Hello, I'm curious how many folks have used the the TCP.VALIDNODE_CHECKING, TCP.EXCLUDED_NODES and/or TCP.INVITED_NODES parameters to restrict database access. What problems did you run into with it? Was it worth the trouble in your opinion? Thanks, Jared Still Certifiable Oracle DBA and Part Time Perl Evangelist