Table of Contents: Basic | Expanded
This preface includes brief descriptions of the contents of this guide and an explanation of typographical conventions used, and refers you to additional sources of information.
This guide is written for system and network administrators responsible for IRIX backups, security, or accounting. If you are responsible for your personal workstation only, refer to the Personal System Administration Guide first for this information.
IRIX Admin: Backup, Security, and Accounting documents data backup and recovery, host and network security, and host resource auditing and accounting for IRIX computer sites. It contains the following chapters:
Part I of this guide contains three chapters on the following backup and recovery topics:
Part II of this guide covers system and network security and contains two chapters:
Part III of this guide covers system accounting and auditing and contains the following two chapters:
If you are responsible for backups, refer to Part I. Read Chapter 1 if you have yet to implement a backup policy, Chapter 2 to learn details on the use of a particular backup tool, and Chapter 3 if you are having trouble with backups.
If you are responsible for security, read Part II, Chapter 4 for details on configuring IRIX host security, and Chapter 5 if you are responsible for network security as well.
If you are responsible for system auditing, read Part III, Chapter 6. If you are responsible for monitoring system usage (accounting), read Part III, Chapter 7.
These type conventions and symbols are used in this guide:
The following books, and other network and product resources are available to help you establish system and network security.
The following books provide additional information on system and network security.
Various resources addressing security are provided on the Internet itself. Pointers (URLs) are provided here rather than including the information in full, as the material is frequently updated.
Internet resources relating to system security include answers to frequently asked questions (FAQs) from various newsgroups, documents concerning the practice and theory of security, bulletins on new security issues, interactive mailing lists discussing security issues, and so on. Pointers to some of these resources are listed below.
Here are some URLs (universal resource locators) that can connect you to information to various sources of security information on the World Wide Web (WWW):
Note that URLs change and some of these may already be out of date. Use a good WWW search tool and search for various key words such as "security," "network security," and "firewall" to find others.
Here are some news groups you can subscribe to that can help you keep up-to-date on security issues:
Silicon Graphics provides two IRIX security options. Commercial Security Pak gives both administrator and user greater group and privilege control. Trusted IRIX meets the B1 security level with identification, authentication, and auditing facilities.
Contact your Silicon Graphics sales representative for information on the Gauntlet for IRIX and other security-related products. Silicon Graphics also has Netscape products, which support secure Internet access through encrypting and proxying servers.
Some additional products are mentioned on the Web pages listed above, but note that mention there does not imply endorsement by Silicon Graphics, and configuration and support of these products is either supplied by their vendors or your responsibility.
Table of Contents: Basic | Expanded