00-2 Contents PDF
00-2 Contents PDF
Contents
2 Security Management................................................................................................................2-1
2.1 Security Management Strategy.......................................................................................................................2-3
2.2 Managing Solaris Security..............................................................................................................................2-3
2.2.1 Introduction to Solaris Users..................................................................................................................2-4
2.2.2 Changing the Password of User root......................................................................................................2-4
2.2.3 Changing the Password of User sybase..................................................................................................2-5
2.2.4 Changing the Password of User t2000...................................................................................................2-5
2.2.5 Removing Redundant Hosts Configuration Files...................................................................................2-6
2.2.6 Inhibitting User sybase from Using FTP................................................................................................2-6
2.3 Managing Application Security......................................................................................................................2-6
2.3.1 Introduction to Database Users..............................................................................................................2-7
2.3.2 Changing the Password of Database Users............................................................................................2-7
2.4 Setting Security Policy for an NM User..........................................................................................................2-8
2.4.1 Setting the Password Template..............................................................................................................2-9
2.4.2 Setting the Password Reuse Frequency................................................................................................2-10
2.4.3 Setting the Password Reuse Period......................................................................................................2-11
2.4.4 Configuring the Warning Screen for Login.........................................................................................2-11
2.4.5 Configuring the Weakness Password Dictionary.................................................................................2-12
2.4.6 Modifying NM User Validity...............................................................................................................2-12
2.4.7 Modifying NM User Password Validity..............................................................................................2-14
2.4.8 Setting User Lockout Duration............................................................................................................2-15
2.4.9 Unlocking an NM User........................................................................................................................2-16
9 Handling Faults..........................................................................................................................9-1
9.1 General Thoughts About Troubleshooting......................................................................................................9-2
9.2 Process of Troubleshooting.............................................................................................................................9-2
9.2.1 Collecting Data.......................................................................................................................................9-2
9.2.2 Locating Faults.......................................................................................................................................9-3
9.2.3 Handling Faults......................................................................................................................................9-3
10 FAQ...........................................................................................................................................10-1
10.1 About the Operating System ......................................................................................................................10-2
10.1.1 How to Set the Default Router...........................................................................................................10-2
10.1.2 How to Add a Static Route.................................................................................................................10-2
10.1.3 How to View the Hardware Configuration of the T2000 Server.......................................................10-3
10.1.4 How to View the Solaris Version.......................................................................................................10-4
10.1.5 How to Handle Abnormal Shutdown of the Workstation..................................................................10-4
10.2 About the Database.....................................................................................................................................10-5
10.2.1 How to Confirm the Sybase Process Is Started..................................................................................10-5
10.2.2 How to Start the Database Server Manually......................................................................................10-6
10.3 About the T2000..........................................................................................................................................10-6
10.3.1 What are the Factors Affecting Response Speed of T2000................................................................10-6
10.3.2 How to Confirm the T2000 Server Is Started on UNIX....................................................................10-6
10.3.3 How to Handle the Failure of Connection Between the T2000 Server and an NE............................10-7
Figures
Tables