Skip to main content

Additional AIX Security Tools on IBM eServer pSeries, IBM RS/6000, and SP/Cluster

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 21 December 2000, updated 19 January 2001

  1. .PDF (2.7 MB)

 Order hardcopy
Share this page:   

ISBN-10: 0738418382
ISBN-13: 9780738418384
IBM Form #: SG24-5971-00


Authors: Abbas Farazdel, Marc Genty, Bruno Kerouanton and Chune Keat Khor

menu icon

Abstract

From firewalls to operating system hardening, this IBM Redbooks publication illustrates additional tools and techniques that you can use to enhance the security environment of your IBM eServer pSeries, IBM RS/6000 workstation, SP, or Cluster. The approach taken is from outside to inside and from top to bottom. We move from the servers on the far reaches of your network that are visible to the outside world to those in the innermost recesses of your intranet containing your most confidential data. As we move through these servers, we work from the application layer at the top to the network layer at the bottom. Along the way, we cover third-party software that is readily available, modifications to the standard software that comes with AIX and PSSP, and assorted techniques that can all be used to provide enhanced security in your environment.

Subjects covered in this book include:

- Firewalls

- Secure Remote Access

- Network Mapping and Port Scanning

- System Integrity

- Securing AIX

Table of Contents

Chapter 1. Introduction

Chapter 2. Firewalls

Chapter 3. Check Point FireWall-1

Chapter 4. IBM Secureway Firewall

Chapter 5. Secure remote access

Chapter 6. Port and network scanning

Chapter 7. System and data integrity

Chapter 8. Securing AIX

 

Others who read this also read