Top Navigational Bar

Network Security Overview
DocumentID: 653497
Revision Date: 29-Feb-96 8:29:23 PM

The information in this document applies to:
WordPerfect® 5.1 for DOS

Problem

Solutions: The following is information on network security which was prepared by Elaine Grenko.

NETWORK SECURITY

1. LOGIN NAME or PASSWORD
      Login/Password security is used to control who may access a network, since it determines who may log in to a file server.

Login Security applies to all users.

      Before you may log in to a file server, you must know a "username" (a username is an identification that the server recognizes as representing a user identity.).

2. USER SECURITY
Controls a users access to certain directories.

3.      DIRECTORY SECURITY
      Limits the rights of all users in specified directories (restrictions do not extend down through succeeding subdirectories).

4. FILE ATTRIBUTES
      Allows users to control whether or not an individual file may be modified (regardless of a user's rights). This prevents accidental change or deletion of a file. Newly created files are automatically attributed "Read-Write"


NOVELL NETWARE SECURITY

Login Name -- Control access to a file server.

Supervisor -- Login_Server/Supervisor
User -- Login_Server/Username
      (If a password has been assigned, you will need to type it when prompted.)

WHOAMI --      A command which can be issued to find out user currently logged in.

Directory Security

Security used to control the maximum rights that trustees may exercise in one directory. The rights of all trustees of the directory, not just one selected trustee, are restricted by directory security. Directory security restrictions apply only to one specific directory. (Does not extend down through succeeding subdirectories).

The "MAP" command assigns a drive letter to this specific directory for the user or group or users. This command is located in the Login Script -- either System Login Script or User Login Script.

MAP G:=ADMIN/SYS:INSTALL
MAP SEARCH 2:=SYS:WP

Use the "MAP" command to determine if the directory is available for a particular user.


User Security

Controls an individual user's ability to access directories. When you create a directory, you may assign several users identical rights in the same directory. Using a utility called "Syscon," the supervisor can designate certain users as members in one group. These rights (trustee rights) can be granted to any user as a single user, or as a member of a user group.

R - Read from open files P - Parental, which includes
W - Write to open files - Create, rename, and erase
O - Open existing files subdirectories of the directory
C - Create new files - Set trustee and directory rights
D - Delete existing files in the directory
S - Search the directory - Set trustee and directory rights M - Modify file attributes in its subdirectories

Rights in the command used to list trustee rights in a specific directory.


File Attributes Default attribute on a Network file is -- "Non-Shareable Read/Write"

Four file attributes are
            Read-Write/Read-Only      RW/RO
            Shareable/Non-Shareable      S/NS
            Hidden                        H
            System
            Transaction Tracking      T
            Indexed                        I

Example: Flag_Filename_SRO

The "FLAG" command is used to view the attributes of a file.
      Type FLAG [Return] to list all the attributes of files in a specific directory.
      Type FLAG_Filename [Return] to list only the attribute of a single filename.

Assign Network Drive Designations

Refer to Mapping information above.


IBM PC NET SECURITY

Login Name
Supervisor login name -- Login_Admin

User login name -- Login_Username

Directory Security
NET SHARE -- Command to let other computers use your devices or directories (Also used to display a list of devices you are sharing and the computers that are using the devices).


NET USE -- Command to specify a device or directory on a network computer that you want to use (also used to display a list of the network devices that you are using).

Example: NET SHARE Sharename =C:\WP
NET USE E:\\Server\Sharename


User Security
Read-Only Acces ® -- Remote users can only view the information in these files. Use this for directories you do not want changes.

Read/Write/Create Access (RWC) -- Remote users have the same access rights that you normally have. View the files, make changes to the files, create files and delete files. Use this for directories you want remote computers to be able to change.

Write-Only Access (W) -- Remote users can only modify the information in the files, but can't view the information that is already in the files.

Write/Create Access (WC) -- Remove users can change the information in the file, delete, and create new files, but they can not viewthe contents of existing files.

Read/Write Access (RW) -- Remote computers can view and make changes to existing files, but cannot create new files or delete existing files.


File Attributes
The DOS Attribute (ATTRIB) command allows you to change access rights to Read Only or to Read/Write/Create for a specific file.

ATTRIB +R Filename (Changes attribute to Read Only)
ATTRIB -R Filename (Changes attribute back to Read/Write/Create)

Assign Network Drive Designations
NETSHARE (Sharename)=C:\DIRECTORY/RIGHTS

Example: NET SHARE E=C:\WP/R


3COM 3+ SECURITY

Login Name

Login will prompt you for username.
Login_John_Doe_[/pass=password] (Password is optional).
Supervisor Login Name -- ADMIN

Directory Security

      3F
      3F>Share? (You will be prompted for sharename, path or location of directory to be shared, password, access rights)

      Can directly type it in without being prompted:
            3F SHARE sharename=E:\directory/Pass=Password/Rights

      (3F Modify -- Lets you change already shared directories)


User Security (Rights within a directory) referred to as Sharename Access Rights

Private (PRIV) -- Only one user at a time can access the directory via the sharename. To give other users access to a private directory, the owner must assign a password to the sharename.

Public (PUB) -- Users can read files and subdirectories in a public directory but cannot create or write to files in the directory and subdirectories.

Read ® -- Users can read any files and subdirectories that are in the directory. This access right has the same effect as Public Access.

Write (W) -- Users can write to the files and subdirectories in the directory.Read, Write (RW) -- Users can read from and write to files and subdirectories in the directory.

Write, Create (WC) -- Users can write to, create and delete files and subdirectories in the directory but cannot read them.

Read, Write, Create (RWC) -- Users can read, write to, create, and delete files and subdirectories in the directory.

Shareable (SHAR) -- Users can create sharenames for the directory, as well as read, write to, create, and delete files and subdirectories in the directory.


File Attributes

DOS ATTRIB command used for changing file attributes.

ATTRIB_+R_Filename Changes attribute to Read Only
ATTRIB_-R_Filename Changes attribute to Read Write


*******INFORMATION FROM 3+ SHARE USERS GUIDE 7-15*******

"You can make any of your directories available to other users by assigning a sharename and access rights. All subdirectories under a shared directory are also available to other users. For this reason, it is a good idea not to share your home directory.

"You can assign more than one sharename to a directory. This lets you make a directory available to different users in different ways. For example, if you want some users to be able to read files in a directory, you can assign a sharename and Read access rights. If you want other users to both Read & Write to files in the same directory, you can assign it another sharename with Read/Write Access rights. For added security, you can also assign a password to a sharename. Given the appropriate access rights, several users can use a directory at the same time."

Answer:

Details:


Product specifications, packaging, technical support and information (*Specifications*) refer to theUnited States retail English version only. Specifications for other versions may vary. All Specifications, claims, features, representations, and/or comparisons provided are correct to the best of our knowledge of the date of publication, but are subject to change without notice.OUR MAXIMUM AGGREGATE LIABILITY TO YOU AND THAT OF OUR DEALERS AND SUPPLIERS IS LIMITED. IT SHALL NOTEXCEED THE AMOUNT YOU PAID TO ACCESS THE INFORMATION. SEE LEGAL DISCLAIMER.