ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzahq_5.4.0.1/rzahqsecconsec.htm

46 lines
2.9 KiB
HTML

<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="dc.language" scheme="rfc1766" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<meta name="dc.date" scheme="iso8601" content="2005-09-13" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow"/>
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<title>Connection security configuration</title>
<link rel="stylesheet" type="text/css" href="ibmidwb.css" />
<link rel="stylesheet" type="text/css" href="ic.css" />
</head>
<body>
<a id="Top_Of_Page" name="Top_Of_Page"></a><!-- Java sync-link -->
<script language = "Javascript" src = "../rzahg/synch.js" type="text/javascript"></script>
<img src="delta.gif" alt="Start of change" />
<a name="rzahqsecconsec"></a>
<h4 id="rzahqsecconsec">Connection security configuration</h4>
<p>The connection security network server configuration (NWSCFG type CNNSEC)
object shown in <a href="rzahqiscsiattachedwsec.htm#rzahqkcwsec">Figure 16</a> is used to secure the SCSI and
virtual Ethernet data flows between i5/OS&trade; and the iSCSI attached xSeries&reg; or IBM&reg; BladeCenter&trade; server:</p>
<ul>
<li>It identifies a set of IP security (IPSec) rules that are used with the
various storage and virtual Ethernet connections.</li>
<li>You can decide which data flows are secured and which data flows are not
secured. You can choose to secure none, some, or all of the storage or virtual
Ethernet connections. For example, you can choose to secure just the storage
(SCSI) data flows or just one of the virtual Ethernet connections.</li>
<li>You identify which SCSI and virtual Ethernet data flows are secured by
specifying the appropriate security rules on the storage paths and virtual
Ethernet paths parameters of the NWSD.</li>
<li>When using IPSec, the SCSI and virtual Ethernet data flows between i5/OS and the iSCSI attached integrated server are encrypted and have an additional
layer of encapsulation (tunneling) within the normal Ethernet network protocols.</li></ul><img src="deltaend.gif" alt="End of change" />
<a id="Bot_Of_Page" name="Bot_Of_Page"></a>
</body>
</html>