AIX 5L version 5.2 security supplement

This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product documentation, particularly "AIX 5L Version 5.2 Security Guide", SC23-4860. This book provides additional detailed information about virtual private networks (VPN), Kerberos security and the use of s...

Descripción completa

Detalles Bibliográficos
Autor principal: Tuttle, Steven (-)
Otros Autores: Pizano, Gabriel, Smith, Chris
Formato: Libro electrónico
Idioma:Inglés
Publicado: Austin, TX : IBM Corp., International Technical Support Organization c2003.
Colección:IBM redbooks.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627078206719
Tabla de Contenidos:
  • Front cover
  • Contents
  • Notices
  • Trademarks
  • Preface
  • The team that wrote this redbook
  • Become a published author
  • Comments welcome
  • Chapter 1. AIX security flashes
  • 1.1 Recommended reading
  • 1.2 Security flash information by e-mail
  • 1.3 Obtaining fixes
  • Chapter 2. Virtual private networks
  • 2.1 Architecture
  • 2.2 Security
  • 2.2.1 Transport mode
  • 2.2.2 Tunnel mode
  • 2.2.3 Security parameter index
  • 2.2.4 Security associations
  • 2.2.5 Filter rules
  • 2.2.6 Encapsulating Security Payloads
  • 2.2.7 Authentication Header
  • 2.2.8 Key management
  • 2.2.9 Security features
  • 2.3 Installing IPSec
  • 2.3.1 Installing the IP Security feature
  • 2.3.2 Enabling IPSec offload
  • 2.3.3 Starting IP Security
  • 2.3.4 Installation Verification Procedure
  • 2.4 Using administration interfaces
  • 2.4.1 Starting IPSec
  • 2.4.2 Stopping IPSec
  • 2.4.3 IKE tunnels using SMIT
  • 2.4.4 IKE tunnels using Web-based System Manager
  • 2.4.5 Using certificates
  • 2.4.6 Manual tunnels using the System Management Interface Tool
  • 2.4.7 Filtering through the System Management Interface Tool
  • 2.5 Functionality
  • 2.5.1 Scenario I
  • 2.5.2 Scenario II
  • 2.5.3 Scenario III
  • 2.5.4 Scenario IV
  • 2.5.5 Scenario V
  • 2.5.6 Scenario VI
  • 2.6 Differences and limitations
  • 2.7 Event and alert management
  • 2.8 Common problems and solutions
  • 2.8.1 Activation failure of the tunnel
  • 2.8.2 Pinging from a non-secure machine to a secured machine hangs
  • 2.8.3 Cannot ping from a secured machine to a non-secure machine
  • 2.8.4 Network address translation doesn't work in IPSec environments
  • 2.8.5 Firewall doesn't work in IPSec environments
  • 2.8.6 Cannot connect two machines where tunnels used to be active
  • 2.8.7 Both tunnels activated but there is no active/negotiating in the IKE tunnel monitor.
  • 2.8.8 Can no longer connect from a non-secure machine to a secure machine with the tunnel active
  • 2.8.9 IP security started but IKE command does not work
  • 2.8.10 isakmpd is not running
  • 2.8.11 The IKE subsystem group is inoperative
  • 2.8.12 Tunnels are in a dormant state after running ike cmd=activate
  • 2.8.13 Editing tunnel information with Web-based System Manager panels differs from ike cmd=list db verbose
  • 2.8.14 Cannot activate a tunnel because the remote ID is invalid
  • 2.8.15 General procedure to obtain the cause of problems
  • Chapter 3. Exploiting Network Authentication Service
  • 3.1 Architecture
  • 3.1.1 Recommended reading
  • 3.1.2 Ease-of-use example
  • 3.2 Security
  • 3.3 Installation example
  • 3.3.1 Planning
  • 3.3.2 Installation
  • 3.3.3 Configuring the server
  • 3.3.4 Configuring the client
  • 3.3.5 Creating the keytab file
  • 3.3.6 Kerberos administration
  • 3.3.7 Changing authentication methods to allow Kerberos
  • 3.3.8 Obtaining Kerberos authentication for administration
  • 3.3.9 Creating a test user
  • 3.3.10 Testing the user and services
  • 3.3.11 Configuring another client system
  • 3.3.12 Testing the user and services on the new host
  • 3.4 Administration
  • 3.4.1 AIX
  • 3.4.2 Network Authentication Service
  • 3.5 Functions
  • 3.5.1 Integrated login
  • 3.5.2 Secure remote commands
  • 3.5.3 User management commands
  • 3.6 Differences and limitations
  • 3.7 Event and alert management
  • 3.8 Common problems and solutions
  • 3.8.1 Checklist
  • 3.8.2 Logs
  • 3.8.3 Typical problems
  • Chapter 4. Pluggable Authentication Module
  • 4.1 Architecture
  • 4.1.1 PAM library
  • 4.1.2 PAM modules
  • 4.1.3 PAM configuration file
  • 4.1.4 Recommended reading
  • 4.2 Security
  • 4.2.1 Security issues
  • 4.3 Installing and configuring PAM
  • 4.3.1 Installing PAM for AIX (pam_aix)
  • 4.3.2 Installing PAM for LDAP (pam_ldap).
  • 4.4 Common problems and solutions
  • 4.4.1 Enabling PAM debug
  • Chapter 5. Restricting users
  • 5.1 Restricted shells
  • 5.1.1 Recommended reading
  • 5.1.2 Configuring the system and creating a restricted shell user
  • 5.2 User limits for a system resource
  • 5.2.1 Architecture
  • 5.2.2 Security
  • 5.2.3 Resources
  • 5.2.4 Administration
  • 5.3 User login controls
  • 5.3.1 Setting up login controls
  • 5.3.2 Changing the welcome message on the login display
  • 5.3.3 Changing the login display for the CDE
  • 5.3.4 Securing unattended terminals
  • 5.3.5 Enforcing automatic logoff
  • 5.4 Preventing denial-of-service attacks
  • Appendix A. AIX Security Planning and Implementation Worksheet
  • Abbreviations and acronyms
  • Related publications
  • IBM Redbooks
  • Other publications
  • Online resources
  • How to get IBM Redbooks
  • Help from IBM
  • Index
  • Back cover.