Book description
For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world’s computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z® provides world class and state-of-the-art support for the TCP/IP Internet protocol suite.
TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer, organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations.
The IBM z/OS® Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication explains how to set up security for the z/OS networking environment. Network security requirements have become more stringent and complex. Because many transactions come from unknown users and untrusted networks, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. We also include helpful tutorial information in the appendixes of this book because security technologies can be quite complex,
For more specific information about z/OS Communications Server base functions, standard applications, and high availability, refer to the other volumes in the series.
Table of contents
- Figures (1/2)
- Figures (2/2)
- Tables
- Examples (1/2)
- Examples (2/2)
- Notices
- Preface
- Part 1: SAF-based security
- Chapter 1: RACF demystified
-
Chapter 2: Protecting network resources
- The SERVAUTH resource class
- Protecting your TCP/IP stack
- Protecting your network access
- Protecting your network ports
- Protecting the use of socket options
- Protecting sensitive network commands
- Protecting FTP
- Protecting network management resources
-
Protecting miscellaneous resources
- Digital Certificate Access Server access control
- MODDVIPA utility program control
- Fast Response Cache Accelerator access control
- Real-time SMF information service access control
- TCP/IP packet trace service access control
- TCP/IP stack initialization access control
- RPCBIND application registration control
- Part 2: Managing security
-
Chapter 3: Certificate management in z/OS
- Digital certificates overview
- Digital certificate types
- Configuring the utilities to generate certificates in z/OS
-
Using certificates in sample IBM environments
- Host On-Demand and certificates
- Shared site certificate and shared key ring
- Self-signed certificates (1/3)
- Self-signed certificates (2/3)
- Self-signed certificates (3/3)
- Internal (local) Certificate Authority
- External (well-known) Certificate Authority (1/3)
- External (well-known) Certificate Authority (2/3)
- External (well-known) Certificate Authority (3/3)
- Part 3: Policy-based networking
- Chapter 4: Policy agent
- Chapter 5: Central Policy Server
- Chapter 6: Quality of Service
-
Chapter 7: IP filtering
- Define IP filtering
-
z/OS IP filtering implementation
- Configuring IPSec statements in the TCP/IP stack profile
- Configuring IP Filtering from IPSec and Pagent
- FTP and Telnet IP filtering scenario (1/2)
- FTP and Telnet IP filtering scenario (2/2)
- Implementation steps for the FTP connectivity rule (1/2)
- Implementation steps for the FTP connectivity rule (2/2)
- Verify the new policies
-
Chapter 8: IP Security
- IPSec description
- Basic concepts
- IPsec support currency
- Working with the z/OS Communications Server Network Management Interface
-
How IPSec is implemented
- Installing the PAGENT
- Setting up the Traffic Regulation Management Daemon
- Updating the TCP/IP stack to activate IPSec
- Restricting the use of the ipsec command
- Installing the IBM Configuration Assistant for z/OS Communications Server
- Description of the IPSec scenarios
- Defining the IPSec policies to PAGENT
- Setting up the IKE daemon (1/2)
- Setting up the IKE daemon (2/2)
- Setting up the system logging daemon (SYSLOGD) to log IKED messages
- Starting the IKE daemon and verifying initialization
- Commands used to administer IP security
- Configuring IPSec between two z/OS systems: Pre-shared Key Mode
- Configuring IPSec between two z/OS systems: RSA signature mode for IKEv1
- Additional information
-
Chapter 9: Network Security Services for IPSec clients
- Basic concepts
-
Configuring NSS for the IPSec discipline
- Overview of preliminary tasks
- NSS client and NSS server
- Preparing for configuration
- Configuring the NSS environment
- Configuring prerequisites for NSS for an IKED Client (1/2)
- Configuring prerequisites for NSS for an IKED Client (2/2)
- Configuring authorizations for NSS (1/2)
- Configuring authorizations for NSS (2/2)
- Configuring the NSS server for an IKED Client (1/2)
- Configuring the NSS server for an IKED Client (2/2)
- Enabling an IKED NSS client to use NSS
- Creating NSS files for an IKED Client with IBM Configuration Assistant (1/7)
- Creating NSS files for an IKED Client with IBM Configuration Assistant (2/7)
- Creating NSS files for an IKED Client with IBM Configuration Assistant (3/7)
- Creating NSS files for an IKED Client with IBM Configuration Assistant (4/7)
- Creating NSS files for an IKED Client with IBM Configuration Assistant (5/7)
- Creating NSS files for an IKED Client with IBM Configuration Assistant (6/7)
- Creating NSS files for an IKED Client with IBM Configuration Assistant (7/7)
