![Bay Networks Remote Annex Скачать руководство пользователя страница 58](http://html1.mh-extra.com/html/bay-networks/remote-annex/remote-annex_user-manual_2712557058.webp)
Remote Annex Server Tools for Windows NT
®
User Guide
Chapter 4 Using Security Features
4-4
Setting Remote Annex Security Parameters
The Access Control Protocol (ACP) of the Remote Annex provides
server-based security. When you define one network server as a security
server, use ACP software default settings or modify the software to create
a customized security policy for your network. This section includes:
•
Security Requirements
•
Types of Security
Security Requirements
Before you can use server-based security, you must use the na utility to:
•
Set the enable_security parameter to
Y
.
•
Define one server as the primary security server by entering its
address in the pref_secure1_host parameter. Define a backup
security server in the pref_secure2_host parameter.
•
If a Remote Annex queries the primary server and does not
receive a response within the time defined in the
network_turnaround parameter, the Remote Annex queries
the backup server.
•
If the backup server does not respond within the time specified,
the Remote Annex broadcasts to the network for another server
running erpcd (as long as the security__broadcast parameter is
set to
Y)
.
For instructions on using the na utility and detailed explanations for
each parameter, see Document References on page 1-6
.
Содержание Remote Annex
Страница 1: ...Part No 166 025 305 Rev A January 1997 User Guide Remote Annex Server Tools for Windows NT ...
Страница 4: ...Remote Annex Server Tools for Windows NT User Guide Revision Level History iv ...
Страница 10: ...Remote Annex Server Tools for Windows NT User Guide Preface x ...
Страница 34: ...Remote Annex Server Tools for Windows NT User Guide Chapter 2 Selecting Server Tools Options 2 18 ...
Страница 54: ...Remote Annex Server Tools for Windows NT User Guide Chapter 3 Understanding Erpcd 3 20 ...
Страница 78: ...Remote Annex Server Tools for Windows NT User Guide Chapter 4 Using Security Features 4 24 ...