Controlling Host Access

Table of Contents

General Network Security Features
Access Control Features
Users from Remote Hosts
Restriction of Remote Hosts
TCP/IP Network Security Features
TCP/IP Access Control
Identification in a TCP/IP Network
Access to TCP/IP Network Commands
TCP/IP Filtering
Port Filtering
Dynamic Port Filtering
Broadcast Filtering
Enabling Port and Broadcast Filtering
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Secure Shell (SSH)
Web Transaction Server for ClearPath MCP
Telnet
Internet Protocol Security (IPsec)
Client Access Services Network Security Features
Kerberos Security Features
Authentication Support Features
Connectivity Services Security Features
BNA Network Security Features
BNA Access Control Features
Identification in a BNA Network
Access to BNA Network Commands
TCP/IP Filtering
Understanding TCP/IP Security Rules
Evaluating TCP/IP Security Rules
Deny and Allow Rules
Comparing Rules to Determine TCP/IP Request Action
Determining Open Ports on an MCP Server
Building a Rules File with the Security Policy Management Snap-in
Rules File Creation, Test, and Deployment Scenario
Comprehensive Example
Security with Web Transaction Server and WEBPCM
Web Transaction Server
Identifying Users and Allocating Access Rights
Tracking User Access
Restricting and Limiting User Access
Delaying Authentication Responses
Web Transaction Server Administration Security
Detecting User Break-In Attempts
Localizing Security Rules
Data Transparency
TCP/IP Filtering
Digest Authentication Is Unsupported
Using Web Transaction Server Site Manager to Configure Secure Transport
Requesting Client Certificates and Restricting Access
Hiding Server Identity
Use of Web Transaction Server with NTLM and Kerberos
WEBPCM
Identifying Users and Allocating Access Rights
Tracking User Access
Restricting and Limiting User Access
WEBPCM Administration Security
Detecting User Break-In Attempts
Localizing Security Rules
Data Transparency
Digest Authentication Is Unsupported
Use of WEBPCM with NTLM and Kerberos
NXSERVICES CREDENTIALS Files
Extension Kit for MCP Security Overview
Security in the MCP Environment
Extension Kit Security Considerations
Security in the Windows Environment
Security in the Container

When computer systems are linked to form a network, a number of security issues arise that do not apply to isolated systems. This section addresses at a high level the features available for protecting systems linked to other systems in a network and includes the following topics:

  • General network security features

  • TCP/IP network security features

  • Internet Protocol Security (IPsec)

  • Client Access Services network security features

  • Kerberos security features

  • Authentication support features

  • BNA network security features