Adaptec 2940U - AHA Storage Controller Ultra SCSI 20 MBps Información técnica Pagina 116

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 186
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 115
102 MetaFrame Solutions Guide
Third-Party Security Products
This section contains detailed installation and integration information for the
following third-party security devices:
K
Security Dynamics ACE/Server Software
K
VTCP/SECURE Software
These security devices control remote access to the MetaFrame server through
proprietary access control software. The remote user dials in or connects over the
network to obtain access to the MetaFrame server by successfully completing an
authentication dialog with the security device. Once the user is authenticated, the
security device is transparent to the user.
Several general configuration issues are encountered when using third-party
security devices:
K
For the MetaFrame server to properly detect when a connection is made or
broken, the security device must supply modem signals that can be used by the
MetaFrame server to detect when a connection is made or terminated. This
varies depending on the security device.
K
If needed, configure the client PC and the client software to operate properly
with the security device. Some security systems require software or hardware
on the client PC.
K
The MetaFrame server and the security device itself must be secured from
unauthorized tampering. It is recommended that you place all hardware in a
secured room to prevent unauthorized personnel from acquiring access to the
equipment.
K
Most third-party security devices secure remote Dial-In users (or local, directly
connected asynchronous users) only. You need to consider how to secure your
system from improper access by LAN- or WAN-connected users.
The third-party security devices discussed in this section control remote access to
the MetaFrame server through proprietary access control software. Details about
access control hardware are available through the individual hardware
manufacturers. The software access control devices most often used are based on
one of two premisses.
The first method is based on secondary user authentication. In addition to the
Primary Windows Authentication, the access control software adds another layer
of authentication based on separate user databases. This software control method
decreases the likelihood of compromised passwords.
The next method of software access control is based on encrypting data
transmissions. In this case, the access control software provides a layer of
authentication and then encypts all data packets between the client and server.
Vista de pagina 115
1 2 ... 111 112 113 114 115 116 117 118 119 120 121 ... 185 186

Comentarios a estos manuales

Sin comentarios