AS/400 Internet Security: Implementing AS/400 Virtual Private Networks

An IBM Redbooks publication


Abstract

Secure your AS/400 network with Virtual Private Networks (VPN). This IBM Redbooks publication explores VPN concepts and describes its implementation using IP security (IPSec) and Layer 2 Tunneling Protocol (L2TP) on the AS/400 operating system. The book is designed to meet the needs of network administrators, consultants, and AS/400 specialists who plan to design, implement, and configure VPNs where AS/400 systems are employed. Secure your AS/400 network with Virtual Private Networks (VPN). This book explores VPN concepts and describes its implementation using IP security (IPSec) and Layer 2 Tunneling Protocol (L2TP) on the AS/400 operating system. The book is designed to meet the needs of network administrators, consultants, and AS/400 specialists who plan to design, implement, and configure VPNs where AS/400 systems are employed. This book covers various scenarios, some of which may not apply to your environment. However, before implementing any particular AS/400 VPN configuration, we strongly recommend that you read the following chapters in this book:

- Chapter 3. AS/400 VPN implementation
- Chapter 4. AS/400 IP filtering overview
- Chapter 5. Getting started: AS/400 host-to-host VPN
- Chapter 6. Gateway-to-gateway VPN
- Chapter 12. Don't forget a firewall: Protecting your VPN server

In this book, you can find:

- How to design and implement VPNs where the AS/400 system is either an endpoint host or a gateway to a private network
- A variety of scenarios that show how to securely connect your AS/400 systems to remote PC clients, branch offices, and business partners over the Internet
- How to protect your AS/400 VPN server with a firewall
- VPN cross-platform examples covering all of the IBM products that support virtual private networking
- Discussions of such advanced topics as problem determination, trouble shooting, and VPN NAT

Table of contents

Part 1. VPN concepts and overview
Chapter 1. Virtual Private Network (VPN) overview
Chapter 2. Introduction to Layer 2 Tunneling Protocol (L2TP)
Part 2. VPN implementation on the AS/400 system
Chapter 3. AS/400 VPN implementation
Chapter 4. AS/400 IP filtering overview
Chapter 5. Getting started: AS/400 host-to-host VPN
Chapter 6. Gateway-to-gateway VPN
Chapter 7. L2TP host-to-gateway voluntary tunnel
Chapter 8. L2TP gateway-to-gateway voluntary tunnel
Chapter 9. L2TP compulsory tunnel
Chapter 10. Secure remote access for PC clients over the Internet
Chapter 11. Secure LAN access for PC clients in the intranet
Chapter 12. Don’t forget a firewall: Protecting your VPN server
Chapter 13. VPN Network Address Translation (VPN NAT)
Chapter 14. AS/400 VPN problem determination
Part 3. VPN interoperability scenarios
Chapter 15. Host-to-gateway VPN: AS/400 to 2212 router
Chapter 16. Gateway-to-gateway VPN: AS/400 to 2210 router
Chapter 17. Host-to-host VPN: AS/400 to AIX server
Chapter 18. Host-to-host VPN: AS/400 to S/390
Chapter 19. Manual connection VPN: AS/400 to eNetwork Firewall




Profile

Publish Date
14 December 1999


Rating: Not yet rated


Author(s)

ISBN-10
0738414840

ISBN-13
9780738414843

IBM Form Number
SG24-5404-00

Number of pages
912