
4
Building
1
4
XRN
Distr
ibute
d Fab
ric
3Com
Switc
h 4060
802.3ad)
3Com
Switc
h 77
00
Serve
r
farm
Supe
rStac
k 3
Switc
h 492
4
XRN
Distr
ibute
d Fab
ric
3Com
1000
BASE-T
Serv
er N
ICs
3Com
Supe
rStac
k® 3
Switc
h 322
6
3CR1
7500-
91
Supe
rStac
k 3
Switc
h 322
6
3CR1
7500-
91
Supe
rStac
k 3
Switc
h 322
6
Configuration Example