BNU security

Because other systems contact your system to log in, transfer files, and enter commands, BNU provides a means to establish security.

BNU security enables you to restrict what users of remote systems can do on the local system (users of remote systems can also restrict what you can do on their systems). BNU runs several daemons to complete its activities and uses administrative directories to store the files it needs. BNU also keeps a log of its own activities.

BNU security works on several levels. When you configure BNU, you can determine:

  • Who on your system has access to BNU files.
  • Which remote systems your system can contact.
  • How users on remote systems log in to your system.
  • What users on remote systems can do on your system once they log in.