3Com 10031370-01 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation 3Com 10031370-01. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel 3Com 10031370-01 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation 3Com 10031370-01 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation 3Com 10031370-01 devrait contenir:
- informations sur les caractéristiques techniques du dispositif 3Com 10031370-01
- nom du fabricant et année de fabrication 3Com 10031370-01
- instructions d'utilisation, de réglage et d’entretien de l'équipement 3Com 10031370-01
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage 3Com 10031370-01 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles 3Com 10031370-01 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service 3Com en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées 3Com 10031370-01, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif 3Com 10031370-01, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation 3Com 10031370-01. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    Communication Server Security Setup Guide CommWorks Ready Part Num ber 10031 370[...]

  • Page 2

    [...]

  • Page 3

    Communication Server Security Setup Guide CommWorks Ready Part No . 1003137 0-01 Published November 2000[...]

  • Page 4

    3Com Corporation 5400 Bayfr on t Pl aza Santa Cl ara, California 95052- 8145 3C OM COR POR A TION (h er eina fter 3Co m ) LIMIT ED USE SOF TW AR E LICE NSE AGR EEMEN T REA D CA REF UL L Y : B y exercis ing Lic ens ee s rights to make an d use cop ies of the SO F T W ARE (as may be provid ed for below ) , Li cen see agrees to be boun d by t[...]

  • Page 5

    Comp atib ili ty . T he S of tw are is on ly comp ati ble w ith ce rtain p erson al comp ute rs. Th e So ftw are may not be compatib le with a nd is no t warrant ed for non-compa tible syste ms. C all 3C om Cu stome r Support for informatio n on compatibility . Diskette s and D ocumen tation . 3Com w arrants tha t if the encl osed magn etic disket [...]

  • Page 6

    Docume ntati on me ans all guideb ook s - eithe r in pr inted or e lect ro nic fo rma t - and any oth er print ed mate rial pr ovided by 3C om with t he soft ware. Lice nse me ans t he l icense pur chas ed a nd gra nted i n th is agr eem ent. LICENS E AUTHENTICA TION PROCEDURES are descri bed i n the G etti ng St arted Guid e acco[...]

  • Page 7

    C ONTEN TS A BOUT T HI S G UIDE Convent ions ................... ............. ............. ................... ............. .................... ............. .......... ix Y ear 2 000 Complian ce ................ ............. ............. ................... ............. .................... ........... x 1 I NTRODUCI NG S ECURITY ..........[...]

  • Page 8

    viii[...]

  • Page 9

    A BO U T T HI S G UIDE This chapter c overs security issues over the network, assi gnin g ri ghts and permissions to users. If release notes are shipped with your product and the i nformation there differs from the inf orma tion in this g uide , fo llow the i nst ructi ons i n t he r elease no tes. Most user guides and release notes are a vailable [...]

  • Page 10

    x C HA PTER : A BO UT T HIS G UI DE Y ear 2000 Com pliance For i nformation on Y ear 2000 c om pli anc e and 3Com products, vis it the 3Com Y ear 2000 W eb page: http://www.3com.com/products/yr2000.html Keyboard key names If you must pres s two or more keys simu ltaneously, the key nam es are li nked w ith a p lus sig n (+) . E x amp le: Press Ctrl[...]

  • Page 11

    1 I NTRODUC I NG S ECUR ITY This chapter expl ains how security works and what functions i t performs. It also provides reference i nf orm ati on on pre- de fi ne d us e r g r oups , all per mis s i on s and perm is s ion de finition s . I ntrod uction T he organ izat ion of t his guide f oll ows the con cepts and st eps required to set up security[...]

  • Page 12

    1-2 C HA PTER 1 : I NTRODUCING S ECUR I TY A com p lete descripti on of all possible perm i ssion s appears in the Securi ty Objects and Permissions section lat er in thi s chapter . A pe rm issio n ca n be: ■ Gr an t ed y ou c an do t he ac t i on ■ De niedyo u c anno t d o th e a ction ■ I nherited you can or cann ot do t he [...]

