skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to beginning of chapter: Securing a ClusterSecuring a Cluster
go to previous page: Managing Cluster MembershipManaging Cluster Membership
go to next page: Security in a Network EnvironmentSecurity in a Network Environment
end of book navigation links

Using DECnet BetweenCluster Nodes  



The cluster environment provides such a rich resource-sharingmodel (which includes files and volumes, disk and tape devices,and batch and print queues) that it is usually unnecessary to directlyaccess another cluster node through DECnet software. Nonetheless,there are situations where resources may not be uniformly sharedacross the cluster. This is particularly true in mixed interconnector local area cluster configurations, where you may choose to limitcluster access to a satellite's disk or tape volumes. In such cases,users need to use the DCL command SET HOST or some form of networkaccess to access a satellite's resources from other cluster members.See Proxy Access Control for moreinformation on network access through proxy logins.
go to previous page: Managing Cluster MembershipManaging Cluster Membership
go to next page: Security in a Network EnvironmentSecurity in a Network Environment