3Com 3CR13500 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of 3Com 3CR13500, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of 3Com 3CR13500 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of 3Com 3CR13500. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of 3Com 3CR13500 should contain:
- informations concerning technical data of 3Com 3CR13500
- name of the manufacturer and a year of construction of the 3Com 3CR13500 item
- rules of operation, control and maintenance of the 3Com 3CR13500 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of 3Com 3CR13500 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of 3Com 3CR13500, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the 3Com service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of 3Com 3CR13500.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the 3Com 3CR13500 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    December 2003 Security Switc h 6200 A pplica tions Software  Installa tion FIBER 10/100/1000 10/100 CONSOLE (max) 9800,8,N,1 PACKET LINK 1357 2468 91 1 1 3 1 5 10 12 14 16 FIBER PACKET LINK 17 18 PWR MGMT1 MGMT2 SYS HDD[...]

  • Page 2

    © Copyright © 2003, 3Com Cor poration. All right s reserved. No part of this document ation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) with out written permission f rom 3Com Corporation. 3Com Corporation reserves the ri ght to revise this documentatio n an[...]

  • Page 3

    3COM Security Switch 6200 App lications Softwar e Installation Content s 1 Installing Applications on Y our system ........................ .................... 1-1 2 Installing the CheckPoint Fir eW all-1 NG FP3 and NG AI Software Onto Y our System ....................... ..................................................... ........ 2-1 3 Install[...]

  • Page 4

    00xxxxA 3COM Security Switch 6200 Applications Software Installation[...]

  • Page 5

    Inst alling Applications on Y our system The following sections describe how to install appli cations onto your system. For further information on the application s installation, refer to the 3COM Security Switch 6200 Hard ware and Software Users Guide . The following applications are described in thi s guide. NOTE: The following information contai[...]

  • Page 6

    3COM Security Switch 6200 App lications Software Installation 1-2 Installing Applicat ions on Y our system[...]

  • Page 7

    Inst alling the CheckPoint FireW all-1 NG FP3 and NG AI Sof tware Onto Y our System This chapter describe s how to install the Check Point FireW all-1 NG FP3 and NG AI software onto your system. Inst alling the Check Point FireW all-1 NG FP3 Sof tware To download and install the Check Point Fi reWall-1 NG FP3 software on to your system, complete th[...]

  • Page 8

    3COM Security Switch 6200 App lications Software Installation 2-2 Inst alling the CheckPoint FireWall-1 NG FP3 and NG AI Software Onto Y our System 4 To install FireWall- 1, enter the following comman ds: rpm -i CPshrd-50-03.i386.rpm rpm -i CPfw1-50-03.i386.rpm 5 Untar and in stall hotfixes. Refer to the Check P oint website for the latest hotfixes[...]

  • Page 9

    Inst alling the T rend Micro VirusW all, eManager , and IMSS Sof t ware onto Y our System This chapter describes how to install the Tr end Micro VirusWall, eManager, and IMSS software onto your system. Inst alling the T rend Micro VirusW all and eManager Sof tware Trend Micro’s VirusWall pr ovides real-tim e virus de tection and cleanup for the f[...]

  • Page 10

    3COM Security Switch 6200 App lications Software Installation 3-2 Installing the T rend Micro V irusW all, eManager , and IMSS Software onto Y our System • Origin, name, and destination of the file. • Date the file was received . • Identity of the virus found. • Action taken. This allows you to track the source of the proble m and to take t[...]

  • Page 11

    00xxxxA 3COM Security Switch 6200 App lications Softwar e Installation Installing the T rend Micro V irusW all, eManager , and IMSS Software onto Y our System cd /usr/os/apps/VirusWall/1008 b Execute the tar command on the following tar file: tar -zxvf isem_lx_37_1008.tar.gz c Execute the following command: ./install.sh For further information on t[...]

  • Page 12

    3COM Security Switch 6200 App lications Software Installation 3-4 Installing the T rend Micro VirusW all, eManager , and IMSS Software onto Y our System You must now install the application as specified by Trend Micro. The vendor files have been co pied to /usr/os/apps/IMSS. 3 Change to the / usr/os /apps/ directory, us ing the follow ing command: [...]

  • Page 13

    00xxxxA 3COM Security Switch 6200 App lications Softwar e Installation Installing the T rend Micro VirusW all, eManager , and IMSS Software onto Y our System content_filter= smtpd_timeout=$imss_timeout local_recipient_maps= myhostname=localhost.$mydomain 5 Save all changes. V erifying the IMSS Inst a llation To verify the IMSS installation, follo w[...]

  • Page 14

    3COM Security Switch 6200 App lications Software Installation 3-6 Installing the T rend Micro VirusW all, eManager , and IMSS Software onto Y our System[...]

  • Page 15

    Inst alling the Enterasys Dragon Intrusion Detection Sof tware Onto Y our System This chapter descri bes how to inst all the Enterasys Dragon Intrusion Detection software onto your system. Inst alling the Enterasys Dragon Intrusion Detection Sof tware The Enterasys™ Dragon ® Network Intrusion Detection System (NIDS) (Dragon) software detects net[...]

