Справочник Пользователя для IBM Safenet/400

Скачать
Страница из 172
 
 
 
 
CHAPTER 7 - TESTING YOUR SECURITY SETTINGS .................................................. 7.1 
T
ESTING 
S
AFE
N
ET
/400 
SETTINGS BASED ON YOUR HISTORICAL DATA WITH THE ON
-
LINE 
TRANSACTION TESTER
................................................................................................................. 7.2 
B
ATCH 
T
RANSACTION 
T
EST 
R
EVIEW
/R
EPORT 
– S
ECURITY 
R
EPORT BY 
U
SER
................................. 7.6 
R
ECOMMENDED APPROACH TO TESTING
...................................................................................... 7.9 
PCREVIEW ............................................................................................................................ 7.10 
 
CHAPTER 8 - BACKUPS AND PURGES.............................................................................. 8.1 
L
OG FILE 
P
URGE
........................................................................................................................ 8.1 
A
UTOMATING THE LOG FILE PURGE
............................................................................................ 8.4 
A
UTOMATING THE 
O
NE 
S
TEP 
S
ECURITY 
R
EPORT
......................................................................... 8.4 
A
UTOMATING AND 
R
UNNING THE 
S
ECURITY 
R
EPORT AND THE 
L
OG 
F
ILE 
P
URGE 
T
OGETHER
......... 8.5 
D
AILY 
B
ACKUP 
P
ROCEDURE
....................................................................................................... 8.7 
 
CHAPTER 9 - DE-ACTIVATING AND REMOVING SAFENET/400............................... 9.1 
D
E
-
ACTIVATING 
S
AFE
N
ET
/400 ................................................................................................... 9.1 
R
EMOVING 
S
AFE
N
ET
/400 
FROM YOUR SYSTEM
............................................................................ 9.3 
 
CHAPTER 10 - PROBLEM DETERMINATION ............................................................... 10.1 
E
RROR 
M
ESSAGE 
R
ECEIVED ON THE 
S
YSTEM I
5......................................................................... 10.1 
E
RROR 
M
ESSAGE 
R
ECEIVED ON THE 
C
LIENT
............................................................................. 10.3 
E
XAMPLES OF 
C
LIENT 
E
RROR 
M
ESSAGES
.................................................................................. 10.7 
E
RROR 
C
ODES WHICH 
A
PPEAR IN THE 
L
OG
............................................................................... 10.9 
A
DDITIONAL 
T
ROUBLESHOOTING 
T
IPS
.................................................................................... 10.11 
 
CHAPTER 11 - SPECIAL SAFENET/400 CONSIDERATIONS ...................................... 11.1 
R
ESETTING 
L
EVEL 
WITHIN 
S
AFE
N
ET
/400 ............................................................................... 11.1 
P
RE
-P
OWER 
D
OWN 
P
ROGRAM 
P
OINT
....................................................................................... 11.3 
U
SING 
A
UTOMATIC 
A
LERT 
N
OTIFICATION
................................................................................. 11.4 
P
ROFILE 
S
WAPPING
................................................................................................................. 11.6 
J
OURNALING 
S
AFE
N
ET
/400 S
ECURITY 
F
ILES
............................................................................ 11.8 
F
ILES 
C
ONTAINED IN 
S
AFE
N
ET
/400.......................................................................................... 11.9 
S
AFE
N
ET
/400 C
OMMANDS
..................................................................................................... 11.11 
 
CHAPTER 12 - SERVER FUNCTION DESCRIPTIONS .................................................. 12.1 
O
RIGINAL 
S
ERVERS
.................................................................................................................. 12.2 
O
PTIMIZED 
S
ERVERS
.............................................................................................................. 12.13