 |
 |
 |
 |
| AS/400 Internet Security: Implementing AS/400 Virtual Private Networks, SG24-5404-00 |
 |
 |
 |
|
Secure your AS/400 network with Virtual Private Networks (VPN). This redbook explores VPN concepts and describes its implementation using IP security (IPSec) and Layer 2 Tunneling Protocol (L2TP) on the AS/400 operating system. The redbook is designed to meet the needs of network administrators, consultants, and AS/400 specialists who plan to design, implement, and configure VPNs where AS/400 systems are employed. Secure your AS/400 network with Virtual Private Networks (VPN). This redbook explores VPN concepts and describes its implementation using IP security (IPSec) and Layer 2 Tunneling Protocol (L2TP) on the AS/400 operating system. The redbook is designed to meet the needs of network administrators, consultants, and AS/400 specialists who plan to design, implement, and configure VPNs where AS/400 systems are employed. This redbook covers various scenarios, some of which may not apply to your environment. However, before implementing any particular AS/400 VPN configuration, we strongly recommend that you read the following chapters in this redbook:
- Chapter 3. AS/400 VPN implementation
- Chapter 4. AS/400 IP filtering overview
- Chapter 5. Getting started: AS/400 host-to-host VPN
- Chapter 6. Gateway-to-gateway VPN
- Chapter 12. Don't forget a firewall: Protecting your VPN server
In this redbook, you can find:
- How to design and implement VPNs where the AS/400 system is either an endpoint host or a gateway to a private network
- A variety of scenarios that show how to securely connect your AS/400 systems to remote PC clients, branch offices, and business partners over the Internet
- How to protect your AS/400 VPN server with a firewall
- VPN cross-platform examples covering all of the IBM products that support virtual private networking
- Discussions of such advanced topics as problem determination, trouble shooting, and VPN NAT
|
 |
 |
Part 1. VPN concepts and overview
Chapter 1. Virtual Private Network (VPN) overview
Chapter 2. Introduction to Layer 2 Tunneling Protocol (L2TP)
Part 2. VPN implementation on the AS/400 system
Chapter 3. AS/400 VPN implementation
Chapter 4. AS/400 IP filtering overview
Chapter 5. Getting started: AS/400 host-to-host VPN
Chapter 6. Gateway-to-gateway VPN
Chapter 7. L2TP host-to-gateway voluntary tunnel
Chapter 8. L2TP gateway-to-gateway voluntary tunnel
Chapter 9. L2TP compulsory tunnel
Chapter 10. Secure remote access for PC clients over the Internet
Chapter 11. Secure LAN access for PC clients in the intranet
Chapter 12. Don’t forget a firewall: Protecting your VPN server
Chapter 13. VPN Network Address Translation (VPN NAT)
Chapter 14. AS/400 VPN problem determination
Part 3. VPN interoperability scenarios
Chapter 15. Host-to-gateway VPN: AS/400 to 2212 router
Chapter 16. Gateway-to-gateway VPN: AS/400 to 2210 router
Chapter 17. Host-to-host VPN: AS/400 to AIX server
Chapter 18. Host-to-host VPN: AS/400 to S/390
Chapter 19. Manual connection VPN: AS/400 to eNetwork Firewall
|
 |
|
 |
|
SK2T-demo-01
|
|
SK2T-2849-09
|
|
SK2T-8043-04
|
|
SK2T-2177-23
|
|
|
Publish date
|
|
1999-12-14
|
|
|
Lead author
|
|
Marcela Adan
|
|
|
Other authors
|
Thomas Barlen Weng Wai Chia Andrew Grant Darrell Grundy Peter Hey Stephan Imhof Linda Kinnunen Eric Zeier
|
|
|
ISBN number
|
|
0738414840
|
|
|
Number of pages
|
|
912
|
|
|
 |