SAP Basis Advice on hardware, database, operating system, type of installation (physical or virtual) - SAP Basis

Direkt zum Seiteninhalt
Advice on hardware, database, operating system, type of installation (physical or virtual)
SMGW Gateway monitor for instance
However, it is not correct to refer to the SAP NetWeaver and SAP HANA platforms as SAP Basis. Both components are only parts of an SAP Basis architecture (see Structure of SAP Basis).

Reachable at any time: Your competent contact person is available at all times. If you operate SAP Basis Support in your own company, personnel bottlenecks may occur. If your SAP employees are absent due to illness or vacation, there may be no equivalent replacement available.
MARKETING & SELF-UNDERSTANDING
Each SAP Basis system must be controlled and managed by an administrator. This person is responsible for the smooth operation of the system. This can be an internal administrator or it can be handed over to external service providers.

The security of an SAP system requires protection against unauthorised access, e.g. through the secinfo and reginfo files. A cleanly implemented authorisation concept protects against attacks within the SAP system. However, it is also possible to attack your SAP system via the network. Through the RFC Gateway Server, your system communicates with external servers and programmes. One particularly effective way to protect against this are so-called Access Control Lists (ACL). Find out what this is and how you can use it to better protect your SAP system. The SAP Standard offers different approaches for gate protection. All methods combined can provide even greater safety. For example, it is possible to use Access Control Lists (ACL) to monitor exactly which external programmes and which hosts can communicate with the gateway. Another option is to configure the gateway to support Secure Network Communication (SNC). Finally, there are various security parameters for the gateway. This article focuses on the use of ACL files such as secinfo and reginfo files. What is an ACL? Access control lists are files in which permitted or prohibited communication partners can be recorded. For the gateway to use these ACL files, parameters must be set in the default profile of the SAP system and of course the files must be maintained accordingly. With the help of logs and traces, which can be configured for this purpose, a precise investigation can be made in advance of the activation, which connections currently run via the gateway. This allows them to prevent important applications with which your system communicates from being blocked by the ACL files. The rules in the ACL files are read from top to bottom of the gateway to decide whether to allow a communication request. If none of the rules matches the requesting programme, it will be blocked. Network-based ACL The network-based ACL file contains permitted and prohibited subnets or specific clients.

Tools such as "Shortcut for SAP Systems" are extremely useful in basic administration.

If you are unable to resolve your issue with the information provided or with the following information, then record a problem message in the SAPNet - R/3 frontend with the information from the error dialogue box and send it to the BC-UPG-OCS topic group.

The function block SWNC_COLLECTOR_GET_AGGREGATES is very suitable for exporting the used transactions in a list.
SAP BASIS
Zurück zum Seiteninhalt