- Verifying the NSS environment for the IKED Client
- Diagnosing the NSSD environment
- Worksheet questions for NSSD implementation (IKED Client)
- Additional information
-
Chapter 10: Network Security Services for WebSphere DataPower appliances
- Basic concepts
-
Configuring NSS
- Overview of NSS configuration for an NSS XMLAppliance Client
- Preparing for configuration
- Configuring the NSS environment at z/OS (1/5)
- Configuring the NSS environment at z/OS (2/5)
- Configuring the NSS environment at z/OS (3/5)
- Configuring the NSS environment at z/OS (4/5)
- Configuring the NSS environment at z/OS (5/5)
- Creating NSS Server files for an NSS XMLAppliance Client with IBM Configuration Assistant (1/3)
- Creating NSS Server files for an NSS XMLAppliance Client with IBM Configuration Assistant (2/3)
- Creating NSS Server files for an NSS XMLAppliance Client with IBM Configuration Assistant (3/3)
- Configuring the NSS environment at the WebSphere DataPower SOA Appliance to support the SAF access service (1/7)
- Configuring the NSS environment at the WebSphere DataPower SOA Appliance to support the SAF access service (2/7)
- Configuring the NSS environment at the WebSphere DataPower SOA Appliance to support the SAF access service (3/7)
- Configuring the NSS environment at the WebSphere DataPower SOA Appliance to support the SAF access service (4/7)
- Configuring the NSS environment at the WebSphere DataPower SOA Appliance to support the SAF access service (5/7)
- Configuring the NSS environment at the WebSphere DataPower SOA Appliance to support the SAF access service (6/7)
- Configuring the NSS environment at the WebSphere DataPower SOA Appliance to support the SAF access service (7/7)
- Configuring the NSS environment at the Web Services Requester
- Verifying the NSS configuration with the NSS Client (XML Appliance Discipline)
- Additional information
- NSS configuration worksheet for an NSS XMLAppliance client
- Chapter 11: Network Address Translation traversal support
- Chapter 12: Application Transparent Transport Layer Security
- Chapter 13: Intrusion detection services
- Chapter 14: IP defensive filtering
- Chapter 15: Policy-based routing
- Part 4: Application-based security
- Chapter 16: Telnet security
-
Chapter 17: Secure File Transfer Protocol
- Conceptual overview of FTP security
- FTP client with SOCKS proxy protocol
-
FTP with native TLS security support
- Description of FTP native TLS security
- Configuration of FTP native TLS security (1/2)
- Configuration of FTP native TLS security (2/2)
- Activation and verification of FTP server without security (1/2)
- Activation and verification of FTP server without security (2/2)
- Activation and verification of the FTP server with TLS security: Internet draft protocols (1/3)
- Activation and verification of the FTP server with TLS security: Internet draft protocols (2/3)
- Activation and verification of the FTP server with TLS security: Internet draft protocols (3/3)
- Activation and verification of FTP server with TLS security: RFC4217 protocols (1/2)
- Activation and verification of FTP server with TLS security: RFC4217 protocols (2/2)
- Implicit secure TLS login (1/2)
- Implicit secure TLS login (2/2)
-
FTP with AT-TLS security support
- Description of FTP AT-TLS support
- Configuration of FTP AT-TLS support (1/5)
- Configuration of FTP AT-TLS support (2/5)
- Configuration of FTP AT-TLS support (3/5)
- Configuration of FTP AT-TLS support (4/5)
- Configuration of FTP AT-TLS support (5/5)
- Activation and verification of FTP AT-TLS support (1/2)
- Activation and verification of FTP AT-TLS support (2/2)
- Backing up the backing store file and policies
- Migrating from native FTP TLS to FTP AT-TLS
- FTP TLS and AT-TLS problem determination
- Additional information
- Part 5: Appendixes
- Appendix A: Basic cryptography
- Appendix B: Telnet security advanced settings
- Appendix C: Configuring IPSec between z/OS and Windows
- Appendix D: zIIP Assisted IPSec
- Appendix E: AES-256 and trusted TCP connections
- Appendix F: z/OS Communications Server IPSec RFC currency
- Appendix G: Our implementation environment
- Related publications
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: IBM z/OS V1R12 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
- Author(s):
- Release date: July 2011
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
video
Full Stack Web Development Mastery Course - Novice to Expert
Full stack development refers to the development of both frontend (client-side) and backend (server-side) portions of …
book
Building Microservices, 2nd Edition
As organizations shift from monolithic applications to smaller, self-contained microservices, distributed systems have become more fine-grained. …
book
Sams Teach Yourself C++ in One Hour a Day, 9th Edition
The Ninth Edition of Sams Teach Yourself C++ in One Hour a Day Starting with one …
video
Java SE 17 Developer (1Z0-829)
21+ Hours of Video Instruction An intensive and guided video course to learn and practice while …