SunScreen 3.2 Administration Guide

Preface

SunScreenTM 3.2 for the SolarisTM operating environment is part of the family of SunScreen products that provide solutions for security authentication and privacy requirements. SunScreen enables companies to establish secure department networks that are connected to a public internetwork.

This SunScreen 3.2 Administration Guide provides all the information necessary to configure and administer SunScreen on your network. Other manuals in the SunScreen documentation set include:

Who Should Use This Book

The SunScreen 3.2 Administration Guide is intended for SunScreen system administrators who are responsible for the operation, support, and maintenance of network security. In this guide, it is assumed that you are familiar with UNIX\256 system administration and TCP/IP networking concepts as well as with your network topology.

How This Guide Is Organized

The SunScreen 3.2 Administration Guide contains the following chapters and appendixes:

Related Books and Publications

You may want to refer to the following sources for background information on cryptography, network security, and SunScreen 3.2 SKIP.

Sun Software and Networking Security http://www.sun.com/security/

Ordering Sun Documents

Fatbrain.com, an Internet professional bookstore, stocks select product documentation from Sun Microsystems, Inc.

For a list of documents and how to order them, visit the Sun Documentation Center on Fatbrain.com at http://www1.fatbrain.com/documentation/sun.

Accessing Sun Documentation Online

The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.

Getting Support for SunScreen Products

If you require technical support, contact your Sun sales representative or Sun authorized reseller. See http://www.sun.com/service/contacting/index.html for information on contacting Sun and http://www.sun.com/service/support/index.html for information on Sun's support services.

Typographic Conventions

The following table describes the typographic changes used in this book.

Table P-1 Typographic Conventions

Typeface or Symbol 

Meaning 

Example 

AaBbCc123

 The names of commands, files, and directories; on-screen computer output

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

 What you type, contrasted with on-screen computer output

machine_name% su

Password:

AaBbCc123

 Command-line placeholder: replace with a real name or value

To delete a file, type rm filename.

AaBbCc123

Book titles, new words, or terms, or words to be emphasized. 

Read Chapter 6 in User's Guide.

These are called class options.

You must be root to do this.

Shell Prompts in Command Examples

The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P-2 Shell Prompts

Shell 

Prompt 

 C shell promptmachine_name%
 C shell superuser promptmachine_name#
 Bourne shell and Korn shell prompt$
 Bourne shell and Korn shell superuser prompt#