Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
3Com 10031370-01 manuale d’uso - BKManuals

3Com 10031370-01 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso 3Com 10031370-01. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica 3Com 10031370-01 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso 3Com 10031370-01 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso 3Com 10031370-01 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo 3Com 10031370-01
- nome del fabbricante e anno di fabbricazione 3Com 10031370-01
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature 3Com 10031370-01
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio 3Com 10031370-01 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti 3Com 10031370-01 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio 3Com in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche 3Com 10031370-01, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo 3Com 10031370-01, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso 3Com 10031370-01. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    Communication Server Security Setup Guide CommWorks Ready Part Num ber 10031 370[...]

  • Pagina 2

    [...]

  • Pagina 3

    Communication Server Security Setup Guide CommWorks Ready Part No . 1003137 0-01 Published November 2000[...]

  • Pagina 4

    3Com Corporation 5400 Bayfr on t Pl aza Santa Cl ara, California 95052- 8145 3C OM COR POR A TION (h er eina fter 3Co m ) LIMIT ED USE SOF TW AR E LICE NSE AGR EEMEN T REA D CA REF UL L Y : B y exercis ing Lic ens ee s rights to make an d use cop ies of the SO F T W ARE (as may be provid ed for below ) , Li cen see agrees to be boun d by t[...]

  • Pagina 5

    Comp atib ili ty . T he S of tw are is on ly comp ati ble w ith ce rtain p erson al comp ute rs. Th e So ftw are may not be compatib le with a nd is no t warrant ed for non-compa tible syste ms. C all 3C om Cu stome r Support for informatio n on compatibility . Diskette s and D ocumen tation . 3Com w arrants tha t if the encl osed magn etic disket [...]

  • Pagina 6

    Docume ntati on me ans all guideb ook s - eithe r in pr inted or e lect ro nic fo rma t - and any oth er print ed mate rial pr ovided by 3C om with t he soft ware. Lice nse me ans t he l icense pur chas ed a nd gra nted i n th is agr eem ent. LICENS E AUTHENTICA TION PROCEDURES are descri bed i n the G etti ng St arted Guid e acco[...]

  • Pagina 7

    C ONTEN TS A BOUT T HI S G UIDE Convent ions ................... ............. ............. ................... ............. .................... ............. .......... ix Y ear 2 000 Complian ce ................ ............. ............. ................... ............. .................... ........... x 1 I NTRODUCI NG S ECURITY ..........[...]

  • Pagina 8

    viii[...]

  • Pagina 9

    A BO U T T HI S G UIDE This chapter c overs security issues over the network, assi gnin g ri ghts and permissions to users. If release notes are shipped with your product and the i nformation there differs from the inf orma tion in this g uide , fo llow the i nst ructi ons i n t he r elease no tes. Most user guides and release notes are a vailable [...]

  • Pagina 10

    x C HA PTER : A BO UT T HIS G UI DE Y ear 2000 Com pliance For i nformation on Y ear 2000 c om pli anc e and 3Com products, vis it the 3Com Y ear 2000 W eb page: http://www.3com.com/products/yr2000.html Keyboard key names If you must pres s two or more keys simu ltaneously, the key nam es are li nked w ith a p lus sig n (+) . E x amp le: Press Ctrl[...]

  • Pagina 11

    1 I NTRODUC I NG S ECUR ITY This chapter expl ains how security works and what functions i t performs. It also provides reference i nf orm ati on on pre- de fi ne d us e r g r oups , all per mis s i on s and perm is s ion de finition s . I ntrod uction T he organ izat ion of t his guide f oll ows the con cepts and st eps required to set up security[...]

  • Pagina 12

    1-2 C HA PTER 1 : I NTRODUCING S ECUR I TY A com p lete descripti on of all possible perm i ssion s appears in the Securi ty Objects and Permissions section lat er in thi s chapter . A pe rm issio n ca n be: ■ Gr an t ed y ou c an do t he ac t i on ■ De niedyo u c anno t d o th e a ction ■ I nherited you can or cann ot do t he [...]

