| AMASS Overview |
Remote File Copy | RCP allows the user to do file transfers to and from the AMASS |
(RCP) | without manually logging onto the remote system. The login |
| function is performed automatically by the RCP utility. In |
| addition, RCP can do recursive copies, which can copy an entire |
| directory structure to or from the target. For the login function |
| to work, the user’s user name must exist on the target system; |
| therefore, coordination of user names must be enforced |
| across the network servers. |
Telnet | Available Telnet functions depend on the processes started by a |
| user’s login name and password. Using Telnet in conjunction |
| with a shell login process allows users to access utilities, such |
| as find and chmod, which perform functions not available |
| with FTP. |
Security | Local: In local access mode, system security is primarily a |
| function of setting the directory permissions in the AMASS file |
| system. Because these permissions follow standard UNIX file |
| system conventions, the specific settings are not documented |
| here. |
| Network: For systems running in a network environment, |
| AMASS security, as with other UNIX file systems, is primarily |
| a function of the network systems or protocols used. |
| Use permissions appropriate for your users’ environment. |
|
|
| Caution |
|
|
| With system administration tools, a user can bypass system |
| security and modify AMASS configuration parameters that may |
| deteriorate system performance. Therefore, ADIC suggests you |
| restrict access to the scripts, utilities, and commands. |
|
|
Accessing the Storage Network |