CS z/os Network Security Configuration Assistant GUI



Similar documents
CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

IBM WebSphere Data Interchange V3.3

z/os V1R11 Communications Server system management and monitoring

WebSphere Process Server v6.2 WebSphere Enterprise Service Bus v6.2 WebSphere Integration Developer v6.2

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements

Communications Server for Linux

Database lifecycle management

DataPower z/os crypto integration

IBM Tivoli Service Request Manager 7.1

Automated domain name registration: DNS background information

Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version First Edition (December 7, 2007)

IBM Tivoli Web Response Monitor

WebSphere Commerce V7.0

The Consolidation Process

Active Directory Synchronization with Lotus ADSync

IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server

IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide

Featuring: GUI screen designer to edit DDS source for 5250 Display Files

IBM Software Group. SW5706 JVM Tools IBM Corporation 4.0. This presentation will act as an introduction to JVM tools.

Positioning the Roadmap for POWER5 iseries and pseries

IBM VisualAge for Java,Version3.5. Remote Access to Tool API

Tivoli Endpoint Manager for Security and Compliance Analytics

Tivoli Security Compliance Manager. Version 5.1 April, Collector and Message Reference Addendum

New SMTP client for sending Internet mail

IBM Systems and Technology Group Technical Conference

DB2 Database Demonstration Program Version 9.7 Installation and Quick Reference Guide

Rational Developer for IBM i (RDi) Introduction to RDi

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide

New!! - Higher performance for Windows and UNIX environments

Platform LSF Version 9 Release 1.2. Migrating on Windows SC

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready

IBM Security QRadar Version (MR1) Replacing the SSL Certificate Technical Note

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1

Tivoli Endpoint Manager for Configuration Management. User s Guide

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic

Patch Management for Red Hat Enterprise Linux. User s Guide

Installing on Windows

z/tpf FTP Client Support

Lisa Gundy IBM Corporation. Wednesday, March 12, 2014: 11:00 AM 12:00 PM Session 15077

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment

DB2 Database Demonstration Program Version 10.5 Installation and Quick Reference Guide

IBM Lotus Enterprise Integrator (LEI) for Domino. Version August 17, 2010

TN3270 Security Enhancements

IBM Security QRadar Version (MR1) Checking the Integrity of Event and Flow Logs Technical Note

Redbooks Redpaper. IBM TotalStorage NAS Advantages of the Windows Powered OS. Roland Tretau

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide

R/3 and J2EE Setup for Digital Signature on Form 16 in HR Systems

IBM Cognos Controller Version New Features Guide

Implementing the End User Experience Monitoring Solution

Endpoint Manager for Mobile Devices Setup Guide

Packet Capture Users Guide

Budget Control by Cost Center

Installing and using the webscurity webapp.secure client

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

OS Deployment V2.0. User s Guide

Data Transfer Tips and Techniques

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei

Third Party Digital Asset Management Integration

Release 7.1 Installation Guide

FTP Secured With SSL on z/os

IBM Security QRadar Version Installing QRadar with a Bootable USB Flash-drive Technical Note

Software Usage Analysis Version 1.3

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2

IBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide

IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager

User Experience in Custom Apps

IBM Enterprise Marketing Management. Domain Name Options for

RLP Citrix Setup Guide

Configuring Distribution List in Compliant User Provisioning

Migrating LAMP stack from x86 to Power using the Server Consolidation Tool

Secure MobiLink Synchronization using Microsoft IIS and the MobiLink Redirector

IBM Lotus Protector for Mail Encryption. User's Guide

IBM Security SiteProtector System Migration Utility Guide

IBM TRIRIGA Application Platform Version Reporting: Creating Cross-Tab Reports in BIRT

The value of IT Optimiztion with Power5 on iseries. Roberto Téllez C. iseries Porduct Manager Certified Specialist IBM de México, S.A.

