Redbook Abstract
A Comprehensive Guide to Virtual Private Networks, Volume II: IBM Nways Router Solutions, SG24-5234-01
  Abstract
The Internet nowadays is not only a popular vehicle to retrieve and exchange information in traditional ways, such as e-mail, file transfer and Web surfing. It is being used more and more by companies to replace their existing telecommunications infrastructure with virtual private networks by implementing secure IP tunnels across the Internet between corporate sites as well as to business partners and remote locations.

This updated redbook includes the IPSec enhancements provided by Version 3.3 of the IBM Nways Multiprotocol Routing Services (MRS), Nways Multiprotocol Access Services (MAS) and Access Integration Services (AIS) that implement the Internet Key Exchange (IKE) protocol. This redbook also includes other new features, such as the policy engine, digital certificate and LDAP support, and QoS. The VPN scenarios are enhanced to reflect the latest implementation of IPSec and L2-tunneling functionality.

In this redbook we delve further into these scenarios by showing you how to implement solutions that exploit Data Link Switching (DLSw), IP Bridging Tunnels, Enterprise Extender (HPR over IP), APPN DLUR, TN3270, and Tunneling on layer 2 (L2TP, L2F, PPTP) through an IPSec tunnel.

A working knowledge of the IPSec protocols is assumed.

  Table of Contents
Part 1. Virtual Private Networks (VPN) Overview
Chapter 1. Virtual Private Network (VPN) introduction
Chapter 2. Layer 2 VPN protocols
Chapter 3. Layer 3 VPN protocols
Chapter 4. Addressing and routing
Part 2. VPN Scenarios based on MRS/MAS/AIS Version 3.3
Chapter 5. New features in MRS/MAS/AIS Version 3.3
Chapter 6. Configuring IPSec and IKE with IBM Nways routers
Chapter 7. Directory-assisted policy management
Chapter 8. Network management for VPNs
Chapter 9. User authentication for remote access
Chapter 10. Connecting the data center to the branch office
Chapter 11. Branch: data link switching over IPSec
Chapter 12. IP bridging through an IPSec tunnel
Chapter 13. Branch: APPN through an IPSec tunnel
Chapter 14. Branch: dependent LU requester (DLUR)
Chapter 15. Configuring TN3270E server
Chapter 16. Connecting business partners and suppliers
Chapter 17. Connecting Remote Users with voluntary tunneling
Chapter 18. Connecting remote users with compulsory tunneling
Chapter 19. Connecting dial-up routers with L2TP
Chapter 20. Connecting remote users with IPSec dial-up
Chapter 21. Connecting dial-up routers with L2TP and IPSec
Chapter 22. IPSec performance on 2212
Part 3. VPN Scenarios based on MRS/MAS Versions 3.1 and 3.2
Chapter 23. Configuring IPSec with IBM Nways routers
Chapter 24. Connecting the data center to the branch office
Chapter 25. Data link switching over IPSec
Chapter 26. IP Bridging through an IPSec tunnel
Chapter 27. APPN through an IPSec tunnel
Chapter 28. Adding dependent LU requester
Chapter 29. Adding TN3270E server
Chapter 30. Connecting dial-in remote users
Part 4. Basic router configuration
Chapter 31. Basic router configuration with MRS/AIS/MAS V.3.3
Chapter 32. Basic configuration with MRS/MAS V.3.1 and 3.2
Chapter 33. Configuring IPSec with MRS/MAS V3.1/3.2
  This redbook
View online
Order hardcopy
CD-ROMs
SK2T-demo-01
SK2T-2849-09
SK2T-1308-01
SK2T-8043-04
SK2T-6022-13
Review the redbook
  Profile
Publish date
1999-11-18
Lead author
Martin Murhammer
Other authors
Hyun Jeong Lee
Alexander Schmid
Orcun Atakan
Zikrun Badri
Beomjun Cho
ISBN number
0738414905
Number of pages
640