
A15-44
893-741-B
Using Model 5390 Security
If the number does not match a dial-back entry, but other numbers are defined for jeremiah,
the Model 5390 server denies him access.
If no charge-back or dial-back numbers are defined for jeremiah, the Model 5390 server
connects him immediately.
•
The user need not be concerned about which ports the Model 5390 server uses for dial-in or
charge-back.
When security is running, which is the case as soon as the erpcd daemon is started on the Unix host,
erpcd makes an internal copy of acp_userinfo. If you change acp_userinfo while security is
running, your changes do not take effect. To activate a new acp_userinfo, send a USR1 signal to
erpcd to force it to update its copy of acp_userinfo using the UNIX command kill:
kill -USR1 pid
For more information, see Recompiling erpcd starting on page A15-84.
Security Logging
ACP host-based security generates audit trails of IPX user activity if you do the following:
1
Make sure the Model 5390 enable_security parameter is set
to Y.
2
Install ACP security software on one or more hosts (see
Setting Up a Security Server
on page A15-10).
3
Designate one of the hosts running ACP as a security host, and, if you wish, designate
another as a back-up security host.
4
Set the pref_secure1_host and pref_secure2_host parameters to specify the preferred
security hosts. Use the set annex command to set these parameters, e.g., set annex
pref_secure1_host 0.0.0.0.
The Model 5390 server first queries the pref_secure1_host for user validation or permission
connection requests. If a response is not received within the time in seconds defined in the
network_turnaround parameter, the Model 5390 server repeats the query several times. If
the Model 5390 server still does not receive a response, it queries the host defined in the
pref_secure2_host parameter. If a response is not received from the second security host
NOTE:
If you include both dial-back numbers and charge-back in the
same accesscode entry, charge-back takes precedence.
Summary of Contents for 5390
Page 28: ...893 741 B Figures xxviii ...
Page 44: ...893 741 B Preface xliv ...
Page 45: ......
Page 48: ......
Page 60: ...A1 12 893 741 B Introduction to the Model 5390 Server ...
Page 106: ...A3 18 893 741 B Configuring Ports ...
Page 142: ...A5 12 893 741 B Printers ...
Page 152: ...A6 10 893 741 B Modems ...
Page 168: ...A7 16 893 741 B Serial Line Internet Protocol SLIP ...
Page 224: ...A9 38 893 741 B Internetwork Packet Exchange IPX Protocol ...
Page 258: ...A11 12 893 741 B Dial up Networking ...
Page 289: ...893 741 B A12 31 Internet Protocol IP Routing that are possible ...
Page 506: ...A15 86 893 741 B Using Model 5390 Security ...
Page 507: ......
Page 544: ...B1 36 893 741 B Network Administration ...
Page 574: ...B2 30 893 741 B Simple Network Management Protocol SNMP ...
Page 575: ......
Page 606: ...C1 30 893 741 B na Commands ...
Page 676: ...C2 70 893 741 B Configuration Parameters ...
Page 772: ...C3 96 893 741 B Using the CLI Commands ...
Page 794: ...C5 12 893 741 B Network Protocols ...
Page 795: ......
Page 796: ... Appendix D1 Software Reference Part D Appendixes ...