Specifications

v
Contents
Preface
About This Manual........................................................................................................xv
Using This Manual .................................................................................................xv
Associated Documents...........................................................................................xv
Conventions............................................................................................................xvi
Chapter 1 Using Access Server Commands
Overview........................................................................................................................1-1
Introduction............................................................................................................1-1
Online Help....................................................................................................................1-2
Introduction............................................................................................................1-2
User Security Levels..............................................................................................1-2
Naming Conventions ...................................................................................................1-3
Naming Conventions for Access Servers and LAT Services ...........................1-3
Naming Conventions for Internet Host Names................................................1-3
Naming Conventions for Kerberos Principal Names.......................................1-4
Naming Conventions for Other Authentication Services................................1-5
Specifying Passwords...................................................................................................1-6
Conventions for Specifying Passwords..............................................................1-6
Specifying a Port List....................................................................................................1-7
Conventions for Specifying a Port List...............................................................1-7
Entering Commands.....................................................................................................1-8
Entering Commands .............................................................................................1-8
Special Keys.................................................................................................................1-10
Special Keys Table................................................................................................1-10
Chapter 2 Command Descriptions
Command Descriptions Overview.............................................................................2-1
Introduction............................................................................................................2-1
Getting Help...........................................................................................................2-1
Commands BACKWARDS - CRASH.........................................................................2-2
BACKWARDS (secure)..........................................................................................2-2
BROADCAST (nonprivileged).............................................................................2-2
CLOSE PORT (secure)...........................................................................................2-3
CONNECT (secure)...............................................................................................2-4
CONNECT ANY (secure).....................................................................................2-5
CONNECT AUTOLINK (secure) ........................................................................ 2-5
CONNECT [DIAL] (secure).................................................................................2-6