
A-325
Chapter 15 Using RA 6300 Security
Remote Annex 6300 Supplement to the Remote Annex Administrator’s Guide for UNIX
Book A
•
Bytes in.
•
Bytes out.
•
Protocol-dependent information.
•
Username.
For the RA 6300, the following additional fields are added:
•
Calling number.
•
Called number.
•
Called subaddress.
•
Bearer.
All fields are separated by colons and are encoded for use by UNIX
utilities that sort, merge, select, or filter streams. Host-based Security
Logging on page B-33 provides a sample log file.
The parser of the acp_userinfo file generates log messages if an error is
detected when processing a user’s profile.
Modifying the Supplied Security Application
You can modify the supplied security policy to create a security scheme
that meets the needs of your network. Some simple modifications involve
changing system definitions in the file
/annex_root/src/erpcd/acp_policy.h. More elaborate security policies
may require modifying or replacing functions in the file
/annex_root/src/erpcd/acp_policy.c.
Do not change the function declarations or the description of the
interface; these are fixed by the calls made into this library. Before
making even the smallest change, save the base version of the file
requiring modification.
If you modify the default policy, you must re-compile erpcd, kill the
current version, and start the new version (see
Modifying the Code
on
page 15-335).
Summary of Contents for 6300
Page 4: ...Remote Annex 6300 Supplement to the Remote Annex Administrator s Guide for UNIX iv ...
Page 20: ...Remote Annex 6300 Supplement to the Remote Annex Administrator s Guide for UNIX Figures xx ...
Page 24: ...Remote Annex 6300 Supplement to the Remote Annex Administrator s Guide for UNIX Tables xxiv ...