Port Security - HP -UX B6941-90001 Administrator's Reference Manual

Management server on hp-ux
Table of Contents

Advertisement

example, if the ITO management server 'garlic.spices.com' and the
managed node 'basil.herbs.com' are configured to run with
authenticated RPCs the following principals will be created:
opc/opc-mgr/garlic.spices.com
opc/opc-agt/basil.herbs.com
In DCE, a name or principal (garlic.spices.com) belongs to a group
(opc-mgr), which in turn belongs to an organization (opc). The only
exception to this rule in ITO is the principal opc-agt-adm:
opc-agt-adm is a member of the group and organization none, which is
a special principal that is primarily used in the administration of
accounts and passwords.
In addition, ITO allows you to select and configure the security level your
particular environment requires for an individual managed node: the
value is stored in the given managed node's nodeinfo file and on the
management server in the relevant entry in the database. In this way,
security on a given managed node may be changed to handle, for
example, the addition of sensitive connections.
ITO may be configured in such a way as to be able to overcome a
situation where, owing to the temporary unavailability or poor
configuration of the security service, a process is required to run in
unauthenticated mode or fail. For example, if a management server
process such as the request sender receives an authentication failure
when calling a control agent on a managed node, an error message is
generated, which appears in the Message Browser window. The
administrator is then able to take immediate corrective action, for
example, by temporarily changing the security level on the managed
node in question to allow the retransmitted request to succeed. However,
care should be taken in situations such as this, since an error in the
connection could in certain circumstances indicate that the system is
under "attack".

Port Security

One simple but effective way of limiting access to a network and
consequently improving the network's inherent security is to restrict to a
specific range of ports all connections between processes. This applies to
all network traffic and not just RPCs. In the context of ITO, you can do
this on two distinct levels:
Chapter 10
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
443

Advertisement

Table of Contents
loading

This manual is also suitable for:

Openview it

Table of Contents