
all the other components of the TCP/IP software. It provides a file-system interface to
the TCP, User Datagram Protocol (UDP), and IP protocol. The TCP/IP subsystem
runs as a single or dual process on the NonStop server.
The ONLY real requirement for Network security (from an end user point of
view) is that the data sent across the network be ENCRYPTED. There are administra-
tive security issues such as with any functional application, authenticating who is
logging on to control the network and make changes to configurations, routing,
encryption key management, etc. Everything else must be handled by the platform and
application in question. If each ...