Configuring IP security

You configure z/OS® IP security using an extensive set of configuration statements and parameters coded into a flat file, which is parsed by the Policy Agent to establish the set of IP security requirements for each TCP/IP stack. IBM® provides two alternatives for creating the Policy Agent configuration files: