
Security Concepts
2-10
2.9 Security
Several methods can be used to control access to the Server and restrict user behavior once logged in. For
example:
◆ Incoming logins can be selectively disabled and/or password protected via the Set/Define Server
Incoming command.
◆ The IP security table can be used to restrict logins to the Server.
◆ Ports used for network logins can be “preconfigured” with a standard set of characteristics for each
login.
For more information about security measures and restriction options, including some Server features that
are used for more than security reasons, see the Server Configuration and Ports chapters.
2.9.1 Event Reporting/Logging
The Server can be configured to report various errors and events either to the serial console port or to a
network host via TCP/IP (using the syslogd facility), LAT, or NetWare. Events that can be logged include
user logins, modem events, printer state changes, system boots, system resets, and a full record of
commands issued on the Server. See Set/Define Logging on page 12-13 for more information.
Commenti su questo manuale