132 lines
9.6 KiB
HTML
132 lines
9.6 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE html
|
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html lang="en-us" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow" />
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<meta name="DC.Type" content="concept" />
|
|
<meta name="DC.Title" content="iSeries and Internet security considerations" />
|
|
<meta name="abstract" content="As an iSeries owner exploring options for connecting your systems to the Internet, one of the first questions you will typically ask is, "How do I begin to use the Internet for business purposes?" The second question is, "What should I know about security and the Internet?" The focus of this material is to help you to answer this second question." />
|
|
<meta name="description" content="As an iSeries owner exploring options for connecting your systems to the Internet, one of the first questions you will typically ask is, "How do I begin to use the Internet for business purposes?" The second question is, "What should I know about security and the Internet?" The focus of this material is to help you to answer this second question." />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaj4secoverview.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzaj40j0securitypolco.htm" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 1999, 2006" />
|
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1999, 2006" />
|
|
<meta name="DC.Format" content="XHTML" />
|
|
<meta name="DC.Identifier" content="rzaj45asecureway" />
|
|
<meta name="DC.Language" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|
<title>iSeries and
|
|
Internet security considerations</title>
|
|
</head>
|
|
<body id="rzaj45asecureway"><a name="rzaj45asecureway"><!-- --></a>
|
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|
<h1 class="topictitle1">iSeries and
|
|
Internet security considerations</h1>
|
|
<div><p><span><img src="./delta.gif" alt="Start of change" />As an iSeries™ owner
|
|
exploring options for connecting your systems to the Internet, one of the
|
|
first questions you will typically ask is, "How do I begin to use the Internet
|
|
for business purposes?" The second question is, "What should I know about
|
|
security and the Internet?" The focus of this material is to help you to
|
|
answer this second question.<img src="./deltaend.gif" alt="End of change" /></span></p>
|
|
<p><img src="./delta.gif" alt="Start of change" />The answer to the question, "What should I know about security
|
|
and the Internet?" is that it depends on how you want to use the Internet.
|
|
Security issues related to the Internet are significant. Which issues you
|
|
need to discuss are based on how you plan to use the Internet. Your first
|
|
venture into the Internet might be to provide your internal network users
|
|
with access to the web and Internet e-mail. You may also want the ability
|
|
to transfer sensitive information from one site to another. Eventually, you
|
|
may plan to use the Internet for e-commerce or to create an extranet between
|
|
your company and your business partners and suppliers.<img src="./deltaend.gif" alt="End of change" /></p>
|
|
<p>Before you get involved with the Internet, you
|
|
should think through what you want to do and how you want to do it. Making
|
|
decisions about both Internet usage and Internet security can be complex.
|
|
You may find it helpful to review the page, <a href="rzaj45lbasiccorpusage.htm#rzaj45lbasiccorpusage">Scenario:
|
|
JKL Toy Company e-business plans</a>, as you develop your own Internet
|
|
usage plan. (Note: If you are unfamiliar with security and Internet-related
|
|
terms, you can review common <a href="rzalxsecterms.htm">Security terminology</a> as
|
|
you work through this material.)</p>
|
|
<p>Once you understand how you want to use the Internet for e-business, as
|
|
well as the security issues and the available security tools, functions, and
|
|
offerings, you can develop a security policy and objectives. A number of
|
|
factors will affect the choices that you make in developing your security
|
|
policy. When you extend your organization onto the Internet, your security
|
|
policy is the critical cornerstone for ensuring that your systems and resources
|
|
are secure.</p>
|
|
<div class="section"><h4 class="sectiontitle">iSeries server
|
|
system security characteristics</h4><p><img src="./delta.gif" alt="Start of change" />In addition to a number
|
|
of specific security offerings for protecting your system on the Internet,
|
|
the iSeries server
|
|
has very strong system security characteristics, such as the following:<img src="./deltaend.gif" alt="End of change" /></p>
|
|
<ul><li>Integrated security which is extremely difficult to circumvent compared
|
|
to add-on security software packages offered on other systems.</li>
|
|
<li>Object-based architecture which makes it technically difficult to create
|
|
and spread a virus. On an iSeries server, a file cannot pretend to be a program,
|
|
nor can a program change another program. iSeries integrity features require you
|
|
to use system-provided interfaces to access objects. You cannot access an
|
|
object directly by its address in the system. You cannot take an offset and
|
|
turn it into, or "manufacture," a pointer. Pointer manipulation is a popular
|
|
technique for hackers on other system architectures.</li>
|
|
<li>Flexibility which lets you set up your system security to meet your specific
|
|
requirements. You can use the <img src="eserver.gif" alt="e(logo) server" /> <a href="../icbase/secplanr/securwiz.htm" target="_blank">Security Planner</a><img src="www.gif" alt="Link outside Information Center." /> to
|
|
help you determine which security recommendations fit your security needs.</li>
|
|
</ul>
|
|
</div>
|
|
<div class="section"><h4 class="sectiontitle">iSeries advanced
|
|
security offerings</h4><p>iSeries also offers several specific security offerings
|
|
that you can use to enhance your system security when you connect to the Internet.
