•
Attaching more than four Ethernet 10Base-2 segments to the server
•
Providing switching between 10Base-T and 10Base-2 segments
•
Conserving server slots
An add-on to NetFinity provides an advanced Ethernet subsystem management
tool. Parameters such as packets/second or total throughput can be monitored
for each port, for traffic within an adapter, or for traffic between adapters.
By using NetFinity, you can graphically view the data, monitor for predefined
thresholds, and optionally generate SNMP alerts.
1.8 Security Features
This section discusses some technologies used in IBM PC Servers to comply
with the United States Department of Defense (DoD) security requirements.
Security features in the IBM PC Server line vary by model and all models do not
have all the security features described here. Check the User′s Handbook that
is shipped with the system, to see what features your system contains.
DoD requirements have been very influential in defining security standards used
on computer system (both hardware and software) implementations around the
world. The source for these requirements is the
Department of Defense, Trusted
Computer System Evaluation Criteria, DoD 5200.28 STD
, dated 12/85. The
essence of the requirements is contained in the Assurance section, Requirement
6: a “trusted mechanism must be continuously protected against tampering
and/or unauthorized changes...”. The National Computer Security Center
(NCSC) evaluates computer system security products with respect to the criteria
defined by the U.S. Department of Defense.
There are seven computer system security product classifications in the DoD
requirements: A1, B3, B2, B1, C2, C1, and D. The requirements for these
classifications fall into four basic groups: security policy, accountability,
assurance, and documentation. Several criteria, which vary by security
classification, are specified in each of these groups. Currently, A1 is the highest
classification, followed by B3, B2, and so on. The C2 classification satisfies most
of the security requirements for personal computing environments.
LogicLock:
On the IBM MCA PC Servers, IBM implements a collection of
security features referred to as the LogicLock security system. LogicLock is
designed to be hardware compliant with the C2 security classification. It goes
far beyond basic PC security systems in its design to protect data against
unauthorized access.
LogicLock security features include:
•
Tamper-evident switches
•
Optional secure I/O cables
•
Privileged-access password
•
Optional secure removable media
•
Selectable drive startup
•
Unattended start mode
34 NetWare Integration Guide