IRIX Admin: Backup, Security, and Accounting
Table of Contents: Basic | Expanded
Index
absolute pathnames, reading tapes: Reading Media from Other Systems
Access Control Lists: Access Control Lists (ACLs)
access control violations: File Permission Violations by Inside Users
accounting:
process: System Accounting
system: System Accounting
acl: Access Control Lists (ACLs)
ls option: Access Control Lists (ACLs)
administration, system:
documentation: IRIX Admin Manual Set
archiving audit data: Archiving Audit Data
attrinit command: Using attrinit to Clean Up Capability Corruption
audit:
a file: Auditing a File, Access to Particular Files or Resources
a label: Auditing a Label Under Trusted IRIX/B
a user: Activity by Particular Inside Users , Auditing a Specific User
customizing: Customizing Auditing
data archiving: Archiving Audit Data
data removing: Removing Audit Data
event types: Auditable Events
guidelines: About Proper and Improper System Management
improper use: About Proper and Improper System Management
particularly interesting users: Activity by Particular Inside Users
sample record: About the Audit Data
sat_select: Auditable Actions
system data files modification: Modifications of System Data Files
system programs modification: Modifications of System Program Attributes
the audit trail: Manipulation of the Audit Trail
audit data:
interpreting: About the Audit Data
understanding: About the Audit Data
auditing:
cofiguration utilities: Customizing Auditing
customizing: Customizing Auditing
default environment: Default Auditing
enabling: Enabling Auditing
list of items to audit: Auditable Events
reading output: About the Audit Data
recovery: Saving and Retrieving Your Auditing Environment
saved files: Placing the Audit Files
saving: Saving and Retrieving Your Auditing Environment
auditing, description: Administering the System Audit Trail
auditing, satconfig utility: About satconfig
autochangers: Types of Backup Media
Backup: Saving Data with Backup
backup and restore:
using xfsdump and xfsrestore: About xfsdump and xfsrestore
Backup and Restore window: System Backup Tools
backups:
about: Planning a Backup Strategy
across a network: File Backup Across a Network
automatic: Automatic Backups with cron
available programs: IRIX Backup Tools
byte swapping: Reading Media from Other Systems
dd conversion options: Reading Media from Other Systems
error messages: Backup and Recovery Error Messages and Actions
errors: Troubleshooting Errors During Backup
estimate space with bru: Saving Data with Backup
how often: When to Back Up Data and What to Back Up
incremental: Incremental Backup Schedule
incremental with cpio: Performing Incremental Backups with cpio, Performing Incremental Backups with tar
incremental with dump: Performing Incremental Backups
incremental with tar: Performing Incremental Backups with tar, Performing Incremental Backups with cpio
making: General Backup Procedure
restored wrong one: Restoring the Correct Backup After the Wrong One
root filesystem: Root Filesystem Backup
storing: Storage of Backups
strategies for: Backup Strategies
unreadable: Troubleshooting Unreadable Backups
user filesystems: User Filesystem Backup
Capabilities: Least-Privilege Capabilities
Capabilities, default: Capabilities in This Release
capabilities, on files: File Capabilities
chacl command: Short ACL Text Form
changing passwords: Controlling Password Aging by Editing /etc/passwd; Controlling Password Aging by Editing /etc/passwd
cpio:
about: IRIX Backup Tools
and System Manager: About cpio
capabilities: About cpio
making backups: Using cpio to Back Up Files by Modification Date
restoring files: Restoring cpio Archives, Restoring tar Archives
cumulative restores, xfsrestore: Performing Cumulative Restores with xfsrestore
customizing auditing: Customizing Auditing
data segments, xfsdump: Media Layout for xfsdump
dbedit utility: Modifications of System Data Files
dd:
about: IRIX Backup Tools
capabilities: About dd
conversion options: Reading Media from Other Systems
default backup device:
changing: Changing the Default Backup Device
/dev/tape: General Backup Procedure
disabling IP packet forwarding: Disabling Forwarding of IP Packets
disabling NFS: Disallowing NFS Access on the Firewall
disabling NIS: Disabling NIS (YP) on the Firewall
DNS configuration of internal network: Domain Name System (DNS) Security Guidelines
dual-homed host:
hardware setup: Dual-Homed Host Firewall
software setup: Network Software Setup on a Dual-Homed Host
dump:
about: IRIX Backup Tools
/etc/dumpdates: Backing Up a Filesystem with dump
incremental backups: Performing Incremental Backups
making backups: Backing Up a Filesystem with dump
vs. xfsdump: About xfsdump and xfsrestore
dump inventory, xfsdump: Media Layout for xfsdump
dump session, xfsdump: Media Layout for xfsdump
dump stream, xfsdump: Media Layout for xfsdump
educating users about security: Educating Users About the Firewall
error messages, backup and recovery: Backup and Recovery Error Messages and Actions
/etc/capability file: The /etc/capability File
/etc/dumpdates: Backing Up a Filesystem with dump