|
|
Depending on how you use the Internet, you may want to take advantage of one
|
|
or more of these offerings: </p>
|
|
<ul><li><a href="rzaj45zxaddingvpn.htm#rzaj45zxaddingvpn">Virtual Private
|
|
Networks</a> (VPNs) are an extension of an enterprise's private intranet
|
|
across a public network, such as the Internet. You can use a VPN to create
|
|
a secure private connection, essentially by creating a private "tunnel" over
|
|
a public network. VPN is an integrated feature of i5/OS™ available from the iSeries Navigator
|
|
interface. </li>
|
|
<li><a href="../rzajb/rzajbrzajb0ippacketsecuritysd.htm">Packet rules</a> is an integrated feature of i5/OS available
|
|
from iSeries Navigator.
|
|
This feature allows you to configure IP packet filter and network address
|
|
translation (NAT) rules to control the flow of TCP/IP traffic into and out
|
|
of your iSeries server. </li>
|
|
<li><a href="../rzain/rzainoverview.htm">Secure
|
|
Sockets Layer (SSL) application communications security</a> allows you
|
|
to configure applications to use SSL to establish secure connections between
|
|
server applications and their clients. SSL was originally developed for secure
|
|
web browser and server applications, but other applications can be enabled
|
|
to use it. Many iSeries server
|
|
applications are now enabled for SSL, including the IBM<sup>®</sup> HTTP Server for iSeries, iSeries Access Express, File Transfer
|
|
Protocol (FTP), Telnet, and many others. </li>
|
|
</ul>
|
|
<p>Once you understand how you want to use the Internet, as well as the
|
|
security issues and the available security tools, functions, and offerings,
|
|
you are ready to develop a security policy and objectives. A number of factors
|
|
will affect the choices that you make in developing your security policy.
|
|
When you extend your organization onto the Internet, a security policy provides
|
|
a critical cornerstone for making your system secure. </p>
|
|
<div class="note"><span class="notetitle">Note:</span> <img src="./delta.gif" alt="Start of change" />To find more detailed information about how to begin using the
|
|
Internet for business purposes, review these online <span class="keyword"><img src="./delta.gif" alt="Start of change" />IBM Systems Software Information Center<img src="./deltaend.gif" alt="End of change" /></span> topics and IBM redbooks: <ul><li><a href="../rzai1/rzai1000.htm"><em>Connecting
|
|
to the Internet</em></a></li>
|
|
<li><a href="http://www.redbooks.ibm.com/pubs/pdfs/redbooks/sg244929.pdf" target="_blank"><em>AS/400<sup>®</sup> Internet Security: Protecting Your AS/400 from
|
|
HARM on the Internet</em> (SG24-4929)</a>.<img src="rbpdf.gif" alt="Link to PDF." /></li>
|
|
</ul>
|
|
<img src="./deltaend.gif" alt="End of change" /></div>
|
|
</div>
|
|
</div>
|
|
<div>
|
|
<div class="familylinks">
|
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzaj4secoverview.htm" title="Accessing the Internet from your LAN is a major step in the evolution of your network that will require you to reassess your security requirements.">iSeries and Internet security</a></div>
|
|
</div>
|
|
<div class="relconcepts"><strong>Related concepts</strong><br />
|
|
<div><a href="rzaj40j0securitypolco.htm" title="Defining what to protect and what to expect of users.">Security policy and objectives</a></div>
|
|
</div>
|
|
</div>
|
|
</body>
|
|
</html> |