Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Chapter 8. Security enhancements of DB2 ... > Protection of data sets in DB2 10 - Pg. 138

From the central log of the SAP system, we can see attempts of untrusted connections from the application server, whose IP address was deleted from the definition of trusted context DB0TTRUSTSAP. Figure 8-4 shows this failed connection attempt.