Skip to main content

Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 4: Policy-Based Network Security

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.


Published on 29 March 2006

  1. .PDF (7.4 MB)

Share this page:   

ISBN-10: 0738496154
ISBN-13: 9780738496153
IBM Form #: SG24-7172-00

Authors: Bill White, Bob Louden, Rama Ayyar, Garth Madella and Joel Porterie

    menu icon


    This new and improved Communications Server (CS) for z/OS TCP/IP Implementation series provides easy-to-understand step-by-step how-to guidance on enabling the most commonly used and important functions of CS for z/OS TCP/IP. With the advent of TCP/IP and the Internet, network security requirements have become more stringent and complex. Because many transactions come from untrusted networks such as the Internet, and from unknown users, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. In addition, there are certain applications shipped with TCP/IP such as File Transfer Protocol (FTP) that, without proper configuration and access controls in place, could allow unauthorized users access to system resources and data. This IBM Redbooks publication explains how to set up security for your z/OS networking environment. For more specific information about CS for z/OS base functions, standard applications, and high availability, reference the other volumes in the series. These are:

    --Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 1 - Base Functions, Connectivity, and Routing, SG24-7169

    --Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 2 - Standard Applications, SG24-7170

    --Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 3 - High Availability, Scalability, and Performance, SG24-7171

    Table of Contents

    Part 1. Policy-based networking

    Chapter 1. Policy Agent (PAGENT)

    Chapter 2. IP filtering

    Chapter 3. IPSec

    Chapter 4. Application Transparent - TLS

    Chapter 5. Intrusion Detection Services (IDS)

    Chapter 6. Quality of Service

    Part 2. SAF-based security

    Chapter 7. RACF demystified

    Chapter 8. Protecting network resources

    Part 3. Appendixes

    Appendix A. Basic cryptography

    Appendix B. Tools for application security

    Appendix C. Certificate management in z/OS

    Appendix D. IPSec scenario policies


    Others who read this also read