/etc/hosts.equiv file: Network Access Control Files
/etc/inetd.conf file : Local inetd Services
/etc/passwd file : Network Access Control Files
file audit: Auditing a File
File Capabilities: File Capabilities
firewall:
monitoring security: Monitoring the Firewall
firewall:
definition: About Firewalls
design philosophy: Firewall Design Philosophy
hardware configuration: Hardware Configuration for Firewalls
software configuration: IRIX Configuration for Security
firewalls: About Network Security and Firewalls
forwarding IP packets: Disabling Forwarding of IP Packets
FTP services: Limiting inetd Services
hardware configuration:
firewall: Hardware Configuration for Firewalls
routers: Routers and Firewalls
host:
dual-homed: Dual-Homed Host Firewall
screened: Screened Host Gateway
housekeeping directory: About the housekeeping and orphanage Directories
incremental dumps, xfsdump: About Incremental and Resumed Dumps
inetd daemon: Local inetd Services
inetd services:
limiting: Limiting inetd Services
insider security violation: System Use and Abuse by Inside Users
interactive restore, xfsrestore: Performing Interactive Restores with xfsrestore
internal network configuration: Internal Network Security Configuration
Internet, definition: About the Internet
interrupted restores, xfsrestore: Interrupting xfsrestore
inventory, xfsdump: Media Layout for xfsdump; Examining xfsdump Archives
IP packet forwarding: Disabling Forwarding of IP Packets
IRIX administration:
documentation: IRIX Admin Manual Set
jukeboxes: Types of Backup Media
label audit: Auditing a Label Under Trusted IRIX/B
locking logins: Controlling Password Aging by Editing /etc/passwd
log files: About Log Files on the Firewall
login:
disable time: Setting a Time Period to Disable a Line (DISABLETIME)
locking: Controlling Password Aging by Editing /etc/passwd, Locking Unused Logins
maximum attempts: Restricting Login Attempts (MAXTRYS)
options: System Login Options
recording: Recording Login Attempts
restricting root: Restricting root Logins
special accounts: About Special Accounts
ls -d option: Using ls -D and chacl
mail:
configuration of internal network: Mail Configuration Security Guidelines
spool isolation: Mail Spool Isolation
media:
layout, xfsdump: Media Layout for xfsdump
object, xfsdump: Media Layout for xfsdump
storing: Storage of Backups
modification of system data files: Modifications of System Data Files
modifications of system programs: Modifications of System Program Attributes
monitoring the firewall: Monitoring the Firewall
ncheck command: Checking for Set-UIDs in the root Filesystem
network:
access control: Network Access Control Files
backups: File Backup Across a Network
screened: Screened Host Gateway
security issues: Network Security Issues
NFS:
limiting or disabling: Disallowing NFS Access on the Firewall
NIS:
disabling: Disabling NIS (YP) on the Firewall
operating the system:
general: System Accounting
orphanage directory: About the housekeeping and orphanage Directories
outside connections: Connections with Machines Outside the Local Network
outsider security violation: System Use and Abuse by Outside Users
password:
aging: About Password Aging
changing: Controlling Password Aging by Editing /etc/passwd, Controlling Password Aging by Editing /etc/passwd
checking: Using pwck to Check the Password File
choosing: Guidelines for Devising Passwords
dialup: Establishing Second (Dialup) Passwords
forcing: Forcing a Password
PROM: About PROM Passwords
protection: Password Protection on the Firewall
password PROM: About PROM Passwords
passwords:
administration: Password Administration
potential security violations: About Security Violations
process accounting: System Accounting
PROM passwords:
clearing: Clearing the PROM Password Using nvram
setting: Setting the PROM Password from the Command Monitor
use of: About PROM Passwords
proxy servers: About Proxy Servers
pwck command: Using pwck to Check the Password File
Recover System: Recovering Data After System Corruption
recovery:
after system corruption: Recovering Data After System Corruption
error messages: Backup and Recovery Error Messages and Actions
removing:
audit data: Removing Audit Data
Restore:
about: IRIX Backup Tools, IRIX Backup Tools
interactive mode: Recovering Individual Files with restore
restoring data: Restoring Data with Restore
restoring filesystems: Recovering a Filesystem with restore
restoring individual files: Recovering Individual Files with restore
vs. xfsrestore: About xfsdump and xfsrestore
restoring data:
cpio: Restoring tar Archives, Restoring cpio Archives
restore: Recovering a Filesystem with restore , Restoring Data with Restore
tar: Restoring tar Archives, Restoring cpio Archives
restoring interrupted dumps, xfsrestore: Performing Cumulative Restores with xfsrestore
.rhosts file : Network Access Control Files
robotic media changers: Types of Backup Media
root privilege violation: Unexpected Use of Root Privilege by Inside Users
routers and firewalls: Routers and Firewalls
RPC services:
limiting: Limiting rpc Services Access on the Firewall
SAT:
customizing: Customizing Auditing
event types: Auditable Events
