IBM Power Systems and AIX give you the means to verify the identities of principals on physically insecure networks. Use IP security to encrypt, authenticate and provide data-integrity checking that enables corporations to leverage the pervasiveness and affordability of the Internet on a global scale.
Virtual private network (VPN)
A virtual private network (VPN) is an extension of an enterprise's private intranet across a public network such at the Internet, creating a secure private connection, essentially through a private tunnel. VPNs securely convey information across the Internet, connecting remote users, branch offices and business partners in an extended corporate network. A VPN provides security through authentication and encryption.
- Internet protocol security and IKE
IP security enables secure communications over the Internet and within company networks by securing data traffic at the IP layer.
- Network filtering
Filter rules can control many aspects of communications, including source and destination addresses and masks, protocol, port number, direction, fragment control, source routing, tunnel and interface type.
Open secure shell (OpenSSH)
Open Secure Shell (OpenSSH) is an open source version of the SSH protocol suite of network connectivity tools. The tools provide shell functions that are authenticated and encrypted. OpenSSH is reliable and secure and is widely accepted in the IT industry.
IBM AIX RADIUS server
Deliver secure network access for your local and remote users with an authentication, authorization, and accounting system designed to provide centralized user authentication. AIX RADIUS server uses the RADIUS protocol and is included with AIX 5L (V5.3).
Kerberos is a network authentication service that provides a means of verifying identities on physically insecure networks. Many AIX applications such as OpenSSH and Fast Connect have been Kerberos enabled.
This guide describes security concerns related to TCP/IP.
Access information about identifying and securing network services with open communication ports.
Public key infastructure (PKI)
Users can be authenticated with a PKI certificate and a password during log-in. PKI certificates are based on public key/private key technology.
Secure remote shell commands
Learn to understand secure remote commands.
Network Information Services (NIS) and NIS+
NIS+ security serves two purposes: authentication to identify NIS+ principals and authorization to specify access rights.