IBM i5/OS Network Security Scenarios A Practical Approach

An IBM Redbooks publication




Abstract

This IBM® Redbooks publication provides specific setup information for various scenarios of Internet security. Assuming readers have knowledge of the theories and conceptual parts of the related topics, this book aims to assist i5/OS network security administrators who need to set up any of the scenarios listed in the Table of Contents. Each scenario is a separate chapter.

Table of contents

Chapter 1. i5/OS IP packet filtering
Chapter 2. Building a DMZ with i5/OS
Chapter 3. VPN connection with UDP encapsulation
Chapter 4. VPN tunnel between Linux and i5/OS
Chapter 5. VPN connection with Windows XP clients
Chapter 6. Password elimination using Windows 2003 KDC
Chapter 7. Securing Telnet for iSeries Access using SSL
Chapter 8. Securing FTP using SSL
Chapter 9. Introduction to OpenSSH for i5/OS
Chapter 10. Setting up and running the sshd daemon
Chapter 11. Establishing an SSH session
Chapter 12. Using file transfer and public key authentication with OpenSSH
Chapter 13. Protecting traffic with SSH tunnels
Chapter 14. Using SSH to control your HMC




Profile

Publish Date
11 December 2007


Rating: Not yet rated


Author(s)

ISBN-10
0738488992

ISBN-13
9780738488998

IBM Form Number
SG24-7374-00

Number of pages
358