  • Page 13

    S ecu rity G lossary 1-3 case, simply rem ove perm i ssion f rom the Sa l es Us er group to deny them access to mon it oring f eatur e of fax port 2. Al l other user grou ps, except tho se be longing to th e s ub -gro up Sale s U s e r , can still m on itor the m ode m . This illustrate s that use r gro ups with sim ilar perm issions can be m odifi[...]

  • Page 14

    1-4 C HA PTER 1 : I NTRODUCING S ECUR I TY set up here. Ther e ar e two states of an Account # in refer ence to a user . The Accou nt # is either Active or Forw ar ded . T able 1-1 Ic on List Object I cons T able 1-2 Ic on ListPermissio n Icons Adding Members to Pr e-Defined User Gro ups There ar e si x p re-defined user g ro ups; server supe[...]

  • Page 15

    S ecu rity G lossary 1-5 I f you are sati sfied wi th t he pre-defin ed User groups and thei r permissions, you may not need to use this securi ty m odule at all (ex cept t o add new users) . F or m or e info rm atio n on t he p erm ission s for pr e-d efine d gr o ups, see the follo wing se ction,  Pr e-De fine d Us er G ro ups. Pre- D ef i [...]

  • Page 16

    1-6 C HA PTER 1 : I NTRODUCING S ECUR I TY S erver supervisors c annot c reate fax jobs unless they also be long the Fax Users group. Account Supervisors Account supervi sors are created t o provide added securit y for ind ivid uals wh o nee d it. Def ined pro perti es o f acco u nts m igh t pr eve nt s er ver supervisors (who create use rs) f rom [...]

  • Page 17

    S ecu rity G lossary 1-7 Comm Works IP Fax Us ers Members of this gr oup ha ve irrevocable permissions t o creat e f a x j obs . Y ou mu s t belon g to this g roup to create f ax j obs. Assistants Mem bers of t his group can do the same acti ons to fax jobs as the person t hey assist. De fa u lt O bje c t P er m issi on s This se ction list s th e [...]

  • Page 18

    1-8 C HA PTER 1 : I NTRODUCING S ECUR I TY ■ Use r Pr ofi le O wne d by 'Sel f' This group allows t he creator of an obj ect addit ional permissions for i t. Y ou can change these permissions as n eeded. For mor e i nformation on the defaul t permissions users have for o bjec ts Owned By Self , see the previous section. For an example o[...]

  • Page 19

    S ecu rity G lossary 1-9 Li st Co ver PageS ee tha t the cover page exi sts in the list of cover pages usin g the Fax S end di al og. Ot her Cover P ag e Permiss i ons are on ly usefu l when you have t he Li st Perm issi on. Use Cover PageS end t he Cover Page with out bound faxes from t he Fax S end dial og. Vi ew Cover PageV iew the Cove[...]

  • Page 20

    1-10 C HAPTER 1: I NTRODUCING S ECU RITY R ename F ol de r  Change t he fol der's name from the F older Properti es dialog . Vie w Fr o m F o ld e rV i ew a fax from the folder i n t he Fax I mage Vi ewer . Ph onebook Permis s i ons Ad d to P h o neb ook  A dd a r eci pi ent to a phon ebook or phonebook group on the Phonebooks win dow[...]

  • Page 21

    S ecu rity G lossary 1-11 E di t U s e r ' s P h oneb ook E nt ry  Change t he phonebook entry i nformation for the user f rom the user' s Phonebook Entry di alog. List U ser  See that t he user exist s on the Authoriz ed Users dial og. Other user permissions are only useful when you have the Li st Permission. V ie w User P ro file [...]

  • Page 22

    [...]

