Chapter 10
435
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
ITO Security
The steps that an administrator needs to carry out to improve system
security involve much more than configuring software: in general terms,
the administrator needs to look at system security first and then
investigate problems that relate to network security. Finally, the
administrator needs to investigate the security implications and
possibilities that are addressed during the configuration of ITO itself.
This section covers the areas mentioned in this paragraph, namely:
❏
System Security
❏
Network Security
❏
Port Security
❏
ITO Security
System security covers the problems that need to be addressed to allow
the ITO management server and managed node to run on a “trusted”
system. Network security involves the protection of data that is
exchanged between the management server and the managed node and
is primarily DCE related. ITO security looks at the security- related
aspects of application setup and execution, operator-initiated actions,
and so on.
System Security
The following sections describe the areas that the administrator needs to
address in order to install and run ITO on an HP-UX system that is C2
compliant. For information on how to make a system C2 compliant, see
the relevant, product-specific documentation. Note that it is essential
that the underlying operating system be rendered secure first.
The section on system security covers the following areas:
❏
General Security Guidelines in ITO
❏
Restrictions
Содержание -UX B6941-90001
Страница 6: ...6 ...
Страница 8: ...8 ...
Страница 27: ...27 1 Prerequisites for Installing ITO Agent Software ...
Страница 43: ...43 2 Installing ITO Agents on the Managed Nodes ...
Страница 115: ...115 3 File Tree Layouts on the Managed Node Platforms ...
Страница 162: ...162 Chapter3 File Tree Layouts on the Managed Node Platforms File Tree Layout on Windows NT Managed Nodes ...
Страница 163: ...163 4 Software Maintenance on Managed Nodes ...
Страница 183: ...183 5 Configuring ITO ...
Страница 298: ...298 Chapter5 Configuring ITO Variables ...
Страница 299: ...299 6 Installing Updating the ITO Configuration on the Managed Nodes ...
Страница 315: ...315 7 Integrating Applications into ITO ...
Страница 333: ...333 8 ITO Language Support ...
Страница 352: ...352 Chapter8 ITO Language Support Flexible Management in a Japanese Environment ...
Страница 353: ...353 9 An Overview of ITO Processes ...
Страница 372: ...372 Chapter9 An Overview of ITO Processes Secure Networking ...
Страница 373: ...373 10 Tuning Troubleshooting Security and Maintenance ...
Страница 481: ...481 A ITO Managed Node APIs and Libraries ...
Страница 499: ...499 B Administration of MC ServiceGuard ...
Страница 512: ...512 AppendixB Administration of MC ServiceGuard Troubleshooting ITO in a ServiceGuard Environment ...
Страница 513: ...513 C ITO Tables and Tablespaces in the Database ...
Страница 520: ...520 AppendixC ITO Tables and Tablespaces in the Database ITO Tables and Tablespace ...
Страница 521: ...521 D ITO Man Pages Listing ...