Skip to main content

IBM i5/OS Network Security Scenarios A Practical Approach

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 11 December 2007

  1. .PDF (9.4 MB)

 Order hardcopy
Share this page:   

ISBN-10: 0738488992
ISBN-13: 9780738488998
IBM Form #: SG24-7374-00


Authors: Yessong Johng, Thomas Barlen, Barbara Barlocco, Fernando Hurtado and Craig Jacquez

    menu icon

    Abstract

    This IBM® Redbooks publication provides specific setup information for various scenarios of Internet security. Assuming readers have knowledge of the theories and conceptual parts of the related topics, this book aims to assist i5/OS network security administrators who need to set up any of the scenarios listed in the Table of Contents. Each scenario is a separate chapter.

    Table of Contents

    Chapter 1. i5/OS IP packet filtering

    Chapter 2. Building a DMZ with i5/OS

    Chapter 3. VPN connection with UDP encapsulation

    Chapter 4. VPN tunnel between Linux and i5/OS

    Chapter 5. VPN connection with Windows XP clients

    Chapter 6. Password elimination using Windows 2003 KDC

    Chapter 7. Securing Telnet for iSeries Access using SSL

    Chapter 8. Securing FTP using SSL

    Chapter 9. Introduction to OpenSSH for i5/OS

    Chapter 10. Setting up and running the sshd daemon

    Chapter 11. Establishing an SSH session

    Chapter 12. Using file transfer and public key authentication with OpenSSH

    Chapter 13. Protecting traffic with SSH tunnels

    Chapter 14. Using SSH to control your HMC

     

    Others who read this also read