Nortel Contivity Secure IP Services Gateway 4600 manual
- Read online or download the manual
- 16 pages
- 0.31 mb
Go to page of
Similar user manuals
-
Network Card
Nortel Nortel Secure Network Access Switch 4050
922 pages 11.05 mb -
Network Card
Nortel AN/DC
150 pages 1.54 mb -
Network Card
Nortel R2MFC
114 pages 2 mb -
Network Card
Nortel Nortel CallPilot 1002rp
86 pages 1.21 mb -
Network Card
Nortel Application Server 53r 5300
124 pages 1.1 mb -
Network Card
Nortel AA1419005
14 pages 0.21 mb -
Network Card
Nortel 3300
34 pages 0.63 mb -
Network Card
Nortel 5100
160 pages 9.8 mb
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Nortel Contivity Secure IP Services Gateway 4600, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Nortel Contivity Secure IP Services Gateway 4600 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Nortel Contivity Secure IP Services Gateway 4600. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Nortel Contivity Secure IP Services Gateway 4600 should contain:
- informations concerning technical data of Nortel Contivity Secure IP Services Gateway 4600
- name of the manufacturer and a year of construction of the Nortel Contivity Secure IP Services Gateway 4600 item
- rules of operation, control and maintenance of the Nortel Contivity Secure IP Services Gateway 4600 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Nortel Contivity Secure IP Services Gateway 4600 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Nortel Contivity Secure IP Services Gateway 4600, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Nortel service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Nortel Contivity Secure IP Services Gateway 4600.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Nortel Contivity Secure IP Services Gateway 4600 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
©Copyright2001Nortel Networks. Thisdocumentmaybefree ly reproducedandd istributedwholeandint actin cludingthi sCopyrightNotice. Contivity™ExtranetSw itch4600 FIPS140-1Non-Proprietary CryptographicMo duleSecurityPolicy [...]
-
Page 2
2 TableofContents 1 Introduction .............................................................................................................. 3 1.1 Purpose ................................................................................................................. 3 1.2 Reference s ..................[...]
-
Page 3
3 1 Introductio n 1.1 Purpose Thisisanon-proprietary cry ptographicmodulesecurity policy fortheContivity™ ExtranetSwitch4600.Thissecurity policydesc ribeshowtheContivity ™Ex tranet Switch4600meetsthesecurity requirementsofFI PS14[...]
-
Page 4
4 proprietary security policy,the FI PS 140-1certificationsubmissiondocumentationis Nortel-proprietar y andisreleasableonly underappropriatenon-disclosureag reements. PleasecontactNortelNe tworksforacc esstothesedocuments.[...]
-
Page 5
5 2 TheContivity Extranet460 0Swi tch TheNortelNetworksContivity ExtranetSwitch4600(referredtoasthemodule,or Switchinthisdocument)providesascalable,sec ure,manag eableremoteaccessserve r thatmeetsFI PS 140-1level2requireme nts?[...]
-
Page 6
6 Figure2– PhysicalInterf aces Thephy sicalinterfacesincludeapowe rplug,power andresetswitches,a serialport,a L ANPortRJ-45connectoranduptotwoadditionalnetworkconnec tors.EachRJ-45 connectorisacc ompaniedby lightemi[...]
-
Page 7
7 2.3 PhysicalSecurity Athicksteelcaseprote ctstheContivity ™ExtranetSwitch4600.TheswitchmeetsFCC requirementsin47CFRPart15forper sonalcomputersandperiphe ralsdesignatedf or homeuse(ClassB).Thec asehastworemova bleportions:[...]
-
Page 8
8 Figure4– Frontv ieww ithoutfro ntbezel OncetheExtranetSwitchhasbeenc onfiguredinitsFI PS140-1level2mode,thecover may notberemovedwithoutsignsoftampering.Tose althecover,apply threeserialized tamper-evidentlabels[...]
-
Page 9
9 Figure5– Tamper-EvidentLabelsAppliedtoSwitch Thetamper-evide ntsealsareproduce dfromaspecialthing augew hiteviny lwiths elf- adhesivebacking .Anyattempttoopentheswitchwilldamag eordestroy t hetamper- evidentsealsorthe?[...]
-
Page 10
10 2.4 RolesandServices Theswitchsupportsupto5000simultaneoususersessionsusingI nternetProtocol Security (IPSec),Point-to-PointTunnelingProtocol(PPTP),L aye rTwoTunneling Protocol(L 2TP),andL ayer TwoForwar ding(L 2F).Ina ddi tion,ana[...]
-
Page 11
11 • IPSecProtocolTunnels • PPTPProtocolTunnels • L2TPProtocolTunnels • L2FProtocolTunnels • ChangePassword 2.4.1 CryptoOfficerSer vices Thereisafac tory defaultloginI Dandpassword,whichallowsaccesstotheCry pto Officerrole .?[...]
-
Page 12
12 direction.Theadministratormay useany ofthepre-definedRulesorcr eate customRulestobeincludedineachFilter. • StatusFunctions :toviewtheswitchconfigura t ion,routingtables,active sessions,useGetstoviewSimpleNetworkManag ement?[...]
-
Page 13
13 AuthenticationProtocol(PAP).MS-CHAPcanusenoencry ption,40- bitRC4,128-bitRC4encry ption.WhenoperatedinaFI PS140-1 compliantmanner,MS-CHAPisnotenabledwithRC4encry ption. • L 2TP:RequiresauthenticationusingMS-CHAPCHAP,orPAP.?[...]
-
Page 14
14 containedonthefloppy diskviathemodule’smanagementinter face.The formatutility t hencausesthefir mwareofthemoduletobee rased • RSAkey s:TheseRSApublic/privatekey -pairsareuse dforge neratinga nd verify ingdigitalsignature s?[...]
-
Page 15
15 3 SecureOperationo ftheContivitySw itch TheContivity Switchisaversatilemachine;itcanbe runinaNormalOper atingModeor aFI PSOperatingMode(FI PSm ode).I nFIPSmode,theswitchmeetsalltheL evel2 requirementsforF I[...]
-
Page 16
16 hasthecapability tosubmitshellcommands)thentheCry ptoOfficershouldre installthe Nortelfirmwaref romatrustedmediasuchastheinstallationCDortheN ortelwebsite.[...]