22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10.3.2 Notes security<br />

meant to provide. Closing all other ports prevents well-known attacks from the<br />

being conducted.<br />

To determine the ports that should remain open and those that should be closed,<br />

we recommend the use of the “Network Mapper” tool NMap. It can be found at<br />

the following URL:<br />

http://www.insecure.org/nmap/<br />

Nmap is an open source utility for network exploration or security auditing. It was<br />

designed to rapidly scan large networks, although it works fine against single<br />

hosts. Nmap uses raw IP packets in novel ways to determine what hosts are<br />

available on the network, what services (ports) they are offering, what operating<br />

system (and OS version) they are running, what types of packet filters and<br />

firewalls are in use, and dozens of other characteristics. Nmap runs on most<br />

types of computers, and both console and graphical versions are available.<br />

Nmap is free software, available with full source code under the terms of the<br />

GNU GPL.<br />

Notes security concerns itself with the protection of the Domino server, the Notes<br />

databases it contains, and the data contained within those Notes databases, as<br />

shown in Figure 10-6.<br />

Figure 10-6 Notes security<br />

The elements of Notes security are described in this section.<br />

Chapter 10. The Notes/Domino security model 421

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!