IBM PowerSC Technical Overview IBM Redbooks Solution Guide

Integration of SAP Netweaver User Management with LDAP

IBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan

IBM DB2 Data Archive Expert for z/os:

IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM

IBM Endpoint Manager. Security and Compliance Analytics Setup Guide

How to Deliver Measurable Business Value with the Enterprise CMDB

IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide

IBM Remote Lab Platform Citrix Setup Guide

Tivoli IBM Tivoli Monitoring for Transaction Performance

Remote Support Proxy Installation and User's Guide

SAP Service Tools for Performance Analysis

Maximo Business Intelligence Reporting Roadmap Washington DC Users Group

IBM Security QRadar Version Common Ports Guide

IBM Configuring Rational Insight and later for Rational Asset Manager

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

IBM Security SiteProtector System Two-Factor Authentication API Guide

USDL XG WP3 SAP use case. Kay Kadner

Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.

Process Archiving using NetWeaver Business Process Management

IBM FileNet System Monitor FSM Event Integration Whitepaper SC

Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series

How To Write An Architecture For An Bm Security Framework

RUN BETTER Become a Best-Run Business with Remote Support Platform for SAP Business One

Transcription:

Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Network Security Configuration Assistant GUI 1

Security configuration agenda CS z/os configuration GUI overview Network security configuration assistant 2

CS z/os configuration GUI overview 3

Configuring the Policy Agent The following PAGENT policies can be stored in a flat text file format: ƒ QoS policies (alternatively supported in LDAP) ƒ IPSec VPN policies ƒ IP filter policies ƒ AT-TLS policies ƒ Sysplex Distributor policies ƒ Traffic regulation policies The following PAGENT policies must be stored in LDAP: ƒ Intrusion Detection Services (IDS) IP Security configuration assistant GUI ƒipsec ƒat-tls Text editor (ISPF/PDF): ƒqos ƒipsec ƒat-tls ƒsysplex Distributor ƒtraffic regulation IDS GUI Manager LDAP Text file QoS GUI Manager Policy Agent Note: The QoS GUI can only be used to create QoS policies in LDAP - not in a PAGENT text-based configuration file. Applications Sockets Transport protocol layer TCP and UDP IP Networking Layer Network Interfaces 4

GUI-assisted CS configuration overview Text editor (ISPF/PDF) MSYS-based GUIs Stack and base functions TN3270 server FTP server MSYS LDAP In addition to the full MSYS environment, CS z/os as an alternative provides a stand-alone MSYS for Setup TCP/IP Demo MSYS-Export to flat text file (one-way!) Flat file or data set TCP/IP Components TCP/IP Profile TCPIP.DATA OMPROUTE TN3270SERVER FTP.DATA Stand-alone GUIs QoS Manager Local master copy IDS Manager Local master copy IP Security Configuration Assistant Local master copy LDAP IP Security Configuration Assistant export to flat text file (one-way!) Flat file or data set Policy agent ƒ QoS policies ƒ Traffic regulation ƒ Sysplex Distributor ƒ IPSec policies ƒ IP filter policies ƒ AT-TLS policies Text editor (ISPF/PDF) Note: If text editor updates are made to the flat file configuration data, those changes will not be reflected back into LDAP (for MSYS) or the local master copy for the IP security configuration assistant. 5

CS z/os configuration GUIs These GUIs are all available from the z/os Communications Server support page at ƒ http://www.ibm.com/software/network/commserver/zos/support Click on the All Tools link under Download. N O T E S Tool zqos Manager zids Manager eserver IDS Configuration Manager z/os Managed System Infrastructure for Setup (msys) TCP/IP Demo URL http://www.ibm.com/support/docview.wss?rs=852&uid=swg24007692 http://www.ibm.com/support/docview.wss?rs=852&uid=swg24007607 http://www.ibm.com/support/docview.wss?rs=852&uid=swg24006805 http://www.ibm.com/support/docview.wss?rs=852&uid=swg24006591 6

