TABLE OF CONTENTS
CHAPTER 1 - SETTING UP USERS..................................................................................... 1.1
S
ETTING THE
U
SER
L
OGGING
L
EVELS
......................................................................................... 1.2
S
AFE
N
ET
A
DMINISTRATOR
.......................................................................................................... 1.3
S
UPER
T
RUSTED
U
SER
C
ONTROL
................................................................................................ 1.4
E
NTERING
U
SER
S
ECURITY
L
EVELS
............................................................................................. 1.5
E
NTERING
U
SER
A
UTHORITIES TO
O
BJECTS
................................................................................ 1.7
E
NTERING
U
SER
A
UTHORITIES TO
SQL S
TATEMENTS
................................................................ 1.12
E
NTERING
U
SER
A
UTHORITIES TO
FTP S
TATEMENTS
................................................................ 1.14
E
NTERING
L
ONG
P
ATH
N
AMES
................................................................................................. 1.19
C
OPYING AN
E
XISTING
U
SER TO
S
ET
U
P A
N
EW
U
SER IN
S
AFE
N
ET
/400...................................... 1.21
C
OPYING AN
E
XISTING
U
SER TO
S
ET
U
P A
N
EW
U
SER IN
S
AFE
N
ET
/400...................................... 1.21
R
EMOVING A
U
SER FROM
S
AFE
N
ET
/400 ................................................................................... 1.21
M
AINTAIN ALL
S
ECURITY FOR A
U
SER
........................................................................................ 1.22
S
ETTING UP
T
IME OF
D
AY
C
ONTROLS
....................................................................................... 1.23
CHAPTER 2 - SETTING UP SERVERS ................................................................................ 2.1
R
ECOMMENDED
S
ERVER
S
ETTINGS
............................................................................................. 2.6
E
NTERING
S
ERVER
F
UNCTION
S
ECURITY
L
EVELS
......................................................................... 2.9
C
USTOMER
E
XIT
P
ROGRAMS
..................................................................................................... 2.11
CHAPTER 3 - TELNET, TCP/IP ADDRESS CONTROLS ................................................. 3.1
S
ETTING UP
TELNET................................................................................................................. 3.1
S
ETTING UP
TCP/IP A
DDRESS
C
ONTROLS
.................................................................................. 3.6
CHAPTER 4 - SETTING UP FTP ........................................................................................ 4.1
S
ETTING UP FOR
ANONYMOUS FTP........................................................................................ 4.5
S
ETTING UP FOR
N
ORMAL
U
SER
ID
S AND
FTP S
ERVERS
.............................................................. 4.7
CHAPTER 5 - DHCP CONTROLS AND REPORTING ...................................................... 5.1
C
URRENT
DHCP A
CTIVITY
........................................................................................................ 5.3
M
AINTAINING
MAC A
DDRESSES
................................................................................................. 5.5
F
IXED
IP A
DDRESSES
................................................................................................................. 5.6
P
URGING
E
XPIRED
DHCP L
EASE
I
NFORMATION
........................................................................ 5.7
P
ING
C
HECKER
.......................................................................................................................... 5.8
CHAPTER 6 - REPORTS......................................................................................................... 6.1
S
ETUP
R
EPORTS
......................................................................................................................... 6.2
U
SAGE
R
EPORTS
........................................................................................................................ 6.3