Configuring specific security models

Setting up IP security configuration files can be a complex task, as there are many powerful features, options, and controls. However, after the security needs of the business are identified, implementing an IP security policy becomes a matter of translating the requirements to a Policy Agent configuration file.

The choice of protection model primarily depends on the network topology. Although it is perfectly permissible to follow a single model when configuring IP security policy, the z/OS® IP security function enables any number of models to be installed concurrently. Commonly, one set of rules governs internal network traffic, another protects traffic from connected networks, and a third provides security for traffic that is routed over the Internet. The following scenarios presume that you are configuring a secure server that is a multihomed host that is connected to an internal, an external, and a wide-area network that traverses the Internet. The configuration guidelines that are presented in the following subtopics are based on three business models:

Figure 1 shows a sample network for all three security models.

Figure 1. Security model network
Shows z/OS host connected to a trusted internal network, a partner company, and a branch office.

The following subtopics describe how to configure these models using the steps described in Steps for configuring IP security policy. The policy examples assume that a default-deny policy is in place. Any traffic not explicitly permitted is blocked.