ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzahg_5.4.0.1/rzahgicinet2mans.htm

46 lines
3.3 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Copyright" content="Copyright (c) 2006 by IBM Corporation">
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights - -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<title>Related information</title>
<link rel="stylesheet" type="text/css" href="ic.css">
</head>
<body>
<script type="text/javascript" language="Javascript" src="synch.js"></script>
<h1>Networking:<br>Networking security related information</h1>
<p>IBM<SUP>(R)</SUP> related information contains technical, know-how, and "how-to" information.</p>
<h4>Manuals</h4>
<p style="margin-left:50px;"><a href="rzahgsecref.htm">Security Reference</a><br>This manual provides information about planning, setting up, managing, and auditing security on your server. It describes all the features of security on the server and discusses how security features relate to other aspects of the server, such as work management, backup and recovery, and application design.</P>
<h4>IBM Redbooks</h4>
<ul>
<li><a href="http://www.redbooks.ibm.com/abstracts/sg245659.html" target="_blank">AS/400 Internet Security: Developing a Digital Certificate Infrastructure</a><img src="../images/rbpdf.gif" alt="Link to PDF"><br>This redbook is the first publication that shows in a complete picture how digital certificates can be used for security on the system.</li>
<li><a href="http://www.redbooks.ibm.com/abstracts/sg245404.html" target="_blank">AS/400 Internet Security: Implementing AS/400 Virtual Private Networks</a><img src="../images/rbpdf.gif" alt="Link to PDF"><br>Secure your network with virtual private networks (VPN). This redbook explores VPN concepts and describes its implementation using IP security (IPSec) and Layer 2 Tunneling Protocol (L2TP) on the operating system.</li>
<li><a href="http://www.redbooks.ibm.com/abstracts/sg245954.html" target="_blank">AS/400 Internet Security Scenarios: A Practical Approach</a><img src="../images/rbpdf.gif" alt="Link to PDF"><br>Learn how to exploit your integrated network security functions. This redbook explores the network security features available on the system, such as IP filters, network address translation, virtual private network, HTTP proxy server, secure sockets layer, domain name system, mail relay, auditing, and logging. It describes their use through practical examples.</li>
</ul>
<h4>Saving PDF files</h4>
<p>To save a PDF on your workstation
for viewing or printing:<ol><li>Right-click the PDF in your browser (right-click the link above).</li>
<li>Click the option that saves the PDF locally.</li>
<li>Navigate to the directory in which you want to save the PDF.</li>
<li>Click <span class="uicontrol">Save</span>.</li>
</ol>
<h4>Downloading Adobe Reader</h4>
<p>You need Adobe
Reader installed on your system to view or print these PDFs. You can download
a free copy from the <a href="http://www.adobe.com/products/acrobat/readstep.html" target="_blank">Adobe Web site</a> (www.adobe.com/products/acrobat/readstep.html)<img src="../images/www.gif" alt="Link outside information center">.</p>
</body></html>