IBM AIX Enhancements and Modernization

IBM AIX Enhancements and Modernization

Front cover IBM AIX Enhancements and Modernization Navdeep Dhaliwal Ahmed Mashhour Armin Röll Liviu Rosca Redbooks IBM Redbooks IBM AIX Enhancements and Modernization January 2020 SG24-8453-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xv. First Edition (January 2020) This edition applies to AIX Version 7.2 Standard Edition (product number 5765-G98), AIX Version 7.2 Enterprise Edition (product number 5765-CD3), IBM PowerVM Version 3.1 Enterprise Edition (product number 5765-VE3), IBM PowerVC Version 1.4.3 Standard Edition (product number 5765-VCS), and IBM servers that are based on POWER9 processor-based technology. © Copyright International Business Machines Corporation 2020. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Tables . ix Examples . xi Notices . .xv Trademarks . xvi Preface . xvii Authors. xvii Now you can become a published author, too! . xviii Comments welcome. xviii Stay connected to IBM Redbooks . xix Chapter 1. General enhancements . 1 1.1 Live Update function . 2 1.1.1 Live Update concepts and procedure . 2 1.1.2 Live Update modes . 4 1.1.3 Live Update management types . 4 1.1.4 Live Update methods . 4 1.1.5 AIX Live Update integration with Power Enterprise Pools . 7 1.1.6 Live Update CPU resource reduction . 11 1.1.7 Live Update across frames . 15 1.1.8 Automount File System support with Live Update . 19 1.1.9 Kerberos authentication support in Live Update . 19 1.2 Server Flash Caching . 20 1.2.1 Flash caching concepts . 20 1.2.2 Implementation modes . 21 1.3 Multipath I/O . 23 1.3.1 AIX Path Control Module . 23 1.3.2 Subsystem Device Path Control Module. 29 1.4 iSCSI software initiator . 30 1.4.1 iSCSI overview . 30 1.4.2 Configuring the initiator . 30 1.5 Network Installation Manager . 34 1.5.1 Object classes. 34 1.5.2 HTTP service . 35 1.5.3 Live Update. 36 1.5.4 The nimadm support for MultiBOS environments . 42 1.6 Logical Volume Manager . 42 1.6.1 LVM mirroring to IBM FlashSystem for enhanced performance . 42 1.6.2 LVM reclamation support . 44 1.7 JFS2 . 45 1.7.1 JFS2 defragger . 45 1.7.2 Reclaiming JFS2 space . 46 1.8 Multiple alternative disk clones . 47 1.8.1 Cloning concepts . 47 1.9 Active Memory Expansion. 53 © Copyright IBM Corp. 2020. All rights reserved. iii 1.10 The nmon tool and current processor frequency reporting . 54 1.11 Globalization . 57 1.11.1 Unicode support . 57 1.11.2 Common Locale Data Repository updates . 59 1.11.3 International Components for Unicode for C. 60 1.12 AIX Toolbox for Linux Applications . 60 Chapter 2. Security enhancements . 63 2.1 AIX Trusted Execution . 64 2.2 AIX Secure boot . 68 2.2.1 PowerVM Secure Boot . 68 2.2.2 AIX Secure boot implementation . 69 2.2.3 AIX Secure boot policies and controls . 70 2.3 AIX trusted installation and update . 71 2.3.1 Digital signature and package signing . 72 2.3.2 AIX package signing and digital signature catalog definition . 73 2.3.3 AIX digital signature catalog signing process . 78 2.3.4 Signature validation during AIX installation and update process . 79 2.3.5 AIX trusted installation and update controls . 79 2.4 Multifactor authentication . 83 2.4.1 Authentication factors . 83 2.4.2 Authentication methods . 84 2.4.3 In-band MFA . 84 2.4.4 Out-of-band MFA . 85 2.4.5 Authentication on AIX systems by using RSA SecureID. 85 2.5 Cryptographic libraries . 87 2.5.1 OpenSSL . 87 2.5.2 CryptoLite for C library . 87 2.6 Address.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    236 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us