AS/400 Internet Security Scenarios: A Practical Approach
An IBM Redbooks publication
Note: This is publication is now archived. For reference only.
Published on 14 July 2000
ISBN-10: 073841798X
ISBN-13: 9780738417981
IBM Form #: SG24-5954-00
Authors: Marcela Adan, Erik Elmgren, David Fosdike, Dave Granum, Dwight Mendoza, Lars-Olov Spangberg, Raymond Tang and Eric Zeier
Learn how to exploit your AS/400 integrated network security functions. Today, network administrators face the challenge of implementing layered security architectures to protect their networks from the increasing sophistication of "hackers". To provide all of the security needed within a manageable budget is a complex task. This IBM Redbooks publication explores all the native network security features available on the AS/400 system such as IP filters, NAT, VPN, HTTP proxy server, SSL, DNS, mail relay, auditing, and logging. It describes their use through practical examples.
Although OS/400 is not intended to be a firewall, the correct implementation of its rich set of network security services, combined with routers or other Internet security appliances, may eliminate the need for a separate firewall product. In some cases, it can provide an affordable solution for smaller sites. The AS/400 network security functions can be used to enhance the security of environments where routers with firewall security features are also used. This book is designed to meet the needs of network administrators, consultants, and AS/400 specialists who plan to design, implement, and configure AS/400 networks connected to the Internet and are evaluating alternatives to traditional firewall products.
Chapter 1. Network security concepts and overview
Chapter 2. AS/400 network security functions
Chapter 3. Cisco router network security functions
Chapter 4. Selecting an Internet Service Provider
Chapter 5. Securing your hosts and understanding the risks
Chapter 6. Small office with dial-up Internet connection
Chapter 7. Small office with a permanent Internet connection
Chapter 8. Screened host architecture
Chapter 9. Screened subnet architecture
Chapter 10. Branch office VPN gateway to corporate office
Chapter 11. Network security in an ASP environment
Chapter 12. Remote access with Windows 2000 VPN clients
Appendix A. Services, ports, and master filter files
Appendix B. FTP exit examples