Depending on your application the IP address might be ok. For example,
the share was set up so that the i could access something that was
controlled on other server box. Limit it down to the i (and maybe the i's
HA box). Then again, any clod would be able to do a CPY from the NFS
share to some directory on the i and have his way with it.
This mailing list archive is Copyright 1997-2020 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact