My Account Log in

2 options

Security / Adolfo Rodriguez ... [et al.].

Ebook Central Academic Complete Available online

Ebook Central Academic Complete

Ebook Central College Complete Available online

Ebook Central College Complete
Format:
Book
Contributor:
Rodriguez, Adolfo.
International Business Machines Corporation. International Technical Support Organization.
Series:
IBM redbooks.
IBM redbooks
Communications server for z/OS V1R2 TCP/IP implementation guide ; 7
Language:
English
Subjects (All):
Client/server computing.
Communications software.
TCP/IP (Computer network protocol).
z/OS.
Physical Description:
xiv, 454 p. : ill.
Edition:
4th ed.
Place of Publication:
Research Triangle Park, NC : IBM corporation, 2002.
Language Note:
English
Contents:
Front cover
Contents
Notices
Trademarks
Preface
The team that wrote this redbook
Comments welcome
Part 1 Introduction
Chapter 1. Security in a networked world
1.1 Evolution of networking
1.2 Potential problems with electronic message exchange
1.2.1 The request is not really from your customer
1.2.2 The order could have been intercepted and read
1.2.3 The order could have been intercepted and altered
1.2.4 An order is received from your customer, but he denies sending it
Chapter 2. Basic cryptography
2.1 Secret key cryptography
2.2 Public key cryptography
2.2.1 Encryption
2.2.2 Authentication
2.2.3 Public key algorithms
2.2.4 Digital certificates
2.3 Performance issues of cryptosystems
2.4 Message integrity
2.4.1 Message digest (or "hash")
2.4.2 Message authentication codes (MAC)
2.4.3 Digital signatures
Part 2 Securing z/OS with RACF
Chapter 3. UNIX System Services security
3.1 z/OS Security Server (RACF)
3.1.1 Identification and authentication
3.1.2 Alternatives to passwords
3.1.3 Checking authorization
3.1.4 Logging and reporting
3.1.5 RACF and z/OS UNIX System Services
3.2 Security in UNIX systems
3.2.1 Traditional UNIX security mechanisms
3.3 z/OS UNIX System Services security
3.3.1 UNIX level security
3.3.2 z/OS UNIX System Services level security
3.3.3 Why is z/OS UNIX System Services a more secure UNIX?
3.3.4 Access permission to HFS files and directories
3.3.5 Displaying files and directories
3.3.6 UID/GID assignment to a process
3.3.7 Defining UNIX System Services users
3.3.8 Default user
3.3.9 Superuser
3.3.10 Started task user IDs
3.3.11 FACILITY class profile BPX.SUPERUSER
3.3.12 FACILITY class profile BPX.DAEMON
3.3.13 Additional BPX.* FACILITY class profiles.
3.3.14 Programs in the Hierarchical File System
3.3.15 z/OS UNIX kernel address space
3.3.16 z/OS UNIX security considerations for TCP/IP
3.3.17 IBM-supplied daemons
3.3.18 MVS sockets server applications
3.3.19 Summary
Chapter 4. TCP/IP stack resource access
4.1 TCP/IP stack access control
4.1.1 Stack Access overview
4.1.2 Example setup
4.1.3 Transport/stack affinity
4.2 Network access control
4.2.1 Network access control overview
4.2.2 Server considerations
4.2.3 Using NETSTAT for Network Access control
4.2.4 Working example of Network Access control
4.3 Port Access control
4.3.1 The PORT/PORTRANGE SAF keyword
4.3.2 SAF keyword on FTP or any other well-known PORTs
4.3.3 Using NETSTAT to display Port Access control
4.3.4 Scenarios using port access control
Chapter 5. Operations and administration security
5.1 z/OS VARY TCPIP command security
5.1.1 RACF profile details
5.1.2 VARY TCPIP command security scenario
5.2 TSO NETSTAT and UNIX onetstat command security
5.2.1 RACF profile details
5.2.2 NETSTAT security scenario
5.2.3 Further reading
Part 3 Network security
Chapter 6. Firewall concepts
6.1 General guidelines for implementing firewalls
6.2 Firewall categories
6.2.1 Packet filtering
6.2.2 Application-level gateway
6.3 z/OS Firewall Technologies
6.4 The demilitarized zone
Chapter 7. IPSec and virtual private networks (VPN)
7.1 IPSec
7.1.1 Security Associations
7.1.2 Transmitting data with IPSec
Chapter 8. Implementing IPSec with z/OS Firewall Technologies
8.1 Introduction
8.2 Firewall enhancements
8.3 Installation planning
8.4 Installation, configuration and operation
8.5 Interoperability considerations
8.6 Sample configuration files
8.7 RACF considerations
8.7.1 Configuring TCP/IP on the firewall host.
8.8 Configuring and using the configuration server and client (GUI)
8.8.1 Simple configuration scenario
8.8.2 Configuring SSL
8.8.3 Configuring the configuration server (CFGSRV)
8.8.4 Setting up the configuration client on Windows
8.8.5 Accessing the configuration client (GUI)
8.8.6 Tunnel definition
8.8.7 FWTUNNL export file conversion from z/OS and AIX
8.8.8 On-demand dynamic tunnels scenario
Part 4 Application security
Chapter 9. Tools for application security
9.1 Secure Sockets Layer (SSL)
9.1.1 SSL protocol description
9.1.2 Certificates for SSL
9.1.3 System SSL
9.2 TLS protocol
9.3 Kerberos-based security system
9.3.1 Kerberos protocol overview
9.3.2 Inter-realm operation
9.3.3 Some assumptions
9.3.4 Kerberos implementation in z/OS
Chapter 10. Certificate management in z/OS
10.1 Digital certificates in z/OS
10.2 Digital certificate field formats
10.3 RACF RACDCERT command use
10.4 RACF keyrings
10.4.1 RACDCERT command security
10.4.2 RACDCERT command format
10.5 gskkyman command use
10.6 Client certificates
10.7 Server certificates
10.8 Self-signed certificates
10.9 Obtaining certificates
10.9.1 Self-signed certificates
10.9.2 Internal Certificate Authority (CA)
10.9.3 External Certificate Authority (CA)
10.10 Certificate locations example
10.10.1 RACF certificates
10.10.2 gskkyman HFS certificates
Chapter 11. File-related applications
11.1 z/OS FTP server
11.1.1 FTP using Transport Layer Security(TLS)
11.1.2 TLS/SSL scenarios
11.1.3 FTP using Kerberos
11.1.4 FTP and Kerberos scenario
11.2 z/OS TFTP server
11.3 z/OS NFS server
11.3.1 z/OS NFS security levels
11.3.2 Security information exchange between NFS client and server
11.3.3 Access to the HFS
11.3.4 Conclusion
Chapter 12. TN3270 security.
12.1 TN3270 SSL
12.1.1 TN3270 configuration parameters for SSL
12.1.2 Client authentication
12.1.3 TN3270 server SSL configuration scenarios
12.2 Negotiated Telnet security
12.2.1 TN3270 server parameters for negotiated security
12.2.2 TN3270 server configuration scenario
12.2.3 TN3270 client (HOD) negotiated Telnet configuration scenario
12.3 Express Logon Feature (ELF)
12.3.1 Two-tier network design
12.3.2 Three-tier network design
12.3.3 Implementing ELF in a two-tier design
12.3.4 Implementing ELF in a three-tier design
Chapter 13. UNIX remote execution applications
13.1 UNIX Telnet server security
13.1.1 Kerberized UNIX Telnet server support
13.2 UNIX System Services rlogind/rshd/rexecd
13.3 z/OS UNIX rshd Kerberos support
13.3.1 Implementing Kerberos on orshd
Chapter 14. OMPRoute security
14.1 OSPF route update messages security
14.2 OMPRoute configuration
14.2.1 The Area configuration statement
14.2.2 The OSPF_Interface configuration statement
Chapter 15. Network management applications
15.1 z/OS SNMP
15.1.1 SNMP security
15.2 z/OS Policy Agent
15.2.1 SSL with LDAP and Policy Agent
15.2.2 Considerations when opening an SSL connection
Chapter 16. HTTP Server for z/OS
16.1 HTTP Server security
16.2 Server security structure
16.3 Setting up SAF control
16.4 How to protect resources
16.4.1 Access control directives
16.4.2 Protection directives
16.5 Accessing back-end applications
16.6 SSL-related features in the IBM HTTP Server for z/OS
16.6.1 Encryption support
16.6.2 Global Server IDs
16.6.3 Crypto hardware support for SSL
16.7 SSL scenario
16.7.1 Server authentication
16.7.2 Client authentication
16.8 Associating a client certificate with a RACF user ID
16.8.1 RACF digital certificate support.
16.8.2 Install and maintain digital certificates in RACF
16.8.3 Register a certificate using RACDCERT
16.8.4 Certificate self-registration with RACF
16.8.5 Certificate name filtering
16.9 Retrieving LDAP information
16.9.1 Configuring LDAP on IBM HTTP Server
16.9.2 How to use authentication information stored in LDAP
16.9.3 Creating user entries in the z/OS LDAP server
16.10 Conclusion
Chapter 17. Utility applications
17.1 z/OS Lightweight Directory Access Protocol (LDAP)
17.1.1 Authentication with the z/OS LDAP server
17.1.2 Security of the directory
17.1.3 Using SSL communication
17.2 BIND-9 based DNS
17.2.1 TSIG
17.2.2 DNSSEC
17.2.3 Secure your DNS environment
17.3 Syslogd daemon
17.3.1 syslogd isolation
Part 5 Appendixes
Appendix A. VPN planning worksheets
Appendix B. Sample RACF definitions
B.1 RACF settings for UNIX System Services
B.2 RACF settings for TCP/IP applications
B.2.1 RACF configuration for OS/390 UNIX level security
B.2.2 RACF definitions to control the use of the TCP/IP operator commands
B.3 Required RACF definitions to get Firewall Technologies started
B.4 RACF definition to manage certificate in RACF common keyring
Appendix C. Default permissions for HFS files in z/OS UNIX
Appendix D. Digital certificate formats supported by RACDCERT
Related publications
IBM Redbooks
Other resources
Referenced Web sites
How to get IBM Redbooks
IBM Redbooks collections
Index
Back cover.
Notes:
"November 2002."
Includes bibliographical references and index.
OCLC:
842283624

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account