Additional AIX Security Tools on IBM eServer pSeries, IBM RS/6000, and SP/Cluster

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

Published 21 December 2000, updated 19 January 2001

cover image

ISBN-10: 0738418382
ISBN-13: 9780738418384
IBM Form #: SG24-5971-00
(264 pages)

View online


Other Language Versions

Note: Other language versions may not be as current as the English edition.

More options

Rate and comment

Authors: Abbas Farazdel, Marc Genty, Bruno Kerouanton, Chune Keat Khor

Abstract

From firewalls to operating system hardening, this IBM Redbooks publication illustrates additional tools and techniques that you can use to enhance the security environment of your IBM eServer pSeries, IBM RS/6000 workstation, SP, or Cluster. The approach taken is from outside to inside and from top to bottom. We move from the servers on the far reaches of your network that are visible to the outside world to those in the innermost recesses of your intranet containing your most confidential data. As we move through these servers, we work from the application layer at the top to the network layer at the bottom. Along the way, we cover third-party software that is readily available, modifications to the standard software that comes with AIX and PSSP, and assorted techniques that can all be used to provide enhanced security in your environment.

Subjects covered in this book include:
- Firewalls
- Secure Remote Access
- Network Mapping and Port Scanning
- System Integrity
- Securing AIX

Table of contents

Chapter 1. Introduction
Chapter 2. Firewalls
Chapter 3. Check Point FireWall-1
Chapter 4. IBM Secureway Firewall
Chapter 5. Secure remote access
Chapter 6. Port and network scanning
Chapter 7. System and data integrity
Chapter 8. Securing AIX

Follow IBM Redbooks

Follow IBM Redbooks