skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to previous page: Using DECnet Between Cluster Nodes Using DECnet Between Cluster Nodes
go to next page: Managing Network SecurityManaging Network Security
end of book navigation links

12Security in a Network Environment  



Security in a network environment is even more sensitive than security in a single-system environment. Security is also harder to achieve because of operational complexities and the decentralization of control that commonly exist in networks. The larger the network, the more difficult the problem of establishing control and communication between security administrators of the numerous nodes.

There are limitations to the degree of security any networking site can expect to achieve due to limitations currently present in networking technology. Being sensitive to potential problems can help you avoid operations that could increase the security exposure in your network. This chapter helps you recognize these problem areas and adjust your operations accordingly.

See the HP OpenVMS System Manager's Manual for information on the networking software options for OpenVMS systems, including the following:

skip links to sections within this chapter.
Managing Network Security
Hierarchy of Access Controls
Proxy Access Control
Using DECnet Application (Object) Accounts
Specifying Routing Initialization Passwords
Sharing Files in a Network
end of content navigation links


go to previous page: Using DECnet Between Cluster Nodes Using DECnet Between Cluster Nodes
go to next page: Managing Network SecurityManaging Network Security