Policy-controlled application-transparent network security AT- TLS policy Applications Sockets Policy Agent IPSec policy IP Security Configuration Assistant GUI System SSL calls TCP IP Filter policy TLS Encrypted IPSec IP Networking Layer Network Interfaces IPSec Encrypted Network security without requiring application changes ƒ IPSec ƒ Transparent TLS Configuration single administrative task ƒ Higher level of abstraction Focus on what traffic to protect and how to protect Less focus on low-level details (though available on expert panels) 7

Network security configuration assistant 8

z/os V1R7 network security configuration assistant overview Workstation Persistent Data Store z/os Network Security Configuration Assistant Hardcoded Samples GUI's Internal Representation of Security Policy Local master copy Sample IKED proc Sample default rules Stack specific IPSec Config Stack specific AT- TLS Config F T P Blue Image Orange Image IPSec, filtering, and AT-TLS policies can be defined by manually editing a Policy Agent configuration text file on z/os. The policies can also be defined using a new downloadable policy configuration tool that runs on a workstation using a graphical user interface. ƒ Policy text files that are created by the tool are transferred to z/os using FTP Allows policy definition to be performed at higher level of abstraction than policy file statements ƒ Define policy for both CS IPSec and AT-TLS as a single adminstrative task Generates separate policy files for CS IPSec and AT-TLS Note: The uploaded policy configuration text files can be directly edited on z/os; however policy tool persistent data store on the workstation will not have changes and are not reflected back into the tool 9

Network security configuration assistant - example 10

Network security configuration assistant - configuration data model Data endpoints 1.1.1.1 Branch Office A IPSec topology Host-to-GW IP Security endpoints 1.1.1.1 Br. Office A GW Image X Stack A Connectivity Rules Stack B Connectivity Rules Image Y Stack C Connectivity Rules Requirements Map Requirements Map Business Partner IPSec AT-TLS Security Security Requirements Traffic Descriptors Map Levels Levels Internal Network IPSec AT-TLS Gold EE Requirements (ports, protocol) Map Security None Security e.g. Traffic Host Descriptors Branch Office (3DES) Levels IPSec Levels AT-TLS Silver TN3270 (ports, protocol) Gold SecurityNone Security EE (ports, Traffic protocol) Descriptors(DES) Bronze (3DES) Levels Levels None FTP TN3270 (ports, protocol) Silver Gold None None EE (ports, protocol) (SHA1) Permit (DES) (3DES) Gold Web FTP (ports, (ports, protocol) Bronze Bronze None Gold TN3270 (ports, protocol) protocol) (3DES) Deny (SHA1) (SHA1) None (3DES) All Web other traffic Permit Silver Gold None FTP (ports, protocol) (DES) (3DES) Deny Permit None Gold All CICS other (ports, traffic protocol) (3DES) Deny None All other traffic A system image contains one or more stacks ƒ Multiple system images may be defined A stack contains a set of connectivity rules ƒ Data endpoint information ƒ Security endpoint information Reusable objects (can be shared across images and stacks) ƒ Requirements Map, Security Level, Traffic Descriptor 11

Connectivity rule example A stack's connectivity rule applies a requirement map to a pair of data endpoints. The IPv4 addresses in a packet are compared with the IPv4 addresses of the data endpoints of the connectivity rules in the order that those rules appear in the table. When the IPv4 addresses match, the packet is compared with that connectivity rule's traffic descriptors in the order they appear in the requirement map; when a match is found, the corresponding security level is applied. For IPSec, each requirement map ends with an implicit rule to deny all traffic. For AT-TLS, if a packet matches no rule, it is allowed to flow with no AT-TLS protection. 12

Requirement map example A requirement map is a collection of traffic descriptors ƒ You might define a requirement map named BranchOffice that provides a high level of protection for TN3270 and Web traffic but disallows (denies) all other traffic. ƒ You might define another requirement map named BusinessPartner that provides a high level of protection for Web traffic but disallows all other traffic. ƒ Then you could associate BranchOffice with the addresses of your branch offices in some connectivity rules. ƒ And associate BusinessPartner with the IPv4 addresses of your business partners in other connectivity rules. 13