  • Page 23

    2 W ORKI NG W ITH S EC URITY This chapt er explains how to use the security mod ule t o crea te groups and e dit permissions. Star ti ng Secur it y The e xample be low will use the Server Adm i nistrator b u t t o n me n u t o w o r k w i t h se curi ty fe atu re s. Acces s is a lso av aila bl e fr om the fax clie nt scr ee n. T o sta rt the Secu r[...]

  • Page 24

    2-2 C HA PTER 2 : W ORKI NG W ITH S ECU RITY Sortin g Security Info rm at ion The Security Setup screen has a com mand bar at the to p. T his section wil l addre ss some of the com mands found in this area. The table below describes c om mands under the Ch an g e it em : T able 2-1 Cha nge C om m ands The table below describes c om mands under the [...]

  • Page 25

    S ta rti ng S ecuri ty 2-3 Settin g U p Accou nts In a new i ns tallat ion, t wo default acc ounts are created automaticall y: the acc ount names ar e rese rved, an d a re displayed as Acc ount # 1 and S ystem Account. These acc ounts cannot be delet ed. T o vie w the li st o f a ccou nts, click the plu s sign (+ ) to expa nd the All Ac[...]

  • Page 26

    2-4 C HA PTER 2 : W ORKI NG W ITH S ECU RITY 3 Enter the us er s na m e in the field and click Add . The Us er Proper ti es screen appears: Fig ur e 2-4 User Pr ope rties Field s fo r th is s cr ee n a re de scrib ed be low : T able 2-4 User Pr operties Fie lds Field Name Des cription Settings User ID User Nam e Use r name a ppears automa ticall[...]

  • Page 27

    S ta rti ng S ecuri ty 2-5 Acc ount Status Act iv e : All account rule s ap ply t o t his us er. Fo rward e d : All inbound faxes a nd activity charges will be forwarded to the account named in the Forw arded T o fie ld below. Ac t iv e i s the defau lt setting. Long Distance Use this o ptional se cti on if s peci al c ode s are need ed t o mak e l[...]

  • Page 28

    2-6 C HA PTER 2 : W ORKI NG W ITH S ECU RITY Se tt i ng U p Grou ps Af ter manually creati ng users, c reating groups provides structure to the security confi gurati on. For e xample, a sep arate gr oup may be created for each department so that the use o f attachm ents, phone book s or port devices is r estricted. Settin g up groups p repar es a d[...]

  • Page 29

    S ta rti ng S ecuri ty 2-7 5 The Add Mem b ers s creen opens in a window to the l eft of the main screen. Select users one-at-a-tim e or all at once. Click Ad d Mem b er! and th e na m es appe ar in the expan de d gro upna m e fo lde r . Fig ur e 2-7 Members Added If you select an inappropriate group typ e is selected, Security will ma ke an automa[...]

  • Page 30

    2-8 C HA PTER 2 : W ORKI NG W ITH S ECU RITY De le ting a User -d efine d Gr oup 1 In Secu rity Setup , select the group yo u want to rem ove. 2 Fro m th e Ch ange m enu , click Delete Gr oup . 3 The gro up is r em oved from the list. Sub- Gr oups Use rs and obje cts can belong to mo r e th an one gro up. T o view a ll gro u ps to w hich the user o[...]

  • Page 31

    S ta rti ng S ecuri ty 2-9 5 On the comm and bar , cli ck P e r m issi o n s . The P er m i ssio n s wi ndow appears: Fig ur e 2-9 Object Pe rm issions by U ser Gr oup 6 This screen shows that all inheri ted per m issi ons have been tr ansferred to al l users in this g ro up. Change o ne or two perm issions to perform the next step. Figure 2 -10 Ch[...]

  • Page 32

    2-10 C HAPTER 2: W ORKI NG W ITH S EC URITY Do mina nt P er mis s i on W hen a user be longs to mor e than one gr oup with different perm issions, or i s indi vidually defined for sp ecif ic object s, which permission i s used? Rule 1. Indiv idua l s perm is s ions ove rrule the pe rm is s ion s for a grou p . An individual permission ove rrides[...]

