22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ehalf of the acme.com domain. If the smtp1 host is down or unreachable, then<br />

external systems would deliver messages to smtp2. For outbound messages, we<br />

configured the mail servers in the internal network to send all messages<br />

addressed outside the internal domain to a virtual relay host called<br />

relay.acme.com. Then, within the internal DNS, we define MX records for the<br />

virtual host relay.acme.com to point to both of the actual SMTP relay hosts, with<br />

the weighting set to favor smtp2 as the preferred route. We refer to this as a<br />

virtual host because there is no host (A) record. Note there would be “A” records<br />

for smtp1 and smtp2 hosts. This scheme provides outbound redundancy and<br />

fail-over: if smtp2 is down or unreachable, the internal mail servers will deliver<br />

outbound messages to smtp1. It is important to note that the internal DNS entries<br />

should resolve to the network addresses of the internally reachable network<br />

adapters on the relay hosts. Likewise, the external DNS should resolve to the<br />

externally reachable network adapter addresses.<br />

For detailed information on “spam” (unsolicited e-mail) prevention and relay host<br />

operation best practices, we recommend the Redbook Lotus Domino 6 spam<br />

Survival Guide for <strong>IBM</strong> e-Server, SG24-6930.<br />

FTP servers<br />

FTP servers are servers dedicated to receiving files from the Internet using File<br />

Transfer Protocol. They are typically set up as repositories only, although<br />

depending on the business needs of the organization, they may permit certain<br />

users to have the ability to retrieve files from the Internet. FTP servers are<br />

generally required to exchange files that are too large to be sent as SMTP<br />

message attachments. The definition of “large” will vary depending on the<br />

message size limits imposed by partner organization’s SMTP relay hosts. You<br />

should ensure the accounts used by external users are highly restrictive, and<br />

anonymous FTP should be limited, or restricted to yet another dedicated host. If<br />

your FTP server supports passive mode, and you have decided to permit it,<br />

ensure the range of data IP port numbers is limited to a relatively small, finite<br />

range, with all other ports blocked by the firewall.<br />

SSL<br />

The primary goal of the Secure Sockets Layer (SSL) protocol is to provide<br />

privacy and reliability between two communicating applications. The protocol is<br />

composed of two layers. At the lowest level, layered on top of some reliable<br />

transport protocol, is the SSL record protocol. The SSL record protocol is used<br />

for encapsulation of various higher level protocols. One such encapsulated<br />

protocol, the SSL handshake protocol, allows the server and client to<br />

authenticate each other and to negotiate an encryption algorithm and<br />

cryptographic keys before the application protocol transmits or receives its first<br />

byte of data. One advantage of SSL is that it is application protocol independent.<br />

A higher level protocol can layer on top of the SSL protocol transparently. An<br />

Chapter 4. Security components and layers 133

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!