Additional AIX Security Tools on IBM eServer pSeries, IBM RS/6000, and SP/Cluster

An IBM Redbooks publication

cover image

Other Language Versions

Note: Other language versions may not be as current as the English edition.


From firewalls to operating system hardening, this IBM Redbooks publication illustrates additional tools and techniques that you can use to enhance the security environment of your IBM eServer pSeries, IBM RS/6000 workstation, SP, or Cluster. The approach taken is from outside to inside and from top to bottom. We move from the servers on the far reaches of your network that are visible to the outside world to those in the innermost recesses of your intranet containing your most confidential data. As we move through these servers, we work from the application layer at the top to the network layer at the bottom. Along the way, we cover third-party software that is readily available, modifications to the standard software that comes with AIX and PSSP, and assorted techniques that can all be used to provide enhanced security in your environment.

Subjects covered in this book include:
- Firewalls
- Secure Remote Access
- Network Mapping and Port Scanning
- System Integrity
- Securing AIX

Table of contents

Chapter 1. Introduction
Chapter 2. Firewalls
Chapter 3. Check Point FireWall-1
Chapter 4. IBM Secureway Firewall
Chapter 5. Secure remote access
Chapter 6. Port and network scanning
Chapter 7. System and data integrity
Chapter 8. Securing AIX


Publish Date
21 December 2000

Last Update
19 January 2001

(based on 1 review)




IBM Form Number

Number of pages