TCP/IP and Data Communications Administration Guide

Considerations

When using the Permissions file to restrict the level of access granted to remote computers, you should consider the following: