Packet rules versus other IBM i security solutions

In high-risk situations, such as securing a production system or securing communications between your IBM® i platform and other systems in a network, you might need to investigate other security solutions to broaden your protection.

Your system has integrated security components that can protect your system from several types of risks. Packet rules provide an economical way for you to secure your system. In some cases, packet rules can provide everything you need without any additional purchases.

See these information center topics for information to help you ensure that your security strategy includes multiple lines of defense:

  • IBMSystem i® and Internet security

    This topic collection provides information about the risks and solutions that you need to consider before using the Internet.

  • Transport Layer Security(TLS)

    TLS provides secure connections between server applications and their clients. This topic includes information about how you can enable TLS on your IBM i applications.

  • Virtual Private Networking (VPN)

    VPN enables your company to securely extend its private intranet over the existing framework of a public network, such as the Internet. This topic describes VPN and tells you how to use it on your system.