61 lines
4.4 KiB
HTML
61 lines
4.4 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
||
|
<!DOCTYPE html
|
||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
|
<html lang="en-us" xml:lang="en-us">
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
|
<meta name="security" content="public" />
|
||
|
<meta name="Robots" content="index,follow" />
|
||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
|
<meta name="DC.Type" content="concept" />
|
||
|
<meta name="DC.Title" content="TCP/IP security components" />
|
||
|
<meta name="abstract" content="You can take advantage of several TCP/IP security components that enhance your network security and add flexibility." />
|
||
|
<meta name="description" content="You can take advantage of several TCP/IP security components that enhance your network security and add flexibility." />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvtcpipplan.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvtcppacketrule.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvtcphttpserver.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvtcpvpn.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvtcpsockets.htm" />
|
||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Format" content="XHTML" />
|
||
|
<meta name="DC.Identifier" content="tcpcomponent" />
|
||
|
<meta name="DC.Language" content="en-us" />
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
|
<title>TCP/IP security components</title>
|
||
|
</head>
|
||
|
<body id="tcpcomponent"><a name="tcpcomponent"><!-- --></a>
|
||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
|
<h1 class="topictitle1">TCP/IP security components</h1>
|
||
|
<div><p>You can take advantage of several TCP/IP security components that enhance your network security and add flexibility.</p>
|
||
|
<p> Though some of these technologies are also found in firewall products, these TCP/IP security components for i5/OS™ are not intended to be used as a firewall. However, you may be able to use some of these features, in some instances to eliminate the need for a separate firewall product. You also may be able to use these TCP/IP features to provide additional security in environments where you already use a firewall.</p>
|
||
|
<div class="p">The following components can be utilized to enhance TCP/IP Security:<ul><li>Packet Rules</li>
|
||
|
<li>HTTP Proxy Server</li>
|
||
|
<li>VPN (virtual private networking)</li>
|
||
|
<li>SSL (secure sockets layer)</li>
|
||
|
</ul>
|
||
|
</div>
|
||
|
</div>
|
||
|
<div>
|
||
|
<ul class="ullinks">
|
||
|
<li class="ulchildlink"><strong><a href="rzamvtcppacketrule.htm">Use packet rules to secure TCP/IP traffic</a></strong><br />
|
||
|
Packet rules, which are the combination of IP filtering and network address translation (NAT), act like a firewall to protect your internal network from intruders.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzamvtcphttpserver.htm">HTTP proxy server</a></strong><br />
|
||
|
The HTTP proxy server comes with the IBM<sup>®</sup> HTTP Server for iSeries™ server.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzamvtcpvpn.htm">Virtual private networking</a></strong><br />
|
||
|
A virtual private network (VPN) allows your company to securely extend its private intranet over the existing framework of a public network, such as the Internet.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzamvtcpsockets.htm">Secure sockets layer</a></strong><br />
|
||
|
Secure Sockets Layer (SSL) has become an industry standard for enabling applications for secure communication sessions over an unprotected network, such as the Internet.</li>
|
||
|
</ul>
|
||
|
|
||
|
<div class="familylinks">
|
||
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvtcpipplan.htm" title="TCP/IP (Transmission Control Protocol/Internet Protocol) is a common way that computers of all types communicate with each other.">Plan TCP/IP security</a></div>
|
||
|
</div>
|
||
|
</div>
|
||
|
</body>
|
||
|
</html>
|