Skip to main content

Additional AIX Security Tools on IBM eServer pSeries, IBM RS/6000, and SP/Cluster

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 21 December 2000, updated 19 January 2001

  1. .PDF (2.7 MB)

 Order hardcopy
Share this page:   

ISBN-10: 0738418382
ISBN-13: 9780738418384
IBM Form #: SG24-5971-00


Authors: Abbas Farazdel, Marc Genty, Bruno Kerouanton and Chune Keat Khor

    menu icon

    Abstract

    From firewalls to operating system hardening, this IBM Redbooks publication illustrates additional tools and techniques that you can use to enhance the security environment of your IBM eServer pSeries, IBM RS/6000 workstation, SP, or Cluster. The approach taken is from outside to inside and from top to bottom. We move from the servers on the far reaches of your network that are visible to the outside world to those in the innermost recesses of your intranet containing your most confidential data. As we move through these servers, we work from the application layer at the top to the network layer at the bottom. Along the way, we cover third-party software that is readily available, modifications to the standard software that comes with AIX and PSSP, and assorted techniques that can all be used to provide enhanced security in your environment.

    Subjects covered in this book include:

    - Firewalls

    - Secure Remote Access

    - Network Mapping and Port Scanning

    - System Integrity

    - Securing AIX

    Table of Contents

    Chapter 1. Introduction

    Chapter 2. Firewalls

    Chapter 3. Check Point FireWall-1

    Chapter 4. IBM Secureway Firewall

    Chapter 5. Secure remote access

    Chapter 6. Port and network scanning

    Chapter 7. System and data integrity

    Chapter 8. Securing AIX

     

    Others who read this also read