Another day, another security vulnerability. System administrators everywhere battle daily to keep their systems secure. When security algorithms are deemed vulnerable or another network attack is disclosed, how do you know if you’re impacted? How many issues could be caused by turning a weak security algorithm off? Tracing network traffic and analyzing the data is a tedious task and isn’t always straightforward.
IBM i 7.2 support of Virtual LAN allows using a single adapter to connect to multiple VLANs. If your system must connect to multiple VLANs, this support can allow you to reduce the number of adapters needed or add redundant network connections without adding additional adapters.(more…)
The IBM i 7.2 release is absolutely loaded with new System SSL capabilities. There are a couple major new features only available starting with the 7.2 release. There is also a subset of the 7.2 capabilities that escaped from the Rochester development lab last year as part of 7.1 TR6. The early content was baked into 7.2 before it found its way to 7.1. February’s System SSL blog remains relevant as the discussion turns to the 7.2 release. What you’ll notice for that content is how and when the new function is enabled has changed with the 7.2 release boundary.(more…)
The Simple Network Management Protocol version 3 (SNMPv3) support in IBM i 7.2 has been enhanced to provide additional function for native IBM i SNMP managers.(more…)
IBM i 7.1 and 7.2 enhancements to VPN give clients new security options and more flexibility for management and configuration. VPN is configurable on IBM i through Navigator for i.(more…)
Two new commands have been provided in IBM i 7.2 to assist clients with handling TCP/IP configuration information.(more…)