Example: Trusted, semitrusted, and untrusted Nodes
Figure 1 shows a sample NJE network in which some nodes are trusted (see Understanding mixed security environments), some nodes are semitrusted (verification is done on inbound work), and some nodes are not trusted (no inbound work is allowed to run).
![Example: Trusted, semitrusted, and untrusted Nodes](icha7f9.gif)
In this example, profiles on node MYNODE control inbound work as follows:
Trusted
nodes:
RDEFINE NODES TRSTNODE.USER%.* UACC(UPDATE)
RDEFINE NODES LOCLNODE.USER%.* UACC(UPDATE)
RDEFINE NODES VMNODE.USER%.* UACC(CONTROL)
Semitrusted nodes:
RDEFINE NODES SEMTNODE.USER%.* UACC(READ)
RDEFINE NODES DFLTNODE.USER%.* UACC(READ)
Untrusted node:
RDEFINE NODES NOTRUST.*.* UACC(NONE)
Note: To prevent any unknown nodes from submitting work to be done on your node, create the
following profile:
RDEFINE NODES *.*.* UACC(NONE)