  • Page 16

    3COM Security Switch 6200 App lications Software Installation 4-2 Installing the Enterasys Dr agon Intrusion Detection Softwar e Onto Y our System 4 To install the Drago n so ftware, unzip, and untar the abov e file, using the following co mmand: tar -zxvf Dragon-6.0.2-Linux-i686-BUILD215.tar.gz 5 Change to the following di rectory: cd Dragon-6.0.2[...]

  • Page 17

    Inst alling the Internet Security Systems RealSecure Network Sof tware onto Y our System This chapter descri bes how to instal l the Internet Security Systems’™ RealSecure® Network softw are onto your system. Inst alling the ISS Real Secure Sof tware The Internet Security Systems’™ RealSecure® Network software protects critical assets usi[...]

  • Page 18

    3COM Security Switch 6200 App lications Software Installation 5-2 Installing the Inte rnet Security Systems RealSecure Network Softwar e onto Y our System This directory should contai n the following rpms file: ISS-RealSecure-common-lib-7.0-2003.1 67.i386.rpm ISS-RealSecure-ns-daemon-7.0-2003.16 7.i386.rpm ISS-RealSecure-ns-sensor1-7.0-2003.1 67.i3[...]

  • Page 19

    Inst alling the Snort Sof tware Onto Y our System This chapter describes how to install the Snort software onto your system. Inst alling the Snort Sof tware Snort is a Network Intrusion Detectio n System (NIDS) that performs real- time traffic analysis and pa cket logging on IP networks. Snort performs protocol analysis, content se arching/matching[...]

  • Page 20

    3COM Security Switch 6200 App lications Software Installation 6-2 Installing the Snort Soft ware Onto Y our System[...]

  • Page 21

    Inst alling the WebSense Enterprise Sof tware Onto Y our System This chapter describes how to install the Websense ® Enterprise software onto your system. Inst al ling the Web s e ns e Enterprise Sof tware Websense ® Enterprise, working with Check Point™ FireWall -1 ® allows you to transparently anal yze, manage, and report on traffi c flowing[...]

  • Page 22

    3COM Security Switch 6200 App lications Software Installation 7-2 Installing the W ebSense En terprise Software Onto Y our System 3 Change to the following di rectory: cd 5_0_1 4 Step through the Websense configur ation, using the following command: ./install.sh For further information on the Websense configuration, refer to the Websense documentat[...]

  • Page 23

    Inst alling the Squid Sof tware Onto Y our System This chapter descri bes how to install the Squid software onto your system. Inst alling the Squid Web Proxy Cache Sof tware The Squid software is a high-perform ance proxy caching server for web clients, supporting FTP, gopher, and H TTP data objects. Unlike traditional caching softwa re, Squid hand[...]

  • Page 24

    3COM Security Switch 6200 App lications Software Installation 8-2 Installing the Squid Soft ware Onto Y our Sy stem Inst alling the Squid Sof tware To install the Squid software on to your system, comple te the followin g: 1 Log into your system as root. 2 Locate the file app-squid-x .x-x.x.x.x.7xCOS.i686.rpm 1 and execute the following co mmand at[...]

  • Page 25

    00xxxxA 3COM Security Switch 6200 App lications Softwar e Installation 8-3 Installing the Squid Sof tware Onto Y our System Editing the Squid Configuration File After you have installed the Squi d so ftware you need to define several features within the Squid configurat ion file. To do this, complete the following: 1 Change to the /etc/squ id direc[...]

  • Page 26

    3COM Security Switch 6200 App lications Software Installation 8-4 Installing the Squid Soft ware Onto Y our Sy stem[...]

  • Page 27

    Inst alling the Secure Computing’ s SmartFilter Sof tware Onto Y our System This chapter describes how to install the Secure Comp uting’s SmartFilter ® software onto your system. Inst alling the Secure Computing SmartFilter Sof tware Secure Computing’s SmartFilter ® is a URL filtering software tha t enables you to build and enforce sophisti[...]

  • Page 28

    3COM Security Switch 6200 App lications Software Installation 9-2 Installing the Secure Computing’ s SmartFilter Softwar e Onto Y our System [root@xxxxx rpm]# rpm -i app-smartfi lter- x.x.x- x.x.x.x .7xCOSi686.rpm 2003/10/02 17:20:08| Creating Swap D irectories sfagent starting. SmartFilter installed and started. For further information on the Sm[...]

  • Page 29

    Inst alling the eSafe Sof tware Onto Y our System This chapter describes how to install the eSafe softwa re onto your system. Inst al ling the eSafe Security Solution Sof tware eSafe is a comprehensive gateway-based security solution that addresses all content security layers. Specifically: • Proactive anti-virus and malicious code protection eng[...]

  • Page 30

    3COM Security Switch 6200 App lications Software Installation 10-2 Installing the eSafe Software Onto Y our System For further information on the eS afe Security Solutions software configuration, refer to the eSafe documentation.[...]