Several options are provided for securing the APPC interface. Which options you choose to use, however, depends on the sensitivity of your resources and the particular security requirements of your systems. To best implement security for an APPC environment, it is extremely important for you know:
This chapter addresses the following aspects of the CA Top Secret APPC/OS/390 interface:
Note: Before continuing, you should already be familiar with the IBM Planning: APPC Management Guide.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|