94 lines
6.3 KiB
HTML
94 lines
6.3 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
||
|
<!DOCTYPE html
|
||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
|
<html lang="en-us" xml:lang="en-us">
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
|
<meta name="security" content="public" />
|
||
|
<meta name="Robots" content="index,follow" />
|
||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
|
<meta name="DC.Type" content="topic" />
|
||
|
<meta name="DC.Title" content="iSeries and Internet security" />
|
||
|
<meta name="abstract" content="Accessing the Internet from your LAN is a major step in the evolution of your network that will require you to reassess your security requirements." />
|
||
|
<meta name="description" content="Accessing the Internet from your LAN is a major step in the evolution of your network that will require you to reassess your security requirements." />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzaj4pntprint.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzaj45asecureway.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzaj45zssecurityplanning.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzaj4securityreadiness.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzaj45zgiptraffic.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzaj45zrscenario1risks.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzaj45zhcryptointro.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzalxsecterms.htm" />
|
||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 1999, 2006" />
|
||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1999, 2006" />
|
||
|
<meta name="DC.Format" content="XHTML" />
|
||
|
<meta name="DC.Identifier" content="secoverview" />
|
||
|
<meta name="DC.Language" content="en-us" />
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
|
<title>iSeries and
|
||
|
Internet security</title>
|
||
|
</head>
|
||
|
<body id="secoverview"><a name="secoverview"><!-- --></a>
|
||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
|
<h1 class="topictitle1">iSeries and
|
||
|
Internet security</h1>
|
||
|
<div><p>Accessing the Internet from your LAN is a major step in the evolution
|
||
|
of your network that will require you to reassess your security requirements.</p>
|
||
|
<p><img src="./delta.gif" alt="Start of change" />Fortunately, your IBM<sup>®</sup> <img src="eserver.gif" alt="eServer" /> iSeries™ server
|
||
|
has integrated software solutions and security architecture to let you build
|
||
|
a strong defense against potential Internet security pitfalls and intruders.
|
||
|
Properly using these iSeries security offerings ensures that your customers,
|
||
|
employees, and business partners can obtain the information they need to
|
||
|
do business with you in a secure environment.<img src="./deltaend.gif" alt="End of change" /></p>
|
||
|
<p><img src="./delta.gif" alt="Start of change" />You can use the information that you find here to educate
|
||
|
yourself about well-known security threats and how these risks relate to your
|
||
|
Internet and e-business goals. Also, you will learn how to assess the risks
|
||
|
versus the benefits of using the various security options that iSeries provides
|
||
|
for dealing with these risks. And finally, you can determine how you can use
|
||
|
this information to develop a network security plan that fits your business
|
||
|
needs.<img src="./deltaend.gif" alt="End of change" /></p>
|
||
|
</div>
|
||
|
<div>
|
||
|
<ul class="ullinks">
|
||
|
<li class="ulchildlink"><strong><a href="rzaj4pntprint.htm">Printable PDF</a></strong><br />
|
||
|
Use this to view and print a PDF of this information.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzaj45asecureway.htm">iSeries and Internet security considerations</a></strong><br />
|
||
|
<span><img src="./delta.gif" alt="Start of change" />As an iSeries owner
|
||
|
exploring options for connecting your systems to the Internet, one of the
|
||
|
first questions you will typically ask is, "How do I begin to use the Internet
|
||
|
for business purposes?" The second question is, "What should I know about
|
||
|
security and the Internet?" The focus of this material is to help you to
|
||
|
answer this second question.<img src="./deltaend.gif" alt="End of change" /></span></li>
|
||
|
<li class="ulchildlink"><strong><a href="rzaj45zssecurityplanning.htm">Planning Internet security</a></strong><br />
|
||
|
<span>Use this information to gain a general
|
||
|
understanding of the strengths of iSeries security for e-business and the iSeries security
|
||
|
offerings available to you.</span></li>
|
||
|
<li class="ulchildlink"><strong><a href="rzaj4securityreadiness.htm">Security levels for basic Internet readiness</a></strong><br />
|
||
|
<span>Use
|
||
|
this information to learn what system security you should have in place before
|
||
|
you connect to the Internet.</span></li>
|
||
|
<li class="ulchildlink"><strong><a href="rzaj45zgiptraffic.htm">Network security options</a></strong><br />
|
||
|
<span>Use this information to learn about
|
||
|
the network level security measures that you should consider using to protect
|
||
|
your internal resources.</span></li>
|
||
|
<li class="ulchildlink"><strong><a href="rzaj45zrscenario1risks.htm">Application security options</a></strong><br />
|
||
|
<span>Use this information to learn about
|
||
|
common Internet security risks for a number of popular Internet applications
|
||
|
and services and measures that you can take to manage these risks.</span></li>
|
||
|
<li class="ulchildlink"><strong><a href="rzaj45zhcryptointro.htm">Transmission security options</a></strong><br />
|
||
|
<span>Use this information to learn about
|
||
|
the security measures that you can use to protect your data as it flows across
|
||
|
an untrusted network, such as the Internet. Learn more about security measures
|
||
|
for using the Secure Sockets Layer (SSL), iSeries Access Express, and Virtual Private
|
||
|
Network (VPN) connections.</span></li>
|
||
|
<li class="ulchildlink"><strong><a href="rzalxsecterms.htm">Security terminology</a></strong><br />
|
||
|
This topic includes terms and definitions related to security information.</li>
|
||
|
</ul>
|
||
|
</div>
|
||
|
</body>
|
||
|
</html>
|