3Com 10031370-01 setup guide Introducing Security

Page 12

1-2 CHAPTER 1: INTRODUCING SECURITY

A complete description of all possible permissions appears in the “Security Objects and Permissions” section later in this chapter.

A permission can be:

Granted—you can do the action

Denied—you cannot do the action

Inherited—you can or cannot do the action based on the permissions defined for your group

Irrevocable—you can do the action and the permission cannot be denied.

To learn more about the types of permissions, see “Icon List—Permission Icons” on page 1-4.

Accounts An “account” does for CommWorks IP Fax Solutions roughly what a “domain” does for Windows NT. Here are some attributes of accounts:

Each account contains one or more users

Every user belongs to one account

Users have more rights to things that belong to their own account, than they do to things that belong to other accounts. For example, a user might have read-access to a public phonebook created by another user who belongs to the same account, but would have no access to phonebooks created by users who belong to a different account.

Each account has its own administrator. Administrators have all-powerful privileges to things (e.g. end-users and fax-jobs) which belong to their own account, but no privileges to things that belong to another account.

Groups Setting up and managing security is easier when objects and users are grouped. Create groups of users to assign similar permissions. For example, you might have a Sales User group that has permission to use the same fax port device.

Create groups of objects to assign users similar permissions to use tham. For example, a subset of modems called Sales might be accessable only by members of the Sales User group.

Positive and Negative Grant permission to do something (positive) or deny permission to do something Security Permissions (negative). The following is an example of a negative permission:

Assume that All Fax Users have permission to use and monitor fax port number 2. Sales users are to use this port, but are not to monitor it. In this

Image 12
Contents Communication Server Security Setup Guide Page Part No -01 Published November 3Com Corporation 5400 Bayfront Plaza Santa Clara, California Disclaimer of Warranties Year 2000 Information Contents Viii About this Guide ConventionsConvention Description Keyboard key names Introducing Security IntroductionIntroducing Security Security Glossary Icon Name Security Glossary Introducing Security Security Glossary Permission Definitions by Object Security Glossary Introducing Security Security Glossary Page Working with Security Starting SecurityTable below describes commands under the Sort item All Accounts Folder Fields for this screen are described below Isdn Create New Group Members Added Make note of all groups selected group or individual belongs Object Permissions by User Group 12 ‘All Attachments’ Permissions by User Group 14 ‘All Attachments’ Permissions by User Page Security Permission Examples PermissionsDefault Permissions Development Permissions SalesAttachment Permissions SalesAttachment Permissions Changed Page Index Reference 1-10 Positive and Negative Security

10031370-01 specifications

The 3Com 10031370-01 is a prominent model in the realm of networking, specifically geared towards facilitating seamless enterprise connectivity. As a managed switch, it is designed to support a wide range of network requirements, making it particularly valuable for businesses aiming to enhance their infrastructure reliability and performance.

One of the primary features of the 3Com 10031370-01 is its support for advanced Layer 2 switching technologies. This enables the switch to intelligently forward data packets based on MAC addresses, ensuring that network traffic is efficiently managed. The device also supports VLANs (Virtual Local Area Networks), allowing organizations to segment network traffic and improve security and performance by reducing broadcast domains.

The switch is implemented with Power over Ethernet (PoE) capabilities, which is a significant advancement for installing VoIP phones, surveillance cameras, and wireless access points. This feature reduces the need for additional power sources, streamlining installation and future upgrades.

With a hardware design focusing on durability and a compact footprint, the 3Com 10031370-01 can easily fit into various networking environments, including small to medium enterprises. The device operates using a fanless design, which not only minimizes noise but also enhances reliability by reducing moving parts, thus extending the lifespan of the equipment.

In terms of security, the switch comes equipped with 802.1X authentication, ensuring that only authorized devices can access the network. This is complemented by capabilities such as storm control, which helps prevent network congestion, and port security features that can restrict access based on MAC addresses.

The 3Com 10031370-01 leverages advanced management features that can be accessed through a web-based GUI (Graphical User Interface), making it easier for administrators to configure and monitor network performance. SNMP (Simple Network Management Protocol) support is also available, which allows for comprehensive network management via third-party tools.

Overall, the 3Com 10031370-01 is a robust networking solution that combines advanced features and technologies tailored for effective network management. Its powerful capabilities in data traffic management, enhanced security, and ease of administration make it an appealing choice for organizations striving for seamless and efficient network operations. As part of the enduring legacy of 3Com in networking, this switch emphasizes reliability and high performance tailored for the modern business landscape.