Traffic descriptor example The IP Security configuration assistant comes with many traffic types already defined ƒ They can be used as-is ƒ Or they can be modified to better match your local needs This is an example of FTP server traffic ƒ You may want to change the port range for passive data connections based on your local FTP server's PASSIVEDATAPORT value In this example, we use the range from 50,000 to 50,200 14

Security levels IBM Software Group Enterprise Networking and Transformation Solutions Security levels define different ways to protect data in the network: ƒ IPSec - Gold/Silver/Bronze levels ƒ AT-TLS - Platinum/Gold/Silver/Bronze levels 15

Getting ready to FTP the policy agent configuration files to z/os 16

Example policy agent configuration file for IP security and AT-TLS Locate or create a new Policy Agent configuration file that identifies the target stack by jobname and the location of its image file. ƒ The image file indicates the location of the policy configuration file. For example, if the stack jobname is TCPCS, then the Policy Agent configuration file /etc/pagent.conf contains the following statement: ƒ TcpImage TCPCS /etc/tcpcs1.image And /etc/tcpcs.image contains the following statement: ƒ IpSecConfig /etc/tcpcs.policy And start Policy Agent: ƒ pagent -c /etc/pagent.conf 17

PAGENT configuration file relationship /etc/pagent.conf... TcpImage TCPCS /etc/tcpcs.image TcpImage TCPCS2 /etc/tcpcs2.image... /etc/tcpcs.image... IpSecConfig /etc/ipsec/tcpcs.policy TTLSConfig /etc/tls/tcpcs.policy... /etc/tcpcs2.image /etc/tls/tcpcs.policy... TTLSRule...... /etc/ipsec/tcpcs.policy... IpGenericFilterAction...... 18

AT-TLS example for TN3270 and CICS Start making a requirement map ƒ Copy the AT-TLS_Sample as a starting pint 19

AT-TLS security level details The keyring may either be in an HFS file (managed by GSKKYMAN) or in RACF The keyring location can be specified at a z/os image level or on a traffic descriptor that describes a specific application SSL/TLS protocol levels and ciphers can be chosen in the security level settings Support for checking with a Certificate Revocation List server (or multiple) is also supported 20

AT-TLS keyring specification in a traffic descriptor 21

AT-TLS gold and platinum service levels 22

Trademarks, Copyrights, and Disclaimers The following terms are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both: IBM CICS IMS MQSeries Tivoli IBM(logo) Cloudscape Informix OS/390 WebSphere e(logo)business DB2 iseries OS/400 xseries AIX DB2 Universal Database Lotus pseries zseries Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are registered trademarks of Microsoft Corporation in the United States, other countries, or both. Intel, ActionMedia, LANDesk, MMX, Pentium and ProShare are trademarks of Intel Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Other company, product and service names may be trademarks or service marks of others. Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. This document could include technical inaccuracies or typographical errors. IBM may make improvements and/or changes in the product(s) and/or program(s) described herein at any time without notice. Any statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Any reference to an IBM Program Product in this document is not intended to state or imply that only that program product may be used. Any functionally equivalent program, that does not infringe IBM's intellectual property rights, may be used instead. Information is provided "AS IS" without warranty of any kind. THE INFORMATION PROVIDED IN THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IBM EXPRESSLY DISCLAIMS ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IBM shall have no responsibility to update this information. IBM products are warranted, if at all, according to the terms and conditions of the agreements (e.g., IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are provided. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. IBM makes no representations or warranties, express or implied, regarding non-ibm products and services. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents or copyrights. Inquiries regarding patent or copyright licenses should be made, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. The actual throughput or performance that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here. Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users - Documentation related to restricted rights-use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract and IBM Corp. 23