ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzaja_5.4.0.1/rzajagetstart.htm

87 lines
6.7 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Virtual Private Networking (VPN)" />
<meta name="abstract" content="A virtual private network (VPN) allows your company to securely extend its private intranet over the existing framework of a public network, such as the Internet. With VPN, your company can control network traffic while providing important security features such as authentication and data privacy." />
<meta name="description" content="A virtual private network (VPN) allows your company to securely extend its private intranet over the existing framework of a public network, such as the Internet. With VPN, your company can control network traffic while providing important security features such as authentication and data privacy." />
<meta name="DC.Relation" scheme="URI" content="rzajawhatnewvpn.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajaprintvpn.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajavpnprotocols.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajascenarios.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajavpnplan.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajacreatevpncon.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajavpnmanage.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajatroubleshootvpn.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajaotherinfo.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2000, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2000, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzajagetstart" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Virtual Private Networking (VPN)</title>
</head>
<body id="rzajagetstart"><a name="rzajagetstart"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Virtual Private Networking (VPN)</h1>
<div><p>A virtual private network (VPN) allows your company to securely
extend its private intranet over the existing framework of a public network,
such as the Internet. With VPN, your company can control network traffic while
providing important security features such as authentication and data privacy.</p>
<p>VPN is an optionally-installable component of <span class="keyword">iSeries™ Navigator</span>,
the graphical user interface (GUI) for <span class="keyword">i5/OS™</span>.
It allows you to create a secure end-to-end path between any combination of
host and gateway. VPN uses authentication methods, encryption algorithms,
and other precautions to ensure that data sent between the two endpoints of
its connection remains secure.</p>
<p>VPN runs on the network layer of the TCP/IP layered communications stack
model. Specifically, VPN uses the IP Security Architecture (IPSec) open framework.
IPSec provides base security functions for the Internet, as well as furnishes
flexible building blocks from which you can create robust, secure virtual
private networks.</p>
<p>VPN also supports Layer 2 Tunnel Protocol (L2TP) VPN solutions. L2TP connections,
which are also called virtual lines, provide cost-effective access for remote
users by allowing a corporate network server to manage the IP addresses assigned
to its remote users. Further, L2TP connections provide secure access to your
system or network when you protect them with IPSec.</p>
<p>It is important that you understand the effect a VPN will have on your
entire network. Correct planning and implementation are essential to your
success. Review these topics to ensure that you know how VPNs work and how
you might use them:</p>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzajawhatnewvpn.htm">What's new for V5R4</a></strong><br />
Describes what information is new or significantly changed in this release.</li>
<li class="ulchildlink"><strong><a href="rzajaprintvpn.htm">Printable PDF</a></strong><br />
Use this to view and print a PDF of this information.</li>
<li class="ulchildlink"><strong><a href="rzajavpnprotocols.htm">VPN concepts</a></strong><br />
It is important that you have at least a basic knowledge of standard VPN technologies. This topic provides you with conceptual information about the protocols VPN uses in its implementation.</li>
<li class="ulchildlink"><strong><a href="rzajascenarios.htm">VPN scenarios</a></strong><br />
Review these scenarios to become familiar with the technical and configuration details involved with each of these basic connection types.</li>
<li class="ulchildlink"><strong><a href="rzajavpnplan.htm">Plan for VPN</a></strong><br />
The first step to successfully using VPN is planning. This topic provides information about migrating from prior releases, setup requirements, and links to a planning advisor that will generate a planning worksheet that is customized to your specifications.</li>
<li class="ulchildlink"><strong><a href="rzajacreatevpncon.htm">Configure VPN</a></strong><br />
After planning for your VPN, you can begin configuring it. This topic provides you with an overview of what you can do with VPN and how to do it.</li>
<li class="ulchildlink"><strong><a href="rzajavpnmanage.htm">Manage VPN</a></strong><br />
Describes various tasks you can perform to manage your active VPN connections, including how to make changes to, monitor, or delete them.</li>
<li class="ulchildlink"><strong><a href="rzajatroubleshootvpn.htm">Troubleshoot VPN</a></strong><br />
Refer to this topic when you experience problems with your VPN connections.</li>
<li class="ulchildlink"><strong><a href="rzajaotherinfo.htm">Related information for VPN</a></strong><br />
Use this topic to find other sources of VPN information and related topics.</li>
</ul>
</div>
</body>
</html>