  • Page 33

    S ta rti ng S ecuri ty 2-1 1 1. C hang e th e pe rm issio n in th is sc re e n. An exp licit pe rm i ss ion will o ver rid e a gro up-inhe rited perm ission . 2. Make a specif ic group for Sales Att achm ent s. These public attachments are acc essible by al l sal es persons. Gall agan has permission to delete i n t his object gro up: Figure 2 -14 ?[...]

  • Page 34

    [...]

  • Page 35

    3 S EC URITY P E R MI SSI O N E XA M P L E S This chapt er shows two exam p le proced ure s. T hese sam pl es build on concepts discussed earli er in this gui de. Sample Sal es Per m iss ion s This sample uses a group of users cal led SrSales and a group o f attachm ents called Sales Attach me nts . T h i s s a m p l e e x p l a i n s h o w t o c h[...]

  • Page 36

    3-2 C HA PTER 3 : S ECU RITY P ERM I SSI ON E XAM PLES d Click Sales Attach me nts to expand the folder . Click P er m i ssio n s! Fig ur e 3-2 Default Pe rmiss ions e The default perm i ssions for Sales Attachments sh ows t hat no perm i ssions ar e gran ted . 2 Grant the Deve lopers group permission to use the attac hm ents in the SalesA ttachmen[...]

  • Page 37

    S am ple Sales Perm issions 3-3 d Cli c k P e rm issi o n s! to see that these att achments cann ot be used by thi s gro up. Fig ur e 3-4 Developm ent Perm issions e Ope n the SrSa le s g r oup. f Ope n the All Attachmen ts fol der an d cl ick on Sales Attach m ents . Fig ur e 3-5 SrSa les P erm iss ion s g Cli c k P e rm issi o n s! to see that th[...]

  • Page 38

    3-4 C HA PTER 3 : S ECU RITY P ERM I SSI ON E XAM PLES T o Ch ang e I ndi vi du al Per mis s i ons 1 In th e So rted b y Us ers window , select a user tha t does no t belong to either the SrSales g ro up or the Ser ver Supe rvi s or s pre-defin ed group. Double- cli ck the user to di spl ay the obj ects. C heck the groups to which a user belo ngs b[...]

  • Page 39

    7 Clic k Cha ng e Perm issi ons! to all ow this user use of the SalesAttach men ts . Fig ur e 3-7 SalesAttachm ent Perm i ssions C hanged[...]

  • Page 40

    [...]

  • Page 41

    1 I NDEX A Acco unt # definition 1-3 Acco unt #1 2-3 Acc ount Status user propertie s 2-5 Acco unt s 1-2 cr ea ting 2 -3 overview 1-2 Add New User 2-2, 2 -3 Add T o Fold er definition 1-9 Add to P honebook definition 1-10 Adding Users to pre -defined Gro ups 1-4 Adding Members to Pr e-Defined User Gr ou ps 1 - 4 All 'Objects' Owned By Sel[...]

  • Page 42

    2 owned by self 1-7 pr e-d ef ined User Gr oups 1 -5 securi ty 1-1, 2-1 Own ed By Se lf definition 1-3 overview 1-7 Own ed by Se lf Object list 1-7 P Pas swor d/Co nfirm user propertie s 2-4 Pause Fax Job definition 1-9 Pause/ Resume all Serve r Modems definition 1-11 Perm issi on default Object 1-7 modem list 1-1 O bject Permissi ons d efin ed 1 -[...]

  • Page 43

    [...]

  • Page 44

    3Com Cor porati on 5400 B ayfront Plaza P.O. B ox 5814 5 Santa Clara , CA 95052 -8145 ©200 0 3Com Cor porati on All rights rese rved Printed in the U.S .A. Part Num ber 10031 370-0 1[...]