AS/400 Internet Security Scenarios: A Practical Approach

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 14 July 2000

  1. .PDF (6.8 MB)


Share this page:   

ISBN-10: 073841798X
ISBN-13: 9780738417981
IBM Form #: SG24-5954-00


Authors: Marcela Adan, Erik Elmgren, David Fosdike, Dave Granum, Dwight Mendoza, Lars-Olov Spangberg, Raymond Tang and Eric Zeier

    menu icon

    Abstract

    Learn how to exploit your AS/400 integrated network security functions. Today, network administrators face the challenge of implementing layered security architectures to protect their networks from the increasing sophistication of "hackers". To provide all of the security needed within a manageable budget is a complex task. This IBM Redbooks publication explores all the native network security features available on the AS/400 system such as IP filters, NAT, VPN, HTTP proxy server, SSL, DNS, mail relay, auditing, and logging. It describes their use through practical examples.

    Although OS/400 is not intended to be a firewall, the correct implementation of its rich set of network security services, combined with routers or other Internet security appliances, may eliminate the need for a separate firewall product. In some cases, it can provide an affordable solution for smaller sites. The AS/400 network security functions can be used to enhance the security of environments where routers with firewall security features are also used. This book is designed to meet the needs of network administrators, consultants, and AS/400 specialists who plan to design, implement, and configure AS/400 networks connected to the Internet and are evaluating alternatives to traditional firewall products.

    Table of Contents

    Chapter 1. Network security concepts and overview

    Chapter 2. AS/400 network security functions

    Chapter 3. Cisco router network security functions

    Chapter 4. Selecting an Internet Service Provider

    Chapter 5. Securing your hosts and understanding the risks

    Chapter 6. Small office with dial-up Internet connection

    Chapter 7. Small office with a permanent Internet connection

    Chapter 8. Screened host architecture

    Chapter 9. Screened subnet architecture

    Chapter 10. Branch office VPN gateway to corporate office

    Chapter 11. Network security in an ASP environment

    Chapter 12. Remote access with Windows 2000 VPN clients

    Appendix A. Services, ports, and master filter files

    Appendix B. FTP exit examples

     

    Others who read this also read