46 lines
2.9 KiB
HTML
46 lines
2.9 KiB
HTML
<?xml version="1.0" encoding="utf-8"?>
|
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
|
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="dc.language" scheme="rfc1766" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<meta name="dc.date" scheme="iso8601" content="2005-09-13" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow"/>
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<title>Connection security configuration</title>
|
|
<link rel="stylesheet" type="text/css" href="ibmidwb.css" />
|
|
<link rel="stylesheet" type="text/css" href="ic.css" />
|
|
</head>
|
|
<body>
|
|
<a id="Top_Of_Page" name="Top_Of_Page"></a><!-- Java sync-link -->
|
|
<script language = "Javascript" src = "../rzahg/synch.js" type="text/javascript"></script>
|
|
|
|
<img src="delta.gif" alt="Start of change" />
|
|
<a name="rzahqsecconsec"></a>
|
|
<h4 id="rzahqsecconsec">Connection security configuration</h4>
|
|
<p>The connection security network server configuration (NWSCFG type CNNSEC)
|
|
object shown in <a href="rzahqiscsiattachedwsec.htm#rzahqkcwsec">Figure 16</a> is used to secure the SCSI and
|
|
virtual Ethernet data flows between i5/OS™ and the iSCSI attached xSeries® or IBM® BladeCenter™ server:</p>
|
|
<ul>
|
|
<li>It identifies a set of IP security (IPSec) rules that are used with the
|
|
various storage and virtual Ethernet connections.</li>
|
|
<li>You can decide which data flows are secured and which data flows are not
|
|
secured. You can choose to secure none, some, or all of the storage or virtual
|
|
Ethernet connections. For example, you can choose to secure just the storage
|
|
(SCSI) data flows or just one of the virtual Ethernet connections.</li>
|
|
<li>You identify which SCSI and virtual Ethernet data flows are secured by
|
|
specifying the appropriate security rules on the storage paths and virtual
|
|
Ethernet paths parameters of the NWSD.</li>
|
|
<li>When using IPSec, the SCSI and virtual Ethernet data flows between i5/OS and the iSCSI attached integrated server are encrypted and have an additional
|
|
layer of encapsulation (tunneling) within the normal Ethernet network protocols.</li></ul><img src="deltaend.gif" alt="End of change" />
|
|
<a id="Bot_Of_Page" name="Bot_Of_Page"></a>
|
|
</body>
|
|
</html>
|