Instruction/ maintenance manual of the product 3CR13500 3Com
Go to page of 30
December 2003 Security Switc h 6200 A pplica tions Software Installa tion FIBER 10/100/1000 10/100 CONSOLE (max) 9800,8,N,1 PACKET LINK 1357 2468 91 1 1 3 1 5 10 12 14 16 FIBER PACKET LINK 17 18 P.
© Copyright © 2003, 3Com Cor poration. All right s reserved. No part of this document ation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) with out written permission f rom 3Com Corporation.
3COM Security Switch 6200 App lications Softwar e Installation Content s 1 Installing Applications on Y our system ........................ .................... 1-1 2 Installing the CheckPoint Fir eW all-1 NG FP3 and NG AI Software Onto Y our System .
00xxxxA 3COM Security Switch 6200 Applications Software Installation.
Inst alling Applications on Y our system The following sections describe how to install appli cations onto your system. For further information on the application s installation, refer to the 3COM Security Switch 6200 Hard ware and Software Users Guide .
3COM Security Switch 6200 App lications Software Installation 1-2 Installing Applicat ions on Y our system.
Inst alling the CheckPoint FireW all-1 NG FP3 and NG AI Sof tware Onto Y our System This chapter describe s how to install the Check Point FireW all-1 NG FP3 and NG AI software onto your system.
3COM Security Switch 6200 App lications Software Installation 2-2 Inst alling the CheckPoint FireWall-1 NG FP3 and NG AI Software Onto Y our System 4 To install FireWall- 1, enter the following comman ds: rpm -i CPshrd-50-03.i386.rpm rpm -i CPfw1-50-03.
Inst alling the T rend Micro VirusW all, eManager , and IMSS Sof t ware onto Y our System This chapter describes how to install the Tr end Micro VirusWall, eManager, and IMSS software onto your system.
3COM Security Switch 6200 App lications Software Installation 3-2 Installing the T rend Micro V irusW all, eManager , and IMSS Software onto Y our System • Origin, name, and destination of the file. • Date the file was received . • Identity of the virus found.
00xxxxA 3COM Security Switch 6200 App lications Softwar e Installation Installing the T rend Micro V irusW all, eManager , and IMSS Software onto Y our System cd /usr/os/apps/VirusWall/1008 b Execute the tar command on the following tar file: tar -zxvf isem_lx_37_1008.
3COM Security Switch 6200 App lications Software Installation 3-4 Installing the T rend Micro VirusW all, eManager , and IMSS Software onto Y our System You must now install the application as specified by Trend Micro. The vendor files have been co pied to /usr/os/apps/IMSS.
00xxxxA 3COM Security Switch 6200 App lications Softwar e Installation Installing the T rend Micro VirusW all, eManager , and IMSS Software onto Y our System content_filter= smtpd_timeout=$imss_timeout local_recipient_maps= myhostname=localhost.$mydomain 5 Save all changes.
3COM Security Switch 6200 App lications Software Installation 3-6 Installing the T rend Micro VirusW all, eManager , and IMSS Software onto Y our System.
Inst alling the Enterasys Dragon Intrusion Detection Sof tware Onto Y our System This chapter descri bes how to inst all the Enterasys Dragon Intrusion Detection software onto your system.
3COM Security Switch 6200 App lications Software Installation 4-2 Installing the Enterasys Dr agon Intrusion Detection Softwar e Onto Y our System 4 To install the Drago n so ftware, unzip, and untar the abov e file, using the following co mmand: tar -zxvf Dragon-6.
Inst alling the Internet Security Systems RealSecure Network Sof tware onto Y our System This chapter descri bes how to instal l the Internet Security Systems’™ RealSecure® Network softw are onto your system.
3COM Security Switch 6200 App lications Software Installation 5-2 Installing the Inte rnet Security Systems RealSecure Network Softwar e onto Y our System This directory should contai n the following rpms file: ISS-RealSecure-common-lib-7.0-2003.1 67.
Inst alling the Snort Sof tware Onto Y our System This chapter describes how to install the Snort software onto your system. Inst alling the Snort Sof tware Snort is a Network Intrusion Detectio n System (NIDS) that performs real- time traffic analysis and pa cket logging on IP networks.
3COM Security Switch 6200 App lications Software Installation 6-2 Installing the Snort Soft ware Onto Y our System.
Inst alling the WebSense Enterprise Sof tware Onto Y our System This chapter describes how to install the Websense ® Enterprise software onto your system.
3COM Security Switch 6200 App lications Software Installation 7-2 Installing the W ebSense En terprise Software Onto Y our System 3 Change to the following di rectory: cd 5_0_1 4 Step through the Websense configur ation, using the following command: .
Inst alling the Squid Sof tware Onto Y our System This chapter descri bes how to install the Squid software onto your system. Inst alling the Squid Web Proxy Cache Sof tware The Squid software is a high-perform ance proxy caching server for web clients, supporting FTP, gopher, and H TTP data objects.
3COM Security Switch 6200 App lications Software Installation 8-2 Installing the Squid Soft ware Onto Y our Sy stem Inst alling the Squid Sof tware To install the Squid software on to your system, comple te the followin g: 1 Log into your system as root.
00xxxxA 3COM Security Switch 6200 App lications Softwar e Installation 8-3 Installing the Squid Sof tware Onto Y our System Editing the Squid Configuration File After you have installed the Squi d so ftware you need to define several features within the Squid configurat ion file.
3COM Security Switch 6200 App lications Software Installation 8-4 Installing the Squid Soft ware Onto Y our Sy stem.
Inst alling the Secure Computing’ s SmartFilter Sof tware Onto Y our System This chapter describes how to install the Secure Comp uting’s SmartFilter ® software onto your system.
3COM Security Switch 6200 App lications Software Installation 9-2 Installing the Secure Computing’ s SmartFilter Softwar e Onto Y our System [root@xxxxx rpm]# rpm -i app-smartfi lter- x.x.x- x.x.x.x .7xCOSi686.rpm 2003/10/02 17:20:08| Creating Swap D irectories sfagent starting.
Inst alling the eSafe Sof tware Onto Y our System This chapter describes how to install the eSafe softwa re onto your system. Inst al ling the eSafe Security Solution Sof tware eSafe is a comprehensive gateway-based security solution that addresses all content security layers.
3COM Security Switch 6200 App lications Software Installation 10-2 Installing the eSafe Software Onto Y our System For further information on the eS afe Security Solutions software configuration, refer to the eSafe documentation.
An important point after buying a device 3Com 3CR13500 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought 3Com 3CR13500 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data 3Com 3CR13500 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, 3Com 3CR13500 you will learn all the available features of the product, as well as information on its operation. The information that you get 3Com 3CR13500 will certainly help you make a decision on the purchase.
If you already are a holder of 3Com 3CR13500, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime 3Com 3CR13500.
However, one of the most important roles played by the user manual is to help in solving problems with 3Com 3CR13500. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device 3Com 3CR13500 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center