22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

418 Lotus Security Handbook<br />

► Unauthorized users should not have the ability to use the server console.<br />

► Domino administrators should only access the Domino servers via the<br />

Administration Tools provided by Lotus (that is, the Domino Administration 6<br />

Client or, for administrators using a Web browser, the Web Administrator 6<br />

tool using the WebAdmin.nsf database).<br />

► Users should not be allowed access to the programs or data on the server via<br />

any means other than using the Notes client or a Web browser (that is, no<br />

Telnet, FTP, or file sharing access).<br />

10.3 Logical security<br />

Logical security is concerned with restricting access to the networking and Notes<br />

data components, as illustrated in Figure 10-4.<br />

Figure 10-4 Logical security<br />

We discuss network security and Notes security separately because each has<br />

specific elements that must be understood and applied for security to be effective<br />

within the new architecture.<br />

10.3.1 Network security<br />

Network security applies to the technologies and equipment that permit the<br />

communication of data between devices. This can be communications between<br />

servers; it can be also between clients and servers. In regard to the client/server<br />

communications, it can be from a Notes client to a Domino server or a Web<br />

browser to a Domino server. While networks have the ability to provide<br />

peer-to-peer services (that is, server-to-server and client-to-client), in the Notes

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!