Packet rules versus other i5/OS security solutions

 

In high-risk situations, such as securing a production system or securing communications between your System i™ platform and other systems in a network, you might need to investigate other security solutions to broaden your protection.

Your system has integrated security components that can protect your system from several types of risks. Packet rules provide an economical way for you to secure your system. In some cases, packet rules can provide everything you need without any additional purchases.

See these information center topics for information to help you ensure that your security strategy includes multiple lines of defense:

 

Parent topic:

Packet rules concepts