13.07.2015 Views

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 11: Security AdministrationSecurity LayersNetwork security also has sublayers of security. The goal of this security type is to controlthe following types of access to the network: External LogonThis type controls on-site and remote access and where on the network users can goonce they gain access.If intruders access your network, they could have an electronic link to your computers.Use network security specialists to properly configure the various access points into yournetwork and, once users are on the network, control their movements.Some of these points of control are: Outside access Dial-in access Internet access Other remote access methods, such as VPN Network login accessThis access method is the actual logon to the network (for example, the NT domain). Access to portions of the network. NT domains We recommend that you have: A dedicated SAP domain where only the administrators are allowed to directly logonto. Other domains where users will log onto, trust the SAP domain, but the SAP domaindoes not trust other domains. Router tablesThis table can be used to control (by IP address) which users can access the SAPservers.11–8Release 4.6A/B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!