  • Pagina 13

    S ecu rity G lossary 1-3 case, simply rem ove perm i ssion f rom the Sa l es Us er group to deny them access to mon it oring f eatur e of fax port 2. Al l other user grou ps, except tho se be longing to th e s ub -gro up Sale s U s e r , can still m on itor the m ode m . This illustrate s that use r gro ups with sim ilar perm issions can be m odifi[...]

  • Pagina 14

    1-4 C HA PTER 1 : I NTRODUCING S ECUR I TY set up here. Ther e ar e two states of an Account # in refer ence to a user . The Accou nt # is either Active or Forw ar ded . T able 1-1 Ic on List Object I cons T able 1-2 Ic on ListPermissio n Icons Adding Members to Pr e-Defined User Gro ups There ar e si x p re-defined user g ro ups; server supe[...]

  • Pagina 15

    S ecu rity G lossary 1-5 I f you are sati sfied wi th t he pre-defin ed User groups and thei r permissions, you may not need to use this securi ty m odule at all (ex cept t o add new users) . F or m or e info rm atio n on t he p erm ission s for pr e-d efine d gr o ups, see the follo wing se ction,  Pr e-De fine d Us er G ro ups. Pre- D ef i [...]

  • Pagina 16

    1-6 C HA PTER 1 : I NTRODUCING S ECUR I TY S erver supervisors c annot c reate fax jobs unless they also be long the Fax Users group. Account Supervisors Account supervi sors are created t o provide added securit y for ind ivid uals wh o nee d it. Def ined pro perti es o f acco u nts m igh t pr eve nt s er ver supervisors (who create use rs) f rom [...]

  • Pagina 17

    S ecu rity G lossary 1-7 Comm Works IP Fax Us ers Members of this gr oup ha ve irrevocable permissions t o creat e f a x j obs . Y ou mu s t belon g to this g roup to create f ax j obs. Assistants Mem bers of t his group can do the same acti ons to fax jobs as the person t hey assist. De fa u lt O bje c t P er m issi on s This se ction list s th e [...]

  • Pagina 18

    1-8 C HA PTER 1 : I NTRODUCING S ECUR I TY ■ Use r Pr ofi le O wne d by 'Sel f' This group allows t he creator of an obj ect addit ional permissions for i t. Y ou can change these permissions as n eeded. For mor e i nformation on the defaul t permissions users have for o bjec ts Owned By Self , see the previous section. For an example o[...]

  • Pagina 19

    S ecu rity G lossary 1-9 Li st Co ver PageS ee tha t the cover page exi sts in the list of cover pages usin g the Fax S end di al og. Ot her Cover P ag e Permiss i ons are on ly usefu l when you have t he Li st Perm issi on. Use Cover PageS end t he Cover Page with out bound faxes from t he Fax S end dial og. Vi ew Cover PageV iew the Cove[...]

  • Pagina 20

    1-10 C HAPTER 1: I NTRODUCING S ECU RITY R ename F ol de r  Change t he fol der's name from the F older Properti es dialog . Vie w Fr o m F o ld e rV i ew a fax from the folder i n t he Fax I mage Vi ewer . Ph onebook Permis s i ons Ad d to P h o neb ook  A dd a r eci pi ent to a phon ebook or phonebook group on the Phonebooks win dow[...]

  • Pagina 21

    S ecu rity G lossary 1-11 E di t U s e r ' s P h oneb ook E nt ry  Change t he phonebook entry i nformation for the user f rom the user' s Phonebook Entry di alog. List U ser  See that t he user exist s on the Authoriz ed Users dial og. Other user permissions are only useful when you have the Li st Permission. V ie w User P ro file [...]

  • Pagina 22

    [...]

