TABLE OF CONTENTS

CHAPTER 1 - SETTING UP USERS

1.1

SETTING THE USER LOGGING LEVELS

1.2

SAFENET ADMINISTRATOR

1.3

SUPER TRUSTED USER CONTROL

1.4

ENTERING USER SECURITY LEVELS

1.5

ENTERING USER AUTHORITIES TO OBJECTS

1.7

ENTERING USER AUTHORITIES TO SQL STATEMENTS

1.12

ENTERING USER AUTHORITIES TO FTP STATEMENTS

1.14

ENTERING LONG PATH NAMES

1.19

COPYING AN EXISTING USER TO SET UP A NEW USER IN SAFENET/400

1.21

COPYING AN EXISTING USER TO SET UP A NEW USER IN SAFENET/400

1.21

REMOVING A USER FROM SAFENET/400

1.21

MAINTAIN ALL SECURITY FOR A USER

1.22

SETTING UP TIME OF DAY CONTROLS

1.23

CHAPTER 2 - SETTING UP SERVERS

2.1

RECOMMENDED SERVER SETTINGS

2.6

ENTERING SERVER FUNCTION SECURITY LEVELS

2.9

CUSTOMER EXIT PROGRAMS

2.11

CHAPTER 3 - TELNET, TCP/IP ADDRESS CONTROLS

3.1

SETTING UP TELNET

3.1

SETTING UP TCP/IP ADDRESS CONTROLS

3.6

CHAPTER 4 - SETTING UP FTP

4.1

SETTING UP FOR ANONYMOUS FTP

4.5

SETTING UP FOR NORMAL USER IDS AND FTP SERVERS

4.7

CHAPTER 5 - DHCP CONTROLS AND REPORTING

5.1

CURRENT DHCP ACTIVITY

5.3

MAINTAINING MAC ADDRESSES

5.5

FIXED IP ADDRESSES

5.6

PURGING EXPIRED DHCP LEASE INFORMATION

5.7

PING CHECKER

5.8

CHAPTER 6 - REPORTS

6.1

SETUP REPORTS

6.2

USAGE REPORTS

6.3

Page 3
Image 3
IBM Safenet/400 manual Table of Contents