∙
∙
∙
Attaching more than four Ethernet
An
By using NetFinity, you can graphically view the data, monitor for predefined thresholds, and optionally generate SNMP alerts.
1.8 Security Features
This section discusses some technologies used in IBM PC Servers to comply with the United States Department of Defense (DoD) security requirements. Security features in the IBM PC Server line vary by model and all models do not have all the security features described here. Check the User′s Handbook that is shipped with the system, to see what features your system contains.
DoD requirements have been very influential in defining security standards used on computer system (both hardware and software) implementations around the world. The source for these requirements is the Department of Defense, Trusted Computer System Evaluation Criteria, DoD 5200.28 STD, dated 12/85. The essence of the requirements is contained in the Assurance section, Requirement
6:a ªtrusted mechanism must be continuously protected against tampering and/or unauthorized changes...º. The National Computer Security Center (NCSC) evaluates computer system security products with respect to the criteria defined by the U.S. Department of Defense.
There are seven computer system security product classifications in the DoD requirements: A1, B3, B2, B1, C2, C1, and D. The requirements for these classifications fall into four basic groups: security policy, accountability, assurance, and documentation. Several criteria, which vary by security classification, are specified in each of these groups. Currently, A1 is the highest classification, followed by B3, B2, and so on. The C2 classification satisfies most of the security requirements for personal computing environments.
LogicLock: On the IBM MCA PC Servers, IBM implements a collection of security features referred to as the LogicLock security system. LogicLock is designed to be hardware compliant with the C2 security classification. It goes far beyond basic PC security systems in its design to protect data against unauthorized access.
LogicLock security features include:
∙
∙
∙
∙
∙
∙
34NetWare Integration Guide