  • Pagina 23

    2 W ORKI NG W ITH S EC URITY This chapt er explains how to use the security mod ule t o crea te groups and e dit permissions. Star ti ng Secur it y The e xample be low will use the Server Adm i nistrator b u t t o n me n u t o w o r k w i t h se curi ty fe atu re s. Acces s is a lso av aila bl e fr om the fax clie nt scr ee n. T o sta rt the Secu r[...]

  • Pagina 24

    2-2 C HA PTER 2 : W ORKI NG W ITH S ECU RITY Sortin g Security Info rm at ion The Security Setup screen has a com mand bar at the to p. T his section wil l addre ss some of the com mands found in this area. The table below describes c om mands under the Ch an g e it em : T able 2-1 Cha nge C om m ands The table below describes c om mands under the [...]

  • Pagina 25

    S ta rti ng S ecuri ty 2-3 Settin g U p Accou nts In a new i ns tallat ion, t wo default acc ounts are created automaticall y: the acc ount names ar e rese rved, an d a re displayed as Acc ount # 1 and S ystem Account. These acc ounts cannot be delet ed. T o vie w the li st o f a ccou nts, click the plu s sign (+ ) to expa nd the All Ac[...]

  • Pagina 26

    2-4 C HA PTER 2 : W ORKI NG W ITH S ECU RITY 3 Enter the us er s na m e in the field and click Add . The Us er Proper ti es screen appears: Fig ur e 2-4 User Pr ope rties Field s fo r th is s cr ee n a re de scrib ed be low : T able 2-4 User Pr operties Fie lds Field Name Des cription Settings User ID User Nam e Use r name a ppears automa ticall[...]

  • Pagina 27

    S ta rti ng S ecuri ty 2-5 Acc ount Status Act iv e : All account rule s ap ply t o t his us er. Fo rward e d : All inbound faxes a nd activity charges will be forwarded to the account named in the Forw arded T o fie ld below. Ac t iv e i s the defau lt setting. Long Distance Use this o ptional se cti on if s peci al c ode s are need ed t o mak e l[...]

  • Pagina 28

    2-6 C HA PTER 2 : W ORKI NG W ITH S ECU RITY Se tt i ng U p Grou ps Af ter manually creati ng users, c reating groups provides structure to the security confi gurati on. For e xample, a sep arate gr oup may be created for each department so that the use o f attachm ents, phone book s or port devices is r estricted. Settin g up groups p repar es a d[...]

  • Pagina 29

    S ta rti ng S ecuri ty 2-7 5 The Add Mem b ers s creen opens in a window to the l eft of the main screen. Select users one-at-a-tim e or all at once. Click Ad d Mem b er! and th e na m es appe ar in the expan de d gro upna m e fo lde r . Fig ur e 2-7 Members Added If you select an inappropriate group typ e is selected, Security will ma ke an automa[...]

  • Pagina 30

    2-8 C HA PTER 2 : W ORKI NG W ITH S ECU RITY De le ting a User -d efine d Gr oup 1 In Secu rity Setup , select the group yo u want to rem ove. 2 Fro m th e Ch ange m enu , click Delete Gr oup . 3 The gro up is r em oved from the list. Sub- Gr oups Use rs and obje cts can belong to mo r e th an one gro up. T o view a ll gro u ps to w hich the user o[...]

  • Pagina 31

    S ta rti ng S ecuri ty 2-9 5 On the comm and bar , cli ck P e r m issi o n s . The P er m i ssio n s wi ndow appears: Fig ur e 2-9 Object Pe rm issions by U ser Gr oup 6 This screen shows that all inheri ted per m issi ons have been tr ansferred to al l users in this g ro up. Change o ne or two perm issions to perform the next step. Figure 2 -10 Ch[...]

  • Pagina 32

    2-10 C HAPTER 2: W ORKI NG W ITH S EC URITY Do mina nt P er mis s i on W hen a user be longs to mor e than one gr oup with different perm issions, or i s indi vidually defined for sp ecif ic object s, which permission i s used? Rule 1. Indiv idua l s perm is s ions ove rrule the pe rm is s ion s for a grou p . An individual permission ove rrides[...]

  • Pagina 33

    S ta rti ng S ecuri ty 2-1 1 1. C hang e th e pe rm issio n in th is sc re e n. An exp licit pe rm i ss ion will o ver rid e a gro up-inhe rited perm ission . 2. Make a specif ic group for Sales Att achm ent s. These public attachments are acc essible by al l sal es persons. Gall agan has permission to delete i n t his object gro up: Figure 2 -14 ?[...]

  • Pagina 34

    [...]

  • Pagina 35

    3 S EC URITY P E R MI SSI O N E XA M P L E S This chapt er shows two exam p le proced ure s. T hese sam pl es build on concepts discussed earli er in this gui de. Sample Sal es Per m iss ion s This sample uses a group of users cal led SrSales and a group o f attachm ents called Sales Attach me nts . T h i s s a m p l e e x p l a i n s h o w t o c h[...]

  • Pagina 36

    3-2 C HA PTER 3 : S ECU RITY P ERM I SSI ON E XAM PLES d Click Sales Attach me nts to expand the folder . Click P er m i ssio n s! Fig ur e 3-2 Default Pe rmiss ions e The default perm i ssions for Sales Attachments sh ows t hat no perm i ssions ar e gran ted . 2 Grant the Deve lopers group permission to use the attac hm ents in the SalesA ttachmen[...]

  • Pagina 37

    S am ple Sales Perm issions 3-3 d Cli c k P e rm issi o n s! to see that these att achments cann ot be used by thi s gro up. Fig ur e 3-4 Developm ent Perm issions e Ope n the SrSa le s g r oup. f Ope n the All Attachmen ts fol der an d cl ick on Sales Attach m ents . Fig ur e 3-5 SrSa les P erm iss ion s g Cli c k P e rm issi o n s! to see that th[...]

  • Pagina 38

    3-4 C HA PTER 3 : S ECU RITY P ERM I SSI ON E XAM PLES T o Ch ang e I ndi vi du al Per mis s i ons 1 In th e So rted b y Us ers window , select a user tha t does no t belong to either the SrSales g ro up or the Ser ver Supe rvi s or s pre-defin ed group. Double- cli ck the user to di spl ay the obj ects. C heck the groups to which a user belo ngs b[...]

  • Pagina 39

    7 Clic k Cha ng e Perm issi ons! to all ow this user use of the SalesAttach men ts . Fig ur e 3-7 SalesAttachm ent Perm i ssions C hanged[...]

  • Pagina 40

    [...]

  • Pagina 41

    1 I NDEX A Acco unt # definition 1-3 Acco unt #1 2-3 Acc ount Status user propertie s 2-5 Acco unt s 1-2 cr ea ting 2 -3 overview 1-2 Add New User 2-2, 2 -3 Add T o Fold er definition 1-9 Add to P honebook definition 1-10 Adding Users to pre -defined Gro ups 1-4 Adding Members to Pr e-Defined User Gr ou ps 1 - 4 All 'Objects' Owned By Sel[...]

  • Pagina 42

    2 owned by self 1-7 pr e-d ef ined User Gr oups 1 -5 securi ty 1-1, 2-1 Own ed By Se lf definition 1-3 overview 1-7 Own ed by Se lf Object list 1-7 P Pas swor d/Co nfirm user propertie s 2-4 Pause Fax Job definition 1-9 Pause/ Resume all Serve r Modems definition 1-11 Perm issi on default Object 1-7 modem list 1-1 O bject Permissi ons d efin ed 1 -[...]

  • Pagina 43

    [...]

  • Pagina 44

    3Com Cor porati on 5400 B ayfront Plaza P.O. B ox 5814 5 Santa Clara , CA 95052 -8145 ©200 0 3Com Cor porati on All rights rese rved Printed in the U.S .A. Part Num ber 10031 370-0 1[...]