© Copyright IBM Corp. 2002. All rights reserved. vii
Figures
1-1 Basic system security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1-2 Network firewall security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1-3 Data transmission security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2-1 Data privacy example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2-2 Data integrity example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2-3 Symmetric key encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2-4 Public key encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2-5 Secure hash function encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2-6 Digital signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2-7 Public key certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2-8 Secure Sockets Layer example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2-9 Data transfer using data integrity and data privacy . . . . . . . . . . . . . . . . 20
2-10 Secure data transfer between two parties . . . . . . . . . . . . . . . . . . . . . . . 21
3-1 Basic CSM cluster communication overview . . . . . . . . . . . . . . . . . . . . . 24
3-2 Cluster Security Services (CtSec) architecture . . . . . . . . . . . . . . . . . . . 26
3-3 Example of CSM security communication . . . . . . . . . . . . . . . . . . . . . . . 34
3-4 The ctcasd credentials after encryption . . . . . . . . . . . . . . . . . . . . . . . . . 35
4-1 Simple network configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4-2 Configuration file manager functional diagram . . . . . . . . . . . . . . . . . . . 40
4-3 Configuration file manager plug-ins for WebSM . . . . . . . . . . . . . . . . . . 44
4-4 WebSM configuration modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
4-5 Secure WebSM communication with SSL and public and private keys. 48
5-1 Remote command execution in CSM . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5-2 Distributed command execution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Get An Introduction to Security in a CSM 1.3 for AIX 5L Environment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.