sample record: About the Audit Data
sat_select: Auditable Actions
understanding data: About the Audit Data
sat_interpret utility: About the Audit Data; About the Audit Data
sat_reduce utility: About the Audit Data
sat_select: Auditable Actions
sat_select utility: About sat_select
sat_summarize utility: About the Audit Data; About the Audit Data
satconfig utility: About satconfig
screened host:
hardware setup: Screened Host Gateway
screened network:
hardware setup: Screened Host Gateway
security:
guidelines: Security Safeguards and Cautions
IRIX standard: Standard Security Features
LAN: Local Area Network Access
network: Network Security
process accounting: System Accounting
tightening for firewall: Tightening Security in IRIX
Trojan horse attack: Security Safeguards and Cautions
xhost command: Limiting Access with the xhost Command
security violation:
insider: System Use and Abuse by Inside Users
security violation (auditing):
access control: File Permission Violations by Inside Users
outside connections: Connections with Machines Outside the Local Network
outsider: System Use and Abuse by Outside Users
potential: About Security Violations
root privilege: Unexpected Use of Root Privilege by Inside Users
unauthorized entry: Attempts at Unauthorized System Entry
unusual system usage: System Use at Unusual Hours or from Unusual Locations
sendmail:
configuration: Sendmail Configuration and Mail Aliases
Set-GID: Checking for Set-UIDs in the root Filesystem
Set-UID: Checking for Set-UIDs in the root Filesystem
software:
checking integrity: Checking Software Integrity on the Firewall
stream terminator, xfsdump: Media Layout for xfsdump
system access: Controlling Password Aging by Editing /etc/passwd; Controlling Password Aging by Editing /etc/passwd; Controlling Password Aging by Editing /etc/passwd
system accounting: System Accounting; System Accounting
system administration:
documentation: IRIX Admin Manual Set
system backups: System Backup Tools
system data files:
modification: Modifications of System Data Files
System Maintenance Menu: Recovering Data After System Corruption
system passwords:
password:
system: About PROM Passwords
system recovery: Recovering Data After System Corruption
tape device, default: General Backup Procedure
tapes:
reusing: Guidelines for Tape Reuse
storing: Storage of Backups
testing: Testing for Bad Media
tapes, absolute pathnames: Reading Media from Other Systems
tapes, reusing with xfsdump: Reusing Tapes with xfsdump
tar:
about: IRIX Backup Tools
capabilities: About tar
comparison key characters: Examining tar Archives
making backups: Using tar to Back Up Files by Modification Date
restoring files: Restoring tar Archives, Restoring cpio Archives
terminator, xfsdump: Media Layout for xfsdump
Trojan horse attack: Security Safeguards and Cautions
unauthorized entry: Attempts at Unauthorized System Entry
understanding the audit data: About the Audit Data
unusual system usage: System Use at Unusual Hours or from Unusual Locations
user accounts:
forcing a password: Forcing a Password
user audit: Auditing a Specific User
users and security: Educating Users About the Firewall
violations:
of access control security: File Permission Violations by Inside Users
of root privilege security: Unexpected Use of Root Privilege by Inside Users
of security by insiders: System Use and Abuse by Inside Users
of security by outsiders: System Use and Abuse by Outside Users
of security by unauthorized entry: Attempts at Unauthorized System Entry
of security by unusual system usage: System Use at Unusual Hours or from Unusual Locations
possible: About Security Violations
through outside connections: Connections with Machines Outside the Local Network
World Wide Web:and security: World Wide Web Security Issues
X server access:
checking: Interactive Use of the xhost Command
controlling: X11 Network Access
xfsdump:
dump inventory: Examining xfsdump Archives
incremental dumps: About Incremental and Resumed Dumps
media layout: Media Layout for xfsdump
network usage: Using xfsdump and xfsrestore to Copy Filesystems
resumed dumps: About Incremental and Resumed Dumps
reusing media: Reusing Tapes with xfsdump
specifying media: Specifying Local Media with xfsdump
STDOUT: Using xfsdump and xfsrestore to Copy Filesystems
using: Saving Data with xfsdump
xfsrestore:
cumulative restores: Performing Cumulative Restores with xfsrestore
interactive restore: Performing Interactive Restores with xfsrestore
interrupted restores: Interrupting xfsrestore
network usage: Performing Network Restores with xfsrestore, Using xfsdump and xfsrestore to Copy Filesystems
restoring files: Restoring Individual Files with xfsrestore
restoring interrupted dumps: Performing Cumulative Restores with xfsrestore
session ID: Performing Simple Restores with xfsrestore
session label: Performing Simple Restores with xfsrestore
simple restores: Performing Simple Restores with xfsrestore
STDIN: Using xfsdump and xfsrestore to Copy Filesystems
using: About xfsrestore
xhost command: Limiting Access with the xhost Command
IRIX Admin: Backup, Security, and Accounting
Table of Contents: Basic | Expanded