If you use IPSec, you can use the IPSec Network Management Interface (IPSECNMI) of the product to monitor it. The interface requires the IKED daemon to be active.
The security requirements for the IPSec Network Management Interface are:
EZB.NETMGMT.sysname.tcpipname.IPSEC.DISPLAY EZB.NETMGMT.sysname.tcpipname.IPSEC.CONTROL EZB.NETMGMT.sysname.sysname.IKED.DISPLAY
Specifies the system name where the interface is used.
Specifies the name of the TCP/IP stack.
Access problems to /var and EZB.NETMGMT.** are indicated by the presence of messages NIS58n in the SOLVE SSI log.
Examples: Setting EZB.NETMGMT.sysname.tcpipname.IPSEC.DISPLAY security
This example sets the security requirements in an CA ACF2 system:
SET RESOURCE(SER) COMPILE $KEY(EZB) TYPE(SER) NETMGMT.sysname.tcpipname.IPSEC.DISPLAY UID(uid) SERVICE(READ) ALLOW STORE
The value set in the CLASMAP definition in the GSO for SERVAUTH resources.
The UID of the region user.
This example sets the security requirements in a CA Top Secret system:
TSS PER(userid) SERVAUTH(EZB.NETMGMT.sysname.tcpipname.IPSEC.DISPLAY) ACCESS(READ)
The ACID of the region user.
This example sets the security requirements in a RACF system:
PER EZB.NETMGMT.sysname.tcpipname.IPSEC.DISPLAY CLASS(SERVAUTH) ID(userid) ACCESS(READ)
The user ID of the region.
| Copyright © 2012 CA. All rights reserved. |
|