Firewall
Upcoming SlideShare
Loading in...5
×
 

Firewall

on

  • 896 views

 

Statistics

Views

Total Views
896
Views on SlideShare
896
Embed Views
0

Actions

Likes
0
Downloads
4
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Firewall Firewall Document Transcript

  • i Security TM Firewall Product Description Clear, easy navigation through Firewall protects and secures all types of access, to and from the hierarchy-based levels provide iSeries, within or outside the organization, under all types of for quick, communication protocols. This robust, cost-effective security streamlined usage solution is by far the most intuitive and easy-to-use security software product on the market today. As part of iSecurity’s Intrusion Detection and Prevention system, Firewall manages user profile status, secures entry via pre-defined entry points, and profiles activity by time. Its “top-down” functional design and intuitive logic creates a work environment that even iSeries novices can master in minutes. Firewall features a user-friendly, Java-based GUI in addition to the traditional green-screen interface. Server-specific configuration settings The Firewall Solution Technological advances of recent years have compelled IBM to Server security protects all open up the iSeries and its OS/400 operating system to the rest of 49 security-related exit points Key Features the world. This new “openness” brought with it many of the security risks inherent in distributed environments. System administrators Firewall Protection need to equip themselves with a new generation of security tools to > Incoming and outgoing TCP/IP address filtering for Internet, combat these evolving threats. Firewall is just such a tool. FTP, REXEC, Telnet, and DHCP It enhances native OS/400 by controlling access via all known > Subnet mask filtering external sources and controlling precisely what users are permitted > Remote system (SNA) firewall protection for DDM, DRDA and to do once access is granted. Passthrough operations > Powerful Intrusion Detection that enables Firewall to trigger Firewall is designed for clarity, simplicity, and ease-of-use. Its proactive responses to the security administrator by MSGQ unique “Best Fit” algorithm saves you precious work time by and email eliminating the need for pre-defined security rule priorities. The > DHCP request packet validation software automatically selects and dynamically applies the most suitable and efficient rules, thereby minimizing throughput delays. User Security In addition, Firewall rule wizards greatly simplify the security > User-to-server security for all server functions and exit points definition process, extracting and summarizing data (IFS and native > Prevents users from performing specific actions, irrespective objects, IPs, users, etc.) from the history logs and then displaying of access method or of location the actual transaction statistics alongside current rules. The user > Verb support provides control over the execution of may then choose to modify rules based on the data or create new commands for specific servers rules – all from one convenient screen. > Internal profile groups simplify rule creation for specific groups Firewall works together with Action to automatically trigger alert of users messages and immediate corrective actions when an intrusion or > DDM/DRDA security including pre- and post- validation other security breach is detected. user swapping
  • i Security TM > Protection over user signon from Telnet – limits user access to Benefits specific IPs and terminals > Protects all iSeries exit points and servers - more than any > Login control, including alternate user name support, for FTP, other product on the market! REXEC, WSG and Pass-through > Protects all communication protocols (TCP/IP, FTP, Telnet, > User-definable exit program support (global and per server) WSG, Passthrough, etc.) > User management and statistics tools ease system and > Superior human engineering makes Firewall incredibly security tasks easy to understand and learn, even for non-technical system administrators Object Security > Precisely controls what users may do after access is granted > Controls object access at the level of specific action, such as – unlike standard firewall products read, write, delete, rename, run etc. > “Best-Fit” algorithm minimizes throughput delays by rapidly > Secures native O/S 400 and IFS objects and efficiently applying security rules > Protects files, libraries, programs, commands, data queues > Rule Wizards dramatically simplify security rule definition and print files > State-of-the-art intrusion detection guards against > Definable rule exceptions for specific users hacker attacks > Standard firewall protection provides IP address and SNA History Logs and Reports name filtering > Total user control over which transactions are logged > Subnet mask filtering for all IP addresses – one rule can and displayed protect an entire workgroup or LAN > Many pre-defined queries and reports > Protects both native and IFS objects – all of your databases > Powerful report generator are secured > Wizard to generate accurate reports from Firewall log > Remote logon security limits IP address to specific users at > Redirecting output to an output file for further processing specific times > Print all Firewall definitions for review and documentation > Automatic signon with alternate user profile (usually with > Flexible report scheduler enables reports processing at restricted authorities) enhances security when authorized off peak users connect from remote locations > Modify rules directly from Firewall log > Powerful report generator and scheduler Basic Security Logon Control Protect all 53 exit points by Define attributes for determining how servers specific combinations of IP are to be protected and addresses (or SNA names) what level of access control and user profiles is desired. Firewall Security Advanced Features Control activity from or outbound Reporting features provide to specific IP addresses queries and reports for system activity traceability User Security Control individual servers by Maintenance users, profiles, groups and Features include Firewall user groups Emergency Object Security Override, which enables Define security rules for files, overriding existing security libraries, data queues, printer rules temporarily - useful in files, programs, commands and responding quickly to IFS objects sudden security breaches U.S. Office & Corporate HQ Research & Development 12 Englewood Ave Nanuet, New York 10954 71 Hanadiv St. Hertzliya, Israel 46485 Toll Free Tel: 1-888-RAZLEE-4 Tel: +972-9-9588860 Fax: 1-419-781-5851 Fax: +972-9-9588861 E-mail: info@razlee.com www.razlee.com