3com 10031370-01 Owner's Manual

Browse online or download Owner's Manual for Software 3com 10031370-01. 3Com 10031370-01 Owner's Manual User Manual

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - Security Setup Guide

Communication Server Security Setup GuideCommWorks ReadyPart Number 10031370

Page 2

x CHAPTER : ABOUT THIS GUIDEYear 2000 Compliance For information on Year 2000 compliance and 3Com products, visit the 3Com Year 2000 Web page:http://w

Page 3

1INTRODUCING SECURITYThis chapter explains how security works and what functions it performs. It also provides reference information on pre-defined us

Page 4 - 95052-8145

1-2 CHAPTER 1: INTRODUCING SECURITYA complete description of all possible permissions appears in the Security Objects and Permissions section later

Page 5

Security Glossary 1-3case, simply remove permission from the Sales User group to deny them access to monitoring feature of fax port 2. All other user

Page 6

1-4 CHAPTER 1: INTRODUCING SECURITYset up here. There are two states of an Account # in reference to a user. The Account # is either Active or Forward

Page 7

Security Glossary 1-5If you are satisfied with the pre-defined User groups and their permissions, you may not need to use this security module at all

Page 8

1-6 CHAPTER 1: INTRODUCING SECURITYServer supervisors cannot create fax jobs unless they also belong the Fax Users group.Account Supervisors Account s

Page 9 - Table 1 Notice Icons

Security Glossary 1-7CommWorks IP Fax Users Members of this group have irrevocable permissions to create fax jobs. You must belong to this group to cr

Page 10 - Year 2000 Compliance

1-8 CHAPTER 1: INTRODUCING SECURITY User Profile Owned by 'Self'This group allows the creator of an object additional permissions for it. Yo

Page 11 - NTRODUCING

Security Glossary 1-9List Cover PageSee that the cover page exists in the list of cover pages using the Fax Send dialog. Other Cover Page Permissions

Page 13 - Security Glossary

1-10 CHAPTER 1: INTRODUCING SECURITYRename FolderChange the folder's name from the Folder Properties dialog.View From FolderView a fax from the

Page 14

Security Glossary 1-11Edit User's Phonebook EntryChange the phonebook entry information for the user from the user's Phonebook Entry dialog

Page 16

2WORKING WITH SECURITYThis chapter explains how to use the security module to create groups and edit permissions.Starting Security The example below w

Page 17 - Security Glossary 1-7

2-2 CHAPTER 2: WORKING WITH SECURITYSorting SecurityInformationThe Security Setup screen has a command bar at the top. This section will address some

Page 18

Starting Security 2-3Setting Up Accounts In a new installation, two default accounts are created automatically: the account names are reserved, and ar

Page 19 - Security Glossary 1-9

2-4 CHAPTER 2: WORKING WITH SECURITY3 Enter the users name in the field and click Add. The User Properties screen appears:Figure 2-4 User Propertie

Page 20

Starting Security 2-5Account Status Active: All account rules apply to this user.Forwarded: All inbound faxes and activity charges will be forwarded t

Page 21 - Security Glossary 1-11

2-6 CHAPTER 2: WORKING WITH SECURITYSetting Up Groups After manually creating users, creating groups provides structure to the security configuration.

Page 22

Starting Security 2-75 The Add Members screen opens in a window to the left of the main screen. Select users one-at-a-time or all at once. Click Add M

Page 23

Communication Server Security Setup GuideCommWorks ReadyPart No. 10031370-01Published November 2000

Page 24 - Table 2-3 Window Commands

2-8 CHAPTER 2: WORKING WITH SECURITYDeleting a User-defined Group1 In Security Setup, select the group you want to remove.2 From the Change menu, clic

Page 25 - Figure 2-3 Add User

Starting Security 2-95 On the command bar, click Permissions. The Permissions window appears:Figure 2-9 Object Permissions by User Group6 This scree

Page 26 - Figure 2-4 User Properties

2-10 CHAPTER 2: WORKING WITH SECURITYDominant PermissionWhen a user belongs to more than one group with different permissions, or is individually defi

Page 27

Starting Security 2-111. Change the permission in this screen. An explicit permission will override a group-inherited permission.2. Make a specific gr

Page 29 - Figure 2-7 Members Added

3SECURITY PERMISSION EXAMPLESThis chapter shows two example procedures. These samples build on concepts discussed earlier in this guide.Sample Sales P

Page 30

3-2 CHAPTER 3: SECURITY PERMISSION EXAMPLESd Click SalesAttachments to expand the folder. Click Permissions!Figure 3-2 Default Permissionse The defa

Page 31 - Starting Security 2-9

Sample Sales Permissions 3-3d Click Permissions! to see that these attachments cannot be used by this group.Figure 3-4 Development Permissionse Open

Page 32

3-4 CHAPTER 3: SECURITY PERMISSION EXAMPLESTo Change Individual Permissions1 In the Sorted by Users window, select a user that does not belong to eith

Page 33 - Starting Security 2-11

7 Click Change Permissions! to allow this user use of the SalesAttachments.Figure 3-7 SalesAttachment Permissions Changed

Page 34

3Com Corporation5400 Bayfront Plaza Santa Clara, California 95052-81453COM CORPORATION (hereinafter 3Com) LIMITED USE SOFTWARE LICENSE AGREEMENTREAD

Page 36

1INDEXAAccount #definition 1-3Account #1 2-3Account Statususer properties 2-5Accounts 1-2creating 2-3overview 1-2Add New User 2-2, 2-3Add To Folderdef

Page 37 - Sample Sales Permissions 3-3

2owned by self 1-7pre-defined User Groups 1-5security 1-1, 2-1Owned By Selfdefinition 1-3overview 1-7Owned by SelfObject list 1-7PPassword/Confirmuser

Page 39

3Com Corporation5400 Bayfront PlazaP.O. Box 58145Santa Clara, CA95052-8145©20003Com CorporationAll rights reservedPrinted in the U.S.A.Part Number 100

Page 40

Compatibility. The Software is only compatible with certain personal computers. The Software may not be compatible with and is not warranted for non

Page 41

Documentation means all guidebooks - either in printed or electronic format - and any other printed material provided by 3Com with the software.Lic

Page 42

CONTENTSABOUT THIS GUIDEConventions...

Page 44

ABOUT THIS GUIDEThis chapter covers security issues over the network, assigning rights and permissions to users.If release notes are shipped with your

Comments to this Manuals

No comments