ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzam5_5.4.0.1/rzam5firewall.htm

55 lines
3.4 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Configure your firewall" />
<meta name="abstract" content="Determine if you need to modify your firewall to gain access to systems from a wireless device." />
<meta name="description" content="Determine if you need to modify your firewall to gain access to systems from a wireless device." />
<meta name="DC.Relation" scheme="URI" content="rzam5configure.htm" />
<meta name="DC.Relation" scheme="URI" content="http://www.redbooks.ibm.com/abstracts/sg245954.html" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2005, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2005, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzam5firewall" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Configure your firewall</title>
</head>
<body id="rzam5firewall"><a name="rzam5firewall"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Configure your firewall</h1>
<div><p>Determine if you need to modify your firewall to gain access to
systems from a wireless device.</p>
<p>When you use iSeries™ Navigator
for Wireless, you will be accessing at least one of your systems from the
Internet. If you access any of your systems from the Internet today, you probably
have a firewall set up to prevent unauthorized access. Depending on your firewall
configuration, you may have to modify your firewall setup to run iSeries Navigator
for Wireless.</p>
<p>If you have never accessed your systems from the Internet and do not have
a firewall set up, the following IBM<sup>®</sup> Redbook provides strategies for doing
so in the chapters about screened host architecture and screened subnet architecture.
See AS/400<sup>®</sup> Internet
Security Scenarios: A Practical Approach<sup>®</sup>.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzam5configure.htm" title="Modify your web application server and firewall configuration so that iSeries Navigator for Wireless will run properly.">Configure your wireless environment</a></div>
</div>
<div class="relinfo"><strong>Related information</strong><br />
<div><a href="http://www.redbooks.ibm.com/abstracts/sg245954.html" target="_blank">AS/400 Internet Security Scenarios: A Practical Approach</a></div>
</div>
</div>
</body>
</html>