skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to beginning of chapter: Securing a Cluster Securing a Cluster
go to previous page: Managing Cluster Membership Managing Cluster Membership
go to next page: Security in a Network EnvironmentSecurity in a Network Environment
end of book navigation links

Using DECnet Between Cluster Nodes  



The cluster environment provides such a rich resource-sharing model (which includes files and volumes, disk and tape devices, and batch and print queues) that it is usually unnecessary to directly access another cluster node through DECnet software. Nonetheless, there are situations where resources may not be uniformly shared across the cluster. This is particularly true in mixed interconnect or local area cluster configurations, where you may choose to limit cluster access to a satellite's disk or tape volumes. In such cases, users need to use the DCL command SET HOST or some form of network access to access a satellite's resources from other cluster members. See Proxy Access Control for more information on network access through proxy logins.
go to previous page: Managing Cluster Membership Managing Cluster Membership
go to next page: Security in a Network EnvironmentSecurity in a Network Environment