skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to previous page: Using DECnet Between Cluster NodesUsing DECnet Between Cluster Nodes
go to next page: Managing Network SecurityManaging Network Security
end of book navigation links

12Security in a NetworkEnvironment  



Security in a network environment is even more sensitive thansecurity in a single-system environment. Security is also harderto achieve because of operational complexities and the decentralizationof control that commonly exist in networks. The larger the network,the more difficult the problem of establishing control and communicationbetween security administrators of the numerous nodes.

There are limitationsto the degree of security any networking site can expect to achievedue to limitations currently present in networking technology. Beingsensitive to potential problems can help you avoid operations thatcould increase the security exposure in your network. This chapterhelps you recognize these problem areas and adjust your operationsaccordingly.

See the HP OpenVMS System Manager's Manual forinformation on the networking software options for OpenVMS systems,including the following:

skip links to sections within this chapter.
Managing Network Security
Hierarchy of Access Controls
Proxy Access Control
Using DECnet Application (Object) Accounts
Specifying Routing Initialization Passwords
Sharing Files in a Network
end of content navigation links


go to previous page: Using DECnet Between Cluster NodesUsing DECnet Between Cluster Nodes
go to next page: Managing Network